Le samedi 18 octobre 2025, 09:18:42 heure d’été d’Europe centrale Salvatore Bonaccorso a écrit : > Source: imagemagick > Version: 8:7.1.2.3+dfsg1-1 > Severity: important > Tags: security upstream > X-Debbugs-Cc: [email protected], Debian Security Team > <[email protected]> > > Hi, > > The following vulnerability was published for imagemagick. > > CVE-2025-62171[0]: > | ImageMagick is an open source software suite for displaying, > | converting, and editing raster image files. In ImageMagick versions > | prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability > | exists in the BMP decoder on 32-bit systems. The vulnerability > | occurs in coders/bmp.c when calculating the extent value by > | multiplying image columns by bits per pixel. On 32-bit systems with > | size_t of 4 bytes, a malicious BMP file with specific dimensions can > | cause this multiplication to overflow and wrap to zero. The overflow > | check added to address CVE-2025-57803 is placed after the overflow > | occurs, making it ineffective. A specially crafted 58-byte BMP file > | with width set to 536,870,912 and 32 bits per pixel can trigger this > | overflow, causing the bytes_per_line calculation to become zero. > | This vulnerability only affects 32-bit builds of ImageMagick where > | default resource limits for width, height, and area have been > | manually increased beyond their defaults. 64-bit systems with size_t > | of 8 bytes are not vulnerable, and systems using default ImageMagick > | resource limits are not vulnerable. The vulnerability is fixed in > | versions 7.1.2-7 and 6.9.13-32. > > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For me it is a no-dsa one due to policy.xml forbidding such big file So will like to downgrade to minor and will made a point release rouca > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2025-62171 > https://www.cve.org/CVERecord?id=CVE-2025-62171 > [1] > https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm > [2] > https://github.com/ImageMagick/ImageMagick/commit/cea1693e2ded51b4cc91c70c54096cbed1691c00 > [3] > https://github.com/ImageMagick/ImageMagick6/commit/456771fae8baa9558a1421ec8d522e6937d9b2d7 > > Please adjust the affected versions in the BTS as needed. > > Regards, > Salvatore >
signature.asc
Description: This is a digitally signed message part.

