Your message dated Sun, 10 May 2026 10:17:05 +0000
with message-id <[email protected]>
and subject line Bug#1135778: fixed in cimg 3.5.2+dfsg-1+deb13u1
has caused the Debian Bug report #1135778,
regarding cimg: CVE-2026-42144 CVE-2026-42146
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1135778: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135778
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: cimg
Version: 3.5.2+dfsg-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for cimg.

CVE-2026-42144[0]:
| CImg Library is a C++ library for image processing. Prior to commit
| 4ca26bc, there is an integer overflow vulnerability in the W*H*D
| size computation inside _load_pnm() that can bypass the memory
| allocation guard. A crafted PNM/PGM/PPM file with large dimension
| values causes the overflow to wrap around, allocating an undersized
| buffer and potentially triggering a heap buffer overflow. Any
| application using CImg to load untrusted image files is affected.
| This issue has been patched via commit 4ca26bc.


CVE-2026-42146[1]:
| CImg Library is a C++ library for image processing. Prior to commit
| c3aacf5, the nb_colors field read from the BMP file header is used
| directly to compute an allocation size without validating it against
| the remaining file size. A crafted BMP file with a large nb_colors
| value triggers an out-of-memory condition, crashing any application
| that uses CImg to load untrusted BMP files. This issue has been
| patched via commit c3aacf5.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-42144
    https://www.cve.org/CVERecord?id=CVE-2026-42144
    https://github.com/GreycLab/CImg/security/advisories/GHSA-4663-63fm-44gc
    
https://github.com/GreycLab/CImg/commit/4ca26bce4d8c61fcd1507d5f9401b9fb1222c27d
[1] https://security-tracker.debian.org/tracker/CVE-2026-42146
    https://www.cve.org/CVERecord?id=CVE-2026-42146
    https://github.com/GreycLab/CImg/security/advisories/GHSA-g54r-qmgx-c6fv
    
https://github.com/GreycLab/CImg/commit/c3aacf5b96ac1e54b7af1957c6737dbf3949f6d3

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: cimg
Source-Version: 3.5.2+dfsg-1+deb13u1
Done: Adrian Bunk <[email protected]>

We believe that the bug you reported is fixed in the latest version of
cimg, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <[email protected]> (supplier of updated cimg package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 08 May 2026 14:47:35 +0300
Source: cimg
Architecture: source
Version: 3.5.2+dfsg-1+deb13u1
Distribution: trixie
Urgency: medium
Maintainer: Debian Science Maintainers 
<[email protected]>
Changed-By: Adrian Bunk <[email protected]>
Closes: 1135778
Changes:
 cimg (3.5.2+dfsg-1+deb13u1) trixie; urgency=medium
 .
   * Non-maintainer upload.
   * CVE-2026-42144: Integer overflow in PNM size check
   * CVE-2026-42146: OOM on crafted BMP
   * (Closes: #1135778)
Checksums-Sha1:
 b6c2644766564ae6245a2b5ed103c5d0fbe2b234 2624 cimg_3.5.2+dfsg-1+deb13u1.dsc
 67cae724ab5d0833bb1676d5bd901b11db6bf511 10677044 cimg_3.5.2+dfsg.orig.tar.xz
 a67dd17810bf8317665cc5302de8daed39e08619 21372 
cimg_3.5.2+dfsg-1+deb13u1.debian.tar.xz
Checksums-Sha256:
 96a4a4cc6d0260c70d1cd4f1aade8ad854bde69a28075892967328f91b713da2 2624 
cimg_3.5.2+dfsg-1+deb13u1.dsc
 34611e441ce8add59a45a38f81fb2dc1da59ba4edb3f33d6423206c19df97cbb 10677044 
cimg_3.5.2+dfsg.orig.tar.xz
 033c3ef73774c27990d54b706a680a8ce09efe51f521fff7e6930f8068508b75 21372 
cimg_3.5.2+dfsg-1+deb13u1.debian.tar.xz
Files:
 6fd7ae9c11474f019d3635a1dd35b53a 2624 math optional 
cimg_3.5.2+dfsg-1+deb13u1.dsc
 ac01c8e09907de481ba2ba53b6e17416 10677044 math optional 
cimg_3.5.2+dfsg.orig.tar.xz
 3f451fedfef596a5b5db5054699eb359 21372 math optional 
cimg_3.5.2+dfsg-1+deb13u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=7w48
-----END PGP SIGNATURE-----

Attachment: pgpChNrh0CVbi.pgp
Description: PGP signature


--- End Message ---
-- 
debian-science-maintainers mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-science-maintainers

Reply via email to