[Pkg-gmagick-im-team] Bug#1118340: imagemagick: CVE-2025-62171

Bastien Roucaries rouca at debian.org
Sat Oct 18 10:42:48 BST 2025


Le samedi 18 octobre 2025, 09:18:42 heure d’été d’Europe centrale Salvatore Bonaccorso a écrit :
> Source: imagemagick
> Version: 8:7.1.2.3+dfsg1-1
> Severity: important
> Tags: security upstream
> X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
> 
> Hi,
> 
> The following vulnerability was published for imagemagick.
> 
> CVE-2025-62171[0]:
> | ImageMagick is an open source software suite for displaying,
> | converting, and editing raster image files. In ImageMagick versions
> | prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability
> | exists in the BMP decoder on 32-bit systems. The vulnerability
> | occurs in coders/bmp.c when calculating the extent value by
> | multiplying image columns by bits per pixel. On 32-bit systems with
> | size_t of 4 bytes, a malicious BMP file with specific dimensions can
> | cause this multiplication to overflow and wrap to zero. The overflow
> | check added to address CVE-2025-57803 is placed after the overflow
> | occurs, making it ineffective. A specially crafted 58-byte BMP file
> | with width set to 536,870,912 and 32 bits per pixel can trigger this
> | overflow, causing the bytes_per_line calculation to become zero.
> | This vulnerability only affects 32-bit builds of ImageMagick where
> | default resource limits for width, height, and area have been
> | manually increased beyond their defaults. 64-bit systems with size_t
> | of 8 bytes are not vulnerable, and systems using default ImageMagick
> | resource limits are not vulnerable. The vulnerability is fixed in
> | versions 7.1.2-7 and 6.9.13-32.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For me it is a no-dsa one due to policy.xml forbidding such big file

So will like to downgrade to minor and will made a point release

rouca
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2025-62171
>     https://www.cve.org/CVERecord?id=CVE-2025-62171
> [1] https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm
> [2] https://github.com/ImageMagick/ImageMagick/commit/cea1693e2ded51b4cc91c70c54096cbed1691c00
> [3] https://github.com/ImageMagick/ImageMagick6/commit/456771fae8baa9558a1421ec8d522e6937d9b2d7
> 
> Please adjust the affected versions in the BTS as needed.
> 
> Regards,
> Salvatore
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part.
URL: <http://alioth-lists.debian.net/pipermail/pkg-gmagick-im-team/attachments/20251018/96e64acd/attachment-0001.sig>


More information about the Pkg-gmagick-im-team mailing list