[Pkg-gmagick-im-team] imagemagick_6.9.11.60+dfsg-1.6+deb12u8_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Tue Apr 14 21:41:36 BST 2026
Thank you for your contribution to Debian.
Mapping oldstable-security to oldstable-proposed-updates.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 12 Apr 2026 21:57:53 +0200
Source: imagemagick
Architecture: source
Version: 8:6.9.11.60+dfsg-1.6+deb12u8
Distribution: bookworm-security
Urgency: high
Maintainer: ImageMagick Packaging Team <pkg-gmagick-im-team at lists.alioth.debian.org>
Changed-By: Bastien Roucariès <rouca at debian.org>
Changes:
imagemagick (8:6.9.11.60+dfsg-1.6+deb12u8) bookworm-security; urgency=high
.
* Fix a regression for CVE-2026-25796
* Fix CVE-2026-25985:
A crafted SVG file containing an malicious element causes ImageMagick
to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort.
* Fix CVE-2026-26284:
ImageMagick lacks proper boundary checking when processing Huffman-coded
data from PCD (Photo CD) files. The decoder contains an function that
has an incorrect initialization that could cause an out of bounds read.
* Fix CVE-2026-26983:
The MSL interpreter crashes when processing a invalid `<map>`
element that causes it to use an image after it has been freed.
* Fix CVE-2026-28494:
A stack buffer overflow exists in ImageMagick's morphology kernel
parsing functions. User-controlled kernel strings exceeding a buffer
are copied into fixed-size stack buffers via memcpy without bounds
checking, resulting in stack corruption.
* Fix CVE-2026-28686:
A heap-buffer-overflow vulnerability exists in the PCL encode due to
an undersized output buffer allocation.
* Fix CVE-2026-28687:
A heap use-after-free vulnerability in ImageMagick's MSL decoder
allows an attacker to trigger access to freed memory by crafting
an MSL file
* Fix CVE-2026-28688:
A heap-use-after-free vulnerability exists in the MSL encoder,
where a cloned image is destroyed twice. The MSL coder does not
support writing MSL so the write capability has been removed
* Fix CVE-2026-28689:
domain="path" authorization is checked before final file open/use.
A symlink swap between check-time and use-time bypasses
policy-denied read/write
* Fix CVE-2026-28690:
A stack buffer overflow vulnerability exists in the MNG encoder.
There is a bounds checks missing that could corrupting the stack
with attacker-controlled data.
* Fix CVE-2026-28691:
An uninitialized pointer dereference vulnerability exists
in the JBIG decoder due to a missing check.
* Fix CVE-2026-28692:
MAT decoder uses 32-bit arithmetic due to incorrect parenthesization
resulting in a heap over-read.
* Fix CVE-2026-28693:
An integer overflow in DIB coder can result in out of bounds
read or write.
* Fix CVE-2026-30883:
An extremely large image profile could result in a heap overflow
when encoding a PNG image
* Fix CVE-2026-30936:
A crafted image could cause an out of bounds heap write inside the
WaveletDenoiseImage method. When processing a crafted image with the
-wavelet-denoise operation an out of bounds write can occur.
* Fix CVE-2026-30937:
A 32-bit unsigned integer overflow in the XWD (X Windows) encoder
can cause an undersized heap buffer allocation. When writing
a extremely large image an out of bounds heap write can occur.
* Fix CVE-2026-31853:
An overflow on 32-bit systems can cause a crash in the SFW decoder
when processing extremely large images.
* Fix CVE-2026-32259:
When a memory allocation fails in the sixel encoder it would be
possible to write past the end of a buffer on the stack.
* Fix CVE-2026-32636:
The NewXMLTree method contains a bug that could result
in a crash due to an out of write bounds of a single zero byte
* Fix CVE-2026-33535:
An out-of-bounds write of a zero byte exists in the X11 `display`
interaction path that could lead to a crash.
* Fix CVE-2026-33536:
Due to an incorrect return value on certain platforms a pointer is
incremented past the end of a buffer that is on the stack and
that could result in an out of bounds write
Checksums-Sha1:
7ffbb8ee55e0361b83360c7e42a387eea7f728f9 5105 imagemagick_6.9.11.60+dfsg-1.6+deb12u8.dsc
824a63dce5e54bd8b78077d671d8ab06300a8848 9395144 imagemagick_6.9.11.60+dfsg.orig.tar.xz
856ea3136f98daf87f829027fbcbc020c02a41fc 320480 imagemagick_6.9.11.60+dfsg-1.6+deb12u8.debian.tar.xz
97792f112e94eee1c5b1a2e3603f9078b82dd23d 8485 imagemagick_6.9.11.60+dfsg-1.6+deb12u8_source.buildinfo
Checksums-Sha256:
be33aab0ffb7122333a22f89afda0c872304c37d68db4425040365842cbd8696 5105 imagemagick_6.9.11.60+dfsg-1.6+deb12u8.dsc
472fb516df842ee9c819ed80099c188463b9e961303511c36ae24d0eaa8959c4 9395144 imagemagick_6.9.11.60+dfsg.orig.tar.xz
77abe4965d1582fb9eac30605b8b48de27c0b4934d910560806dad01227664e9 320480 imagemagick_6.9.11.60+dfsg-1.6+deb12u8.debian.tar.xz
d7c8be9c6cdced93c41a56a21d3e11206e70fe2898e61ab4803588ccdb2d8bf6 8485 imagemagick_6.9.11.60+dfsg-1.6+deb12u8_source.buildinfo
Files:
82da4869f369a4ebe1a73ce17b3eabd8 5105 graphics optional imagemagick_6.9.11.60+dfsg-1.6+deb12u8.dsc
8b8f7b82bd1299cf30aa3c488c46a3cd 9395144 graphics optional imagemagick_6.9.11.60+dfsg.orig.tar.xz
1b34ad7c7c15099a4c948cb9893bffb3 320480 graphics optional imagemagick_6.9.11.60+dfsg-1.6+deb12u8.debian.tar.xz
7c9ab43c1537a2bb8f10592e5a62cb05 8485 graphics optional imagemagick_6.9.11.60+dfsg-1.6+deb12u8_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=EPHz
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gmagick-im-team/attachments/20260414/b716be81/attachment.sig>
More information about the Pkg-gmagick-im-team
mailing list