[Pkg-gmagick-im-team] imagemagick_7.1.2.19+dfsg1-1_source.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Fri Apr 17 08:33:50 BST 2026
Thank you for your contribution to Debian.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 14 Apr 2026 17:35:29 +0200
Source: imagemagick
Architecture: source
Version: 8:7.1.2.19+dfsg1-1
Distribution: unstable
Urgency: medium
Maintainer: ImageMagick Packaging Team <pkg-gmagick-im-team at lists.alioth.debian.org>
Changed-By: Bastien Roucariès <rouca at debian.org>
Changes:
imagemagick (8:7.1.2.19+dfsg1-1) unstable; urgency=medium
.
* New upstream version
* Fix CVE-2026-33899:
When `Magick` parses an XML file it is possible that
a single zero byte is written out of the bounds
* Fix CVE-2026-33900:
The viff encoder contains an integer truncation/wraparound issue on
32-bit builds that could trigger an out of bounds heap write,
potentially causing a crash.
* Fix CVE-2026-33901:
A heap buffer overflow occurs in the MVG decoder that could result in
an out of bounds write when processing a crafted image.
* Fix CVE-2026-33902:
A stack overflow vulnerability in ImageMagick's FX expression parser allows
an attacker to crash the process by providing a deeply nested expression.
* Fix CVE-2026-33905:
The -sample operation has an out of bounds read when an specific offset
is set through the `sample:offset` define that could lead to an out of
bounds read.
* Fix CVE-2026-33908:
Magick frees the memory of the XML tree via the `DestroyXMLTree()`
function; however, this process is executed recursively with no depth
limit imposed. When Magick processes an XML file with deeply nested
structures, it will exhaust the stack memory, resulting in a Denial of
Service (DoS) attack.
* Fix CVE-2026-34238:
An integer overflow in the despeckle operation causes a heap
buffer overflow on 32-bit builds that will result in an out of bounds write.
* Fix CVE-2026-40169:
A crafted image could result in an out of bounds heap write when writing a
yaml or json output, resulting in a crash.
* Fix CVE-2026-40183:
The JXL encoder has an heap write overflow when a user specifies
that the image should be encoded as 16 bit floats.
* Fix CVE-2026-40310:
A heap out-of-bounds write in the JP2 encoder with when a user specifies
an invalid sampling index.
* Fix CVE-2026-40311:
A heap use-after-free vulnerability that can cause a crash when reading
and printing values from an invalid XMP profile.
* Fix CVE-2026-40312:
An off by one error in the MSL decoder could result in a crash
when a malicous MSL file is read.
Checksums-Sha1:
e9472053a08a1cf6464ba32330c92a714610a521 5104 imagemagick_7.1.2.19+dfsg1-1.dsc
3d33a961a81838e9658a93aaa288476ab4214465 10535792 imagemagick_7.1.2.19+dfsg1.orig.tar.xz
7423ff0e85cacb4eb81e6960fa667606b7fc88b6 272140 imagemagick_7.1.2.19+dfsg1-1.debian.tar.xz
9dcd57c3a90f94cb75a58ab8a682a48e815e2eac 8474 imagemagick_7.1.2.19+dfsg1-1_source.buildinfo
Checksums-Sha256:
c5fe58c71f2bb2a42279396faeec6eb150dd5502eb02ca34a972812487117bff 5104 imagemagick_7.1.2.19+dfsg1-1.dsc
40ab713dcf9778d94b054c87fee97acfb3da2cc805d929bc0544b9de52554684 10535792 imagemagick_7.1.2.19+dfsg1.orig.tar.xz
41e725c5bf62b48f256a2397e6476afff81d1ec4f12fac80b9896c61e536ec45 272140 imagemagick_7.1.2.19+dfsg1-1.debian.tar.xz
4f46c9bb157c890ca576543315de2c6618565260c6519b6e090b56ae9ff861db 8474 imagemagick_7.1.2.19+dfsg1-1_source.buildinfo
Files:
cad37b4d054b80b3b0f273cc6cad4f61 5104 graphics optional imagemagick_7.1.2.19+dfsg1-1.dsc
bd72286e10e09cd37c3388a2a99a9852 10535792 graphics optional imagemagick_7.1.2.19+dfsg1.orig.tar.xz
e4ce93c6f9a4a18537df46e3c23117f9 272140 graphics optional imagemagick_7.1.2.19+dfsg1-1.debian.tar.xz
a63db24e108caaec10822ee563c384d6 8474 graphics optional imagemagick_7.1.2.19+dfsg1-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=gs9m
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gmagick-im-team/attachments/20260417/5842acfb/attachment.sig>
More information about the Pkg-gmagick-im-team
mailing list