[Pkg-gmagick-im-team] imagemagick_7.1.2.19+dfsg1-1_source.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Fri Apr 17 08:33:50 BST 2026


Thank you for your contribution to Debian.



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 14 Apr 2026 17:35:29 +0200
Source: imagemagick
Architecture: source
Version: 8:7.1.2.19+dfsg1-1
Distribution: unstable
Urgency: medium
Maintainer: ImageMagick Packaging Team <pkg-gmagick-im-team at lists.alioth.debian.org>
Changed-By: Bastien Roucariès <rouca at debian.org>
Changes:
 imagemagick (8:7.1.2.19+dfsg1-1) unstable; urgency=medium
 .
   * New upstream version
   * Fix CVE-2026-33899:
     When `Magick` parses an XML file it is possible that
     a single zero byte is written out of the bounds
   * Fix CVE-2026-33900:
     The viff encoder contains an integer truncation/wraparound issue on
     32-bit builds that could trigger an out of bounds heap write,
     potentially causing a crash.
   * Fix CVE-2026-33901:
     A heap buffer overflow occurs in the MVG decoder that could result in
     an out of bounds write when processing a crafted image.
   * Fix CVE-2026-33902:
     A stack overflow vulnerability in ImageMagick's FX expression parser allows
     an attacker to crash the process by providing a deeply nested expression.
   * Fix CVE-2026-33905:
     The -sample operation has an out of bounds read when an specific offset
     is set through the `sample:offset` define that could lead to an out of
     bounds read.
   * Fix CVE-2026-33908:
     Magick frees the memory of the XML tree via the `DestroyXMLTree()`
     function; however, this process is executed recursively with no depth
     limit imposed. When Magick processes an XML file with deeply nested
     structures, it will exhaust the stack memory, resulting in a Denial of
     Service (DoS) attack.
   * Fix CVE-2026-34238:
     An integer overflow in the despeckle operation causes a heap
     buffer overflow on 32-bit builds that will result in an out of bounds write.
   * Fix CVE-2026-40169:
     A crafted image could result in an out of bounds heap write when writing a
     yaml or json output, resulting in a crash.
   * Fix CVE-2026-40183:
     The JXL encoder has an heap write overflow when a user specifies
     that the image should be encoded as 16 bit floats.
   * Fix CVE-2026-40310:
     A heap out-of-bounds write in the JP2 encoder with when a user specifies
     an invalid sampling index.
   * Fix CVE-2026-40311:
     A heap use-after-free vulnerability that can cause a crash when reading
     and printing values from an invalid XMP profile.
   * Fix CVE-2026-40312:
     An off by one error in the MSL decoder could result in a crash
     when a malicous MSL file is read.
Checksums-Sha1:
 e9472053a08a1cf6464ba32330c92a714610a521 5104 imagemagick_7.1.2.19+dfsg1-1.dsc
 3d33a961a81838e9658a93aaa288476ab4214465 10535792 imagemagick_7.1.2.19+dfsg1.orig.tar.xz
 7423ff0e85cacb4eb81e6960fa667606b7fc88b6 272140 imagemagick_7.1.2.19+dfsg1-1.debian.tar.xz
 9dcd57c3a90f94cb75a58ab8a682a48e815e2eac 8474 imagemagick_7.1.2.19+dfsg1-1_source.buildinfo
Checksums-Sha256:
 c5fe58c71f2bb2a42279396faeec6eb150dd5502eb02ca34a972812487117bff 5104 imagemagick_7.1.2.19+dfsg1-1.dsc
 40ab713dcf9778d94b054c87fee97acfb3da2cc805d929bc0544b9de52554684 10535792 imagemagick_7.1.2.19+dfsg1.orig.tar.xz
 41e725c5bf62b48f256a2397e6476afff81d1ec4f12fac80b9896c61e536ec45 272140 imagemagick_7.1.2.19+dfsg1-1.debian.tar.xz
 4f46c9bb157c890ca576543315de2c6618565260c6519b6e090b56ae9ff861db 8474 imagemagick_7.1.2.19+dfsg1-1_source.buildinfo
Files:
 cad37b4d054b80b3b0f273cc6cad4f61 5104 graphics optional imagemagick_7.1.2.19+dfsg1-1.dsc
 bd72286e10e09cd37c3388a2a99a9852 10535792 graphics optional imagemagick_7.1.2.19+dfsg1.orig.tar.xz
 e4ce93c6f9a4a18537df46e3c23117f9 272140 graphics optional imagemagick_7.1.2.19+dfsg1-1.debian.tar.xz
 a63db24e108caaec10822ee563c384d6 8474 graphics optional imagemagick_7.1.2.19+dfsg1-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=gs9m
-----END PGP SIGNATURE-----

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gmagick-im-team/attachments/20260417/5842acfb/attachment.sig>


More information about the Pkg-gmagick-im-team mailing list