Bug#1118414: bookworm-pu: package imagemagick/8:6.9.11.60+dfsg-1.6+deb12u5
Hi,
On Sun, Oct 19, 2025 at 09:33:54PM +0200, Salvatore Bonaccorso wrote:
> Hi,
>
> On Sun, Oct 19, 2025 at 09:04:40PM +0200, Bastien Roucaries wrote:
> > Le dimanche 19 octobre 2025, 21:02:54 heure d’été d’Europe centrale
> > Salvatore Bonaccorso a écrit :
> > > CVE-2025-53014, CVE-2025-53019 and CVE-2025-53101.
> > >
> > I do not understand: imagemagick (8:6.9.11.60+dfsg-1.6+deb12u4)
> > bookworm-security; urgency=medium
> >
> > * Fix CVE-2025-53014:
> > A heap buffer overflow was found in the `InterpretImageFilename`
> > function. The issue stems from an off-by-one error that causes
> > out-of-bounds memory access when processing format strings
> > containing consecutive percent signs (`%%`).
> > (Closes: #1109339)
> > * Fix CVE-2025-53019:
> > ImageMagick's `magick stream` command, specifying multiple
> > consecutive `%d` format specifiers in a filename template
> > causes a memory leak
> > * Fix CVE-2025-53101:
> > ImageMagick's `magick mogrify` command, specifying
> > multiple consecutive `%d` format specifiers in a filename
> > template causes internal pointer arithmetic to generate
> > an address below the beginning of the stack buffer,
> > resulting in a stack overflow through `vsnprintf()`.
> > * Fix CVE-2025-55154:
> > the magnified size calculations in ReadOneMNGIMage
> > (in coders/png.c) are unsafe and can overflow,
> > leading to memory corruption.
> > (Closes: #1111103)
> > * Fix CVE-2025-55212:
> > passing a geometry string containing only a colon (":")
> > to montage -geometry leads GetGeometry() to set width/height
> > to 0. Later, ThumbnailImage() divides by these zero dimensions,
> > triggering a crash (SIGFPE/abort)
> > (Closes: #1111587)
> > * Fix CVE-2025-55298:
> > A format string bug vulnerability exists in InterpretImageFilename
> > function where user input is directly passed to FormatLocaleString
> > without proper sanitization. An attacker can overwrite arbitrary
> > memory regions, enabling a wide range of attacks from heap
> > overflow to remote code execution.
> > (Closes: #1111586)
> > * Fix CVE-2025-57803:
> > A 32-bit integer overflow in the BMP encoder’s scanline-stride
> > computation collapses bytes_per_line (stride) to a tiny
> > value while the per-row writer still emits 3 × width bytes
> > for 24-bpp images. The row base pointer advances using the
> > (overflowed) stride, so the first row immediately writes
> > past its slot and into adjacent heap memory with
> > attacker-controlled bytes.
> > (Closes: #1112469)
> > * Fix CVE-2025-57807:
> > A security problem was found in SeekBlob(), which permits
> > advancing the stream offset beyond the current end without
> > increasing capacity, and WriteBlob(), which then expands by
> > quantum + length (amortized) instead of offset + length,
> > and copies to data + offset. When offset ≫ extent, the
> > copy targets memory beyond the allocation, producing a
> > deterministic heap write on 64-bit builds. No 2⁶⁴
> > arithmetic wrap, external delegates, or policy settings
> > are required.
> > (Closes: #1114520)
>
> That is weird, I will double check what happened back then with the
> released DSA for 8:6.9.11.60+dfsg-1.6+deb12u4. Maybe then it is just
> wrong tracking.
Indeed, I doublechecked the debdiff as well and looks good. I just
have updated the security-tracker accordingly as the DSA was having
not a overlapping set of CVEs fixed in bookworm and trixie.
Regards,
Salvatore
Reply to: