Your message dated Sat, 15 Nov 2025 11:21:45 +0000 with message-id <736c7150dc08501cc89945035c406eaf9688e144.camel@adam-barratt.org.uk> and subject line Closing requests for updates included in 13.2 has caused the Debian Bug report #1118434, regarding trixie-pu: package imagemagick/8:7.1.1.43+dfsg1-1+deb13u3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1118434: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118434 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: trixie-pu: package imagemagick/8:7.1.1.43+dfsg1-1+deb13u3
- From: Bastien Roucaries <rouca@debian.org>
- Date: Sun, 19 Oct 2025 21:52:49 +0200
- Message-id: <1985469.6tgchFWduM@debian-ei>
Package: release.debian.org Severity: normal Tags: trixie X-Debbugs-Cc: imagemagick@packages.debian.org Control: affects -1 + src:imagemagick User: release.debian.org@packages.debian.org Usertags: pu [ Reason ] CVE-2025-62171 [ Impact ] CVE-2025-62171> [ Tests ] Test suite [ Risks ] Low [ Checklist ] [X] *all* changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in (old)stable [X] the issue is verified as fixed in unstable [ Changes ] CVE fixed one line change [ Other info ]diff -Nru imagemagick-7.1.1.43+dfsg1/debian/changelog imagemagick-7.1.1.43+dfsg1/debian/changelog --- imagemagick-7.1.1.43+dfsg1/debian/changelog 2025-09-07 00:31:52.000000000 +0200 +++ imagemagick-7.1.1.43+dfsg1/debian/changelog 2025-10-19 10:37:32.000000000 +0200 @@ -1,3 +1,17 @@ +imagemagick (8:7.1.1.43+dfsg1-1+deb13u3) trixie; urgency=high + + * Fix CVE-2025-62171 (Closes: #1118340) + Integer Overflow in BMP Decoder (ReadBMP): + CVE-2025-57803 claims to be patched, but the fix is incomplete + and ineffective. + . + The patch added BMPOverflowCheck() but placed it + after the overflow occurs, making it useless. + A malicious 58-byte BMP file can trigger AddressSanitizer + crashes and DoS. + + -- Bastien Roucariès <rouca@debian.org> Sun, 19 Oct 2025 10:37:32 +0200 + imagemagick (8:7.1.1.43+dfsg1-1+deb13u2) trixie-security; urgency=high * Fix CVE-2025-55004: diff -Nru imagemagick-7.1.1.43+dfsg1/debian/patches/CVE-2025-62171.patch imagemagick-7.1.1.43+dfsg1/debian/patches/CVE-2025-62171.patch --- imagemagick-7.1.1.43+dfsg1/debian/patches/CVE-2025-62171.patch 1970-01-01 01:00:00.000000000 +0100 +++ imagemagick-7.1.1.43+dfsg1/debian/patches/CVE-2025-62171.patch 2025-10-19 10:37:32.000000000 +0200 @@ -0,0 +1,25 @@ +From: Dirk Lemstra <dirk@lemstra.org> +Date: Sun, 12 Oct 2025 20:43:14 +0200 +Subject: Added extra check to resolve issue on 32-bit systems + (https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm) + +origin: https://github.com/ImageMagick/ImageMagick/commit/cea1693e2ded51b4cc91c70c54096cbed1691c00 +bug: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9pp9-cfwx-54rm +bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118340 +--- + coders/bmp.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/coders/bmp.c b/coders/bmp.c +index 8f318e2..6f1b77d 100644 +--- a/coders/bmp.c ++++ b/coders/bmp.c +@@ -1115,6 +1115,8 @@ static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) + ThrowReaderException(CorruptImageError,"ImproperImageHeader"); + if (bmp_info.compression == BI_RLE4) + bmp_info.bits_per_pixel<<=1; ++ if (BMPOverflowCheck(image->columns,bmp_info.bits_per_pixel) != MagickFalse) ++ ThrowReaderException(ResourceLimitError,"MemoryAllocationFailed"); + extent=image->columns*bmp_info.bits_per_pixel; + bytes_per_line=4*((extent+31)/32); + if (BMPOverflowCheck(bytes_per_line,image->rows) != MagickFalse) diff -Nru imagemagick-7.1.1.43+dfsg1/debian/patches/series imagemagick-7.1.1.43+dfsg1/debian/patches/series --- imagemagick-7.1.1.43+dfsg1/debian/patches/series 2025-09-07 00:31:52.000000000 +0200 +++ imagemagick-7.1.1.43+dfsg1/debian/patches/series 2025-10-19 10:37:32.000000000 +0200 @@ -52,3 +52,4 @@ CVE-2025-55298-2.patch CVE-2025-57803.patch CVE-2025-57807.patch +CVE-2025-62171.patch diff -Nru imagemagick-7.1.1.43+dfsg1/debian/salsa-ci.yml imagemagick-7.1.1.43+dfsg1/debian/salsa-ci.yml --- imagemagick-7.1.1.43+dfsg1/debian/salsa-ci.yml 2025-09-07 00:31:52.000000000 +0200 +++ imagemagick-7.1.1.43+dfsg1/debian/salsa-ci.yml 2025-10-19 10:37:32.000000000 +0200 @@ -1,8 +1,9 @@ --- include: - https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/recipes/debian.yml - - local: '/debian/rdeps-ci.yml' +# - local: '/debian/rdeps-ci.yml' variables: + RELEASE: 'trixie' SALSA_CI_ENABLE_REVERSE_DEPENDENCY_BUILD: 0 SALSA_CI_DISABLE_APTLY: 0Attachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
- To: 1110859-done@bugs.debian.org, 1111236-done@bugs.debian.org, 1111733-done@bugs.debian.org, 1111734-done@bugs.debian.org, 1111808-done@bugs.debian.org, 1111819-done@bugs.debian.org, 1112097-done@bugs.debian.org, 1112120-done@bugs.debian.org, 1112256-done@bugs.debian.org, 1112261-done@bugs.debian.org, 1112276-done@bugs.debian.org, 1112282-done@bugs.debian.org, 1112283-done@bugs.debian.org, 1112380-done@bugs.debian.org, 1112479-done@bugs.debian.org, 1112557-done@bugs.debian.org, 1112668-done@bugs.debian.org, 1112671-done@bugs.debian.org, 1113711-done@bugs.debian.org, 1113750-done@bugs.debian.org, 1113757-done@bugs.debian.org, 1113761-done@bugs.debian.org, 1113778-done@bugs.debian.org, 1113799-done@bugs.debian.org, 1113804-done@bugs.debian.org, 1113860-done@bugs.debian.org, 1113882-done@bugs.debian.org, 1113902-done@bugs.debian.org, 1113904-done@bugs.debian.org, 1113961-done@bugs.debian.org, 1113979-done@bugs.debian.org, 1114595-done@bugs.debian.org, 1114684-done@bugs.debian.org, 1114755-done@bugs.debian.org, 1114855-done@bugs.debian.org, 1114929-done@bugs.debian.org, 1114979-done@bugs.debian.org, 1115257-done@bugs.debian.org, 1115486-done@bugs.debian.org, 1115530-done@bugs.debian.org, 1115749-done@bugs.debian.org, 1115815-done@bugs.debian.org, 1115860-done@bugs.debian.org, 1115899-done@bugs.debian.org, 1115914-done@bugs.debian.org, 1116012-done@bugs.debian.org, 1116020-done@bugs.debian.org, 1116040-done@bugs.debian.org, 1116053-done@bugs.debian.org, 1116127-done@bugs.debian.org, 1116196-done@bugs.debian.org, 1116201-done@bugs.debian.org, 1116386-done@bugs.debian.org, 1116523-done@bugs.debian.org, 1116526-done@bugs.debian.org, 1116547-done@bugs.debian.org, 1116575-done@bugs.debian.org, 1116665-done@bugs.debian.org, 1116705-done@bugs.debian.org, 1116938-done@bugs.debian.org, 1116945-done@bugs.debian.org, 1116983-done@bugs.debian.org, 1117467-done@bugs.debian.org, 1117469-done@bugs.debian.org, 1117828-done@bugs.debian.org, 1117843-done@bugs.debian.org, 1117876-done@bugs.debian.org, 1117909-done@bugs.debian.org, 1118008-done@bugs.debian.org, 1118037-done@bugs.debian.org, 1118047-done@bugs.debian.org, 1118228-done@bugs.debian.org, 1118374-done@bugs.debian.org, 1118434-done@bugs.debian.org, 1118443-done@bugs.debian.org, 1118458-done@bugs.debian.org, 1118547-done@bugs.debian.org, 1118657-done@bugs.debian.org, 1118663-done@bugs.debian.org, 1118673-done@bugs.debian.org, 1118674-done@bugs.debian.org, 1118737-done@bugs.debian.org, 1119085-done@bugs.debian.org, 1119088-done@bugs.debian.org, 1119115-done@bugs.debian.org, 1119136-done@bugs.debian.org, 1119142-done@bugs.debian.org, 1119256-done@bugs.debian.org, 1119286-done@bugs.debian.org, 1119287-done@bugs.debian.org, 1119288-done@bugs.debian.org, 1119291-done@bugs.debian.org, 1119301-done@bugs.debian.org, 1119303-done@bugs.debian.org, 1119719-done@bugs.debian.org, 1119798-done@bugs.debian.org, 1119854-done@bugs.debian.org, 1119909-done@bugs.debian.org, 1120048-done@bugs.debian.org, 1120050-done@bugs.debian.org, 1120054-done@bugs.debian.org, 1120125-done@bugs.debian.org, 1120129-done@bugs.debian.org, 1120143-done@bugs.debian.org, 1120145-done@bugs.debian.org, 1120148-done@bugs.debian.org, 1120151-done@bugs.debian.org, 1120262-done@bugs.debian.org, 1120278-done@bugs.debian.org, 1120289-done@bugs.debian.org, 1120325-done@bugs.debian.org, 1120345-done@bugs.debian.org, 1120350-done@bugs.debian.org, 1120358-done@bugs.debian.org, 1120360-done@bugs.debian.org, 1120445-done@bugs.debian.org
- Subject: Closing requests for updates included in 13.2
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 15 Nov 2025 11:21:45 +0000
- Message-id: <736c7150dc08501cc89945035c406eaf9688e144.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 13.2 Hi, The updates referenced in each of these bugs were included in today's 13.2 trixie point release. Regards, Adam
--- End Message ---