Your message dated Sun, 28 Dec 2025 23:05:38 +0000
with message-id <[email protected]>
and subject line Bug#1122827: fixed in imagemagick 8:7.1.2.12+dfsg1-1
has caused the Debian Bug report #1122827,
regarding imagemagick: CVE-2025-65955
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1122827: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122827
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: imagemagick
Version: 8:7.1.2.8+dfsg1-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for imagemagick.

CVE-2025-65955[0]:
| ImageMagick is free and open-source software used for editing and
| manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there
| is a vulnerability in ImageMagick’s Magick++ layer that manifests
| when Options::fontFamily is invoked with an empty string. Clearing a
| font family calls RelinquishMagickMemory on _drawInfo->font, freeing
| the font string but leaving _drawInfo->font pointing to freed memory
| while _drawInfo->family is set to that (now-invalid) pointer. Any
| later cleanup or reuse of _drawInfo->font re-frees or dereferences
| dangling memory. DestroyDrawInfo and other setters (Options::font,
| Image::font) assume _drawInfo->font remains valid, so destruction or
| subsequent updates trigger crashes or heap corruption. This
| vulnerability is fixed in 7.1.2-9 and 6.9.13-34.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-65955
    https://www.cve.org/CVERecord?id=CVE-2025-65955
[1] 
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-q3hc-j9x5-mp9m

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:7.1.2.12+dfsg1-1
Done: Bastien Roucariès <[email protected]>

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastien Roucariès <[email protected]> (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 28 Dec 2025 19:32:37 +0100
Source: imagemagick
Architecture: source
Version: 8:7.1.2.12+dfsg1-1
Distribution: unstable
Urgency: medium
Maintainer: ImageMagick Packaging Team 
<[email protected]>
Changed-By: Bastien Roucariès <[email protected]>
Closes: 1122584 1122827
Changes:
 imagemagick (8:7.1.2.12+dfsg1-1) unstable; urgency=medium
 .
   * New upstream version
   * Fix CVE-2025-65955 (Closes: #1122827)
     There is a vulnerability in ImageMagick’s Magick++ layer that
     manifests when Options::fontFamily is invoked with an empty
     string. Clearing a font family calls RelinquishMagickMemory on
     _drawInfo->font, freeing the font string but leaving _drawInfo->font
     pointing to freed memory while _drawInfo->family is set to that
     (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font
     re-frees or dereferences dangling memory. DestroyDrawInfo and other
     setters (Options::font, Image::font) assume _drawInfo->font remains
     valid, so destruction or subsequent updates trigger crashes or heap
     corruption
   * Fix CVE-2025-66628 (Closes: #1122584)
     The TIM (PSX TIM) image parser contains a critical integer overflow
     vulnerability in its ReadTIMImage function (coders/tim.c). The code
     reads width and height (16-bit values) from the file header and
     calculates image_size = 2 * width * height without checking for
     overflow. On 32-bit systems (or where size_t is 32-bit), this
     calculation can overflow if width and height are large (e.g., 65535),
     wrapping around to a small value. This results in a small heap
     allocation via AcquireQuantumMemory and later operations relying on
     the dimensions can trigger an out of bounds read.
Checksums-Sha1:
 a09322381b5fb80176ecbd179d6ec74b89e4f48a 5202 imagemagick_7.1.2.12+dfsg1-1.dsc
 bee52f0778e83b60af245ce15913df09f53adb7d 10528380 
imagemagick_7.1.2.12+dfsg1.orig.tar.xz
 6d85303213351c4a7cfef3e6ba2d99a80b9e44f3 267584 
imagemagick_7.1.2.12+dfsg1-1.debian.tar.xz
 761fbfd27d1fd2d4774bd872462a8e7c5b496571 8344 
imagemagick_7.1.2.12+dfsg1-1_source.buildinfo
Checksums-Sha256:
 5120ceb4dbc42b75e967ffdc9932958578f6729a27c428feaa9604104be3f6d2 5202 
imagemagick_7.1.2.12+dfsg1-1.dsc
 56a85bcdd0bd00b52f9a0bb51a25a8e16fb0b8742ce53e7984d7db26229fe245 10528380 
imagemagick_7.1.2.12+dfsg1.orig.tar.xz
 6c9f335dc4e94b9de403f13d4f1149ef79883be8e86468a717b508eb42913a2f 267584 
imagemagick_7.1.2.12+dfsg1-1.debian.tar.xz
 418c53e15f9ab3bfb1a476a7ad5a160c8baf776f6e094cd459889851e404cd23 8344 
imagemagick_7.1.2.12+dfsg1-1_source.buildinfo
Files:
 0e171c78a89d65696ba3fc3b42a7656f 5202 graphics optional 
imagemagick_7.1.2.12+dfsg1-1.dsc
 16b781d79d7aa251115b7ca613f3b76f 10528380 graphics optional 
imagemagick_7.1.2.12+dfsg1.orig.tar.xz
 356e3359831fab0be11be31b7aa95b6b 267584 graphics optional 
imagemagick_7.1.2.12+dfsg1-1.debian.tar.xz
 aea9d754b329c9d001b800de7cf0048f 8344 graphics optional 
imagemagick_7.1.2.12+dfsg1-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=cTeQ
-----END PGP SIGNATURE-----

Attachment: pgpiuIerjiMUH.pgp
Description: PGP signature


--- End Message ---

Reply via email to