Source: dcmtk Version: 3.6.9-6 Severity: important Tags: security upstream Forwarded: https://support.dcmtk.org/redmine/issues/1184 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for dcmtk. CVE-2025-14607[0]: | A vulnerability was detected in OFFIS DCMTK up to 3.6.9. Affected by | this issue is the function DcmByteString::makeDicomByteString of the | file dcmdata/libsrc/dcbytstr.cc of the component dcmdata. The | manipulation results in memory corruption. The attack can be | launched remotely. Upgrading to version 3.7.0 can resolve this | issue. The patch is identified as | 4c0e5c10079392c594d6a7abd95dd78ac0aa556a. You should upgrade the | affected component. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-14607 https://www.cve.org/CVERecord?id=CVE-2025-14607 [1] https://support.dcmtk.org/redmine/issues/1184 [2] https://github.com/DCMTK/dcmtk/commit/4c0e5c10079392c594d6a7abd95dd78ac0aa556a Please adjust the affected versions in the BTS as needed. Regards, Salvatore

