Source: gdcm
Version: 3.0.24-7
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for gdcm.

CVE-2025-53618[0]:
| An out-of-bounds read vulnerability exists in the
| JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024.
| A specially crafted DICOM file can lead to an information leak. An
| attacker can provide a malicious file to trigger this
| vulnerability.The function `grayscale_convert` is called based of
| the value of the malicious DICOM file specifying the intended
| interpretation of the image pixel data


CVE-2025-53619[1]:
| An out-of-bounds read vulnerability exists in the
| JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024.
| A specially crafted DICOM file can lead to an information leak. An
| attacker can provide a malicious file to trigger this
| vulnerability.The function `null_convert` is called based of the
| value of the malicious DICOM file specifying the intended
| interpretation of the image pixel data


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-53618
    https://www.cve.org/CVERecord?id=CVE-2025-53618
[1] https://security-tracker.debian.org/tracker/CVE-2025-53619
    https://www.cve.org/CVERecord?id=CVE-2025-53619
[2] https://talosintelligence.com/vulnerability_reports/TALOS-2025-2210

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to