Source: gdcm
Version: 3.0.24-9
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for gdcm.

CVE-2026-3650[0]:
| A memory leak exists in the Grassroots DICOM library (GDCM). The bug
| occurs when parsing malformed DICOM files with non-standard VR types
| in file meta information. The vulnerability leads to vast memory
| allocations and resource depletion, triggering a denial-of-service
| condition. A maliciously crafted file can fill the heap in a single
| read operation without properly releasing it.

Unfortunately the Red Hat bugzilla entry does not contain information
on upstream status.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-3650
    https://www.cve.org/CVERecord?id=CVE-2026-3650
[1] https://bugzilla.redhat.com/show_bug.cgi?id=2451988

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to