Source: cimg
Version: 3.5.2+dfsg-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for cimg.

CVE-2026-42144[0]:
| CImg Library is a C++ library for image processing. Prior to commit
| 4ca26bc, there is an integer overflow vulnerability in the W*H*D
| size computation inside _load_pnm() that can bypass the memory
| allocation guard. A crafted PNM/PGM/PPM file with large dimension
| values causes the overflow to wrap around, allocating an undersized
| buffer and potentially triggering a heap buffer overflow. Any
| application using CImg to load untrusted image files is affected.
| This issue has been patched via commit 4ca26bc.


CVE-2026-42146[1]:
| CImg Library is a C++ library for image processing. Prior to commit
| c3aacf5, the nb_colors field read from the BMP file header is used
| directly to compute an allocation size without validating it against
| the remaining file size. A crafted BMP file with a large nb_colors
| value triggers an out-of-memory condition, crashing any application
| that uses CImg to load untrusted BMP files. This issue has been
| patched via commit c3aacf5.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-42144
    https://www.cve.org/CVERecord?id=CVE-2026-42144
    https://github.com/GreycLab/CImg/security/advisories/GHSA-4663-63fm-44gc
    
https://github.com/GreycLab/CImg/commit/4ca26bce4d8c61fcd1507d5f9401b9fb1222c27d
[1] https://security-tracker.debian.org/tracker/CVE-2026-42146
    https://www.cve.org/CVERecord?id=CVE-2026-42146
    https://github.com/GreycLab/CImg/security/advisories/GHSA-g54r-qmgx-c6fv
    
https://github.com/GreycLab/CImg/commit/c3aacf5b96ac1e54b7af1957c6737dbf3949f6d3

Regards,
Salvatore

Reply via email to