-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4429-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
December 31, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : imagemagick
Version : 8:6.9.11.60+dfsg-1.3+deb11u8
CVE ID : CVE-2025-65955 CVE-2025-66628 CVE-2025-68469 CVE-2025-68618
CVE-2025-68950 CVE-2025-69204
Debian Bug : 1122584 1122827
Multiple vulnerabilities were fixed in imagemagick a popular image
processing suite.
CVE-2025-65955
A vulnerability was found in ImageMagickâs Magick++ layer that
manifests when Options::fontFamily is invoked with an empty
string. Clearing a font family calls RelinquishMagickMemory on
_drawInfo->font, freeing the font string but leaving _drawInfo->font
pointing to freed memory while _drawInfo->family is set to that
(now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font
re-frees or dereferences dangling memory. DestroyDrawInfo and other
setters (Options::font, Image::font) assume _drawInfo->font remains
valid, so destruction or subsequent updates trigger crashes or heap
corruption
CVE-2025-66628
The TIM (PSX TIM) image parser contains a critical integer overflow
vulnerability in its ReadTIMImage function (coders/tim.c). The code
reads width and height (16-bit values) from the file header and
calculates image_size = 2 * width * height without checking for
overflow. On 32-bit systems (or where size_t is 32-bit), this
calculation can overflow if width and height are large (e.g., 65535),
wrapping around to a small value
CVE-2025-68469
ImageMagick crashes when processing a crafted TIFF file
CVE-2025-68618
Magick's failure to limit the depth of SVG file reads caused
a DoS attack.
CVE-2025-68950
Magick's failure to limit MVG mutual references forming a loop
CVE-2025-69204
Converting a malicious MVG file to SVG caused an integer overflow.
For Debian 11 bullseye, these problems have been fixed in version
8:6.9.11.60+dfsg-1.3+deb11u8.
We recommend that you upgrade your imagemagick packages.
For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=D5O6
-----END PGP SIGNATURE-----