Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/imagemagick@8:7.1.2.8%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/imagemagick@8:7.1.2.8%2Bdfsg1-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-vkp6-wh22-eqap ImageMagick CLAHE : Unsigned underflow and division-by-zero lead to OOB pointer arithmetic and process crash (DoS) A single root cause in the CLAHE implementation — tile width/height becoming zero — produces two distinct but related unsafe behaviors. Vulnerabilities exists in the `CLAHEImage()` function of ImageMagick’s `MagickCore/enhance.c`. 1. Unsigned integer underflow → out-of-bounds pointer arithmetic (OOB): when `tile_info.height == 0`, the expression `tile_info.height - 1` (unsigned) wraps to a very large value; using that value in pointer arithmetic yields a huge offset and OOB memory access (leading to memory corruption, SIGSEGV, or resource exhaustion). 2. **Division/modulus by zero**: where code performs `... / tile_info.width` or `... % tile_info.height` without re-checking for zero, causing immediate division-by-zero crashes under sanitizers or `abort` at runtime. Both behaviors are triggered by the same invalid tile condition (e.g., CLI exact `-clahe 0x0!` or automatic tile derivation `dim >> 3 == 0` for very small images). --- CVE-2025-62594
GHSA-wpp4-vqfq-v4hp

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:45:31.805000+00:00 Debian Importer Fixing VCID-vkp6-wh22-eqap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:01:05.368495+00:00 Debian Importer Fixing VCID-vkp6-wh22-eqap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:23.947579+00:00 Debian Importer Fixing VCID-vkp6-wh22-eqap https://security-tracker.debian.org/tracker/data/json 38.1.0