Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.4

ImageMagick: Out-of-bounds memory read when processing certain image files

DEBIAN-CVE-2026-27799
Summary

A bug in ImageMagick's handling of a specific type of image file could allow an attacker to access unauthorized data. This could potentially lead to security issues if an attacker can trick a system into processing a malicious image file. To fix this, upgrade to version 7.1.2-16 or 6.9.13-41 or later.

What to do
  • Update debian imagemagick to version 8:7.1.1.43+dfsg1-1+deb13u6.
  • Update debian imagemagick to version 8:7.1.2.15+dfsg1-1.
Affected software
VendorProductAffected versionsFix available
debian imagemagick All versions
debian imagemagick All versions
debian imagemagick <= 8:7.1.1.43+dfsg1-1+deb13u6 8:7.1.1.43+dfsg1-1+deb13u6
debian imagemagick <= 8:7.1.2.15+dfsg1-1 8:7.1.2.15+dfsg1-1
Original title
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU ima...
Original description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
osv CVSS3.1 4.4
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026