Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.4
ImageMagick: Out-of-bounds memory read when processing certain image files
DEBIAN-CVE-2026-27799
Summary
A bug in ImageMagick's handling of a specific type of image file could allow an attacker to access unauthorized data. This could potentially lead to security issues if an attacker can trick a system into processing a malicious image file. To fix this, upgrade to version 7.1.2-16 or 6.9.13-41 or later.
What to do
- Update debian imagemagick to version 8:7.1.1.43+dfsg1-1+deb13u6.
- Update debian imagemagick to version 8:7.1.2.15+dfsg1-1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| debian | imagemagick | All versions | – |
| debian | imagemagick | All versions | – |
| debian | imagemagick | <= 8:7.1.1.43+dfsg1-1+deb13u6 | 8:7.1.1.43+dfsg1-1+deb13u6 |
| debian | imagemagick | <= 8:7.1.2.15+dfsg1-1 | 8:7.1.2.15+dfsg1-1 |
Original title
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU ima...
Original description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
osv CVSS3.1
4.4
- https://security-tracker.debian.org/tracker/CVE-2026-27799 Vendor Advisory
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026