CVE-2025-53619

NameCVE-2025-53619
DescriptionAn out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gdcm (PTS)bullseye3.0.8-2vulnerable
bookworm3.0.21-1vulnerable
trixie3.0.24-5vulnerable
forky, sid3.0.24-7vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gdcmsource(unstable)(unfixed)

Notes

[trixie] - gdcm <no-dsa> (Minor issue)
[bookworm] - gdcm <no-dsa> (Minor issue)
https://talosintelligence.com/vulnerability_reports/TALOS-2025-2210

Search for package or bug name: Reporting problems