DEBIAN-CVE-2024-53901

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-53901
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-53901.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-53901
Upstream
Published
2024-11-24T17:15:04Z
Modified
2025-09-19T06:10:02Z
Summary
[none]
Details

The Imager package before 1.025 for Perl has a heap-based buffer overflow leading to denial of service, or possibly unspecified other impact, when the trim() method is called on a crafted input image.

References

Affected packages

Debian:13 / libimager-perl

Package

Name
libimager-perl
Purl
pkg:deb/debian/libimager-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.025+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libimager-perl

Package

Name
libimager-perl
Purl
pkg:deb/debian/libimager-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.025+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}