A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows.
AddressSanitizer:DEADLYSIGNAL
=================================================================
==143838==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000
#0 0x7f379d5adb53 (/lib/x86_64-linux-gnu/libc.so.6+0xc4b53)
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-12T14:01:54Z",
"nvd_published_at": "2026-02-24T02:16:01Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-190"
]
}