Package: imagemagick / 8:6.9.11.60+dfsg-1.3+deb11u4
Metadata
| Package | Version | Patches format |
|---|---|---|
| imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 0001 Fix br tag.patch | (download) |
www/api/Image++.html |
268 134 + 134 - 0 ! |
fix br tag
find . -path './.git' -prune -o -type 'f' -name '*.html' -exec sed -i 's,<br>,<br />,g' {} \;
|
| 0002 Fix api Image .html.patch | (download) |
www/api/Image++.html |
17 8 + 9 - 0 ! |
fix api/image++.html |
| 0003 Fix www api mophologie.html.patch | (download) |
www/api/morphology.html |
8 4 + 4 - 0 ! |
fix www/api/mophologie.html |
| 0004 Fix www command line options.html.patch | (download) |
www/command-line-options.html |
721 720 + 1 - 0 ! |
fix www/command-line-options.html |
| 0005 Use modern idiom for autoconf.patch | (download) |
configure.ac |
11 5 + 6 - 0 ! |
use modern idiom for autoconf |
| 0006 Allow distribution to custumize the html pointer to .patch | (download) |
configure.ac |
12 12 + 0 - 0 ! |
allow distribution to custumize the html pointer to documentation Allow to say on debian system you might install the imagemagick-doc package |
| 0007 Improve policy in order to be safer.patch | (download) |
config/policy.xml |
26 18 + 8 - 0 ! |
improve policy in order to be safer Limit memory and disk to safe value. Disable http delegate. You should really use curl |
| 0008 Fix remaining error in html files.patch | (download) |
www/changelog.html |
15 8 + 7 - 0 ! |
fix remaining error in html files |
| 0009 Improve man page to use version information and quan.patch | (download) |
configure.ac |
5 4 + 1 - 0 ! |
improve man page to use version information and quantum Use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,$1(1),$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@(1),g" *.in' sedtest use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,fB$1,fB$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,.TH $1,.TH $1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest |
| 0010 Fix changelog tag mismatch.patch | (download) |
www/changelog.html |
2 1 + 1 - 0 ! |
fix changelog tag mismatch |
| 0011 Fix html error in api Image .html.patch | (download) |
www/api/Image++.html |
14 6 + 8 - 0 ! |
fix html error in api/image++.html |
| 0012 Fix www escape.html.patch | (download) |
www/escape.html |
1 1 + 0 - 0 ! |
fix www/escape.html |
| 0013 Fix www magick script.html.patch | (download) |
www/magick-script.html |
1 1 + 0 - 0 ! |
fix www/magick-script.html |
| 0014 Fix www support.html.patch | (download) |
www/support.html |
1 1 + 0 - 0 ! |
fix www/support.html |
| 0015 Fix instead of lt and input form.patch | (download) |
index.html |
8 4 + 4 - 0 ! |
fix < instead of < and input form |
| 0016 Fix another errors in html files.patch | (download) |
www/api.html |
224 224 + 0 - 0 ! |
fix another errors in html files |
| 0017 Fix index.html.patch | (download) |
www/index.html |
8 4 + 4 - 0 ! |
fix index.html |
| 0018 Fix end tags.patch | (download) |
www/advanced-windows-installation.html |
2 1 + 1 - 0 ! |
fix end tags |
| 0019 Fix a few html error.patch | (download) |
www/binary-releases.html |
1 0 + 1 - 0 ! |
fix a few html error |
| 0020 Fix a typo in manpage.patch | (download) |
utilities/animate.1.in |
2 1 + 1 - 0 ! |
fix a typo in manpage debian-bug: 953279 |
| 0021 Finalize fixing error in html.patch | (download) |
index.html |
6 3 + 3 - 0 ! |
finalize fixing error in html |
| 0022 FIx error in new upstream html.patch | (download) |
www/api/magick++-classes.html |
2 1 + 1 - 0 ! |
fix error in new upstream html |
| 0001 https github.com ImageMagick ImageMagick6 issues 145.patch | (download) |
magick/annotate.c |
9 9 + 0 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick6/issues/145 |
| 0023 disable ghostscript formats.patch | (download) |
config/policy.xml |
7 7 + 0 - 0 ! |
disable ghostscript handled formats based on -safer insecurity Based on Tavis Ormandy's Recommendations updated: 2019-11-11 |
| move profile property to cli option.patch | (download) |
magick/property.c |
20 0 + 20 - 0 ! |
[patch] move `-set profile` handler to cli |
| 0026 CVE 2021 3574 memory leak.patch | (download) |
coders/tiff.c |
10 5 + 5 - 0 ! |
cve-2021-3574: memory leak Memory leak due to crafted tiff file bug: https://github.com/ImageMagick/ImageMagick/issues/3540 |
| 0027 CVE 2021 4219 Dos.patch | (download) |
magick/draw.c |
4 3 + 1 - 0 ! |
cve-2021-4219: dos bug: https://github.com/ImageMagick/ImageMagick/issues/4626 bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023282 |
| 0028 CVE 2021 20241.patch | (download) |
coders/jp2.c |
4 2 + 2 - 0 ! |
cve-2021-20241: fix division by zero in WriteJP2Image() in coders/jp2.c |
| 0029 CVE 2021 20243.patch | (download) |
magick/resize.c |
2 1 + 1 - 0 ! |
cve-2021-20243 bug: https://github.com/ImageMagick/ImageMagick/pull/3177 |
| 0030 CVE 2021 20244 uses the PerceptibleReciprocal to pre.patch | (download) |
magick/visual-effects.c |
8 4 + 4 - 0 ! |
cve-2021-20244: uses the perceptiblereciprocal() to prevent the divide-by-zero from occurring (#3194) A crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero |
| 0031 CVE 2021 20245 Division by zero in WriteAnimatedWEBP.patch | (download) |
coders/webp.c |
3 2 + 1 - 0 ! |
cve-2021-20245 division by zero in writeanimatedwebpimage() in coders/webp.c bug: https://github.com/ImageMagick/ImageMagick/issues/3176 |
| 0032 CVE 2021 20246 division by zero in MagickCore resamp.patch | (download) |
magick/resample.c |
4 2 + 2 - 0 ! |
cve-2021-20246: division by zero in magickcore/resample.c bug:https://github.com/ImageMagick/ImageMagick/issues/3195 |
| 0033 CVE 2021 20309 Division by zero in WaveImage.patch | (download) |
magick/visual-effects.c |
2 1 + 1 - 0 ! |
cve-2021-20309: division by zero in waveimage() bug: https://github.com/ImageMagick/ImageMagick/issues/3296 |
| 0034 partial CVE 2021 39212 Fixed incorrect check when mo.patch | (download) |
magick/module.c |
10 5 + 5 - 0 ! |
[partial] cve-2021-39212: fixed incorrect check when module is used as the domain in policy.xml that would allow the use of a disabled module. |
| 0035 partial CVE 2021 39212 Added missing policy checks i.patch | (download) |
magick/static.c |
5 4 + 1 - 0 ! |
[partial] cve-2021-39212: added missing policy checks in RegisterStaticModules. |
| 0036 partial CVE 2021 39212 Use AllPolicyRights instead.patch | (download) |
magick/module.c |
2 1 + 1 - 0 ! |
[partial] cve-2021-39212: use allpolicyrights instead. (cherry picked from commit b60e17133b982d28816386b83174c2bc06dd39bd) |
| 0037 CVE 2021 39212 Use the correct rights.patch | (download) |
magick/module.c |
2 1 + 1 - 0 ! |
cve-2021-39212: use the correct rights. (cherry picked from commit 428e68597fa904d0bdc133d878e12acd7dc60fa3) |
| 0038 Fix CVE 2022 1114 Heap use after free in RelinquishD.patch | (download) |
coders/dcm.c |
14 7 + 7 - 0 ! |
fix cve-2022-1114: heap use after free in relinquishdcminfo() bug: https://github.com/ImageMagick/ImageMagick/issues/4947 bug-debian: https://bugs.debian.org/1013282 |
| 0039 CVE 2022 28463 buffer overflow in cin coder.patch | (download) |
coders/cin.c |
2 2 + 0 - 0 ! |
cve-2022-28463: buffer overflow in cin coder bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013282 bug: https://github.com/ImageMagick/ImageMagick/issues/4988 |
| 0040 CVE 2022 32545 undefined behavior value outside char.patch | (download) |
coders/emf.c |
3 2 + 1 - 0 ! |
cve-2022-32545: undefined behavior value outside char range bug: https://github.com/ImageMagick/ImageMagick/pull/4963 bug-redhat: https://bugzilla.redhat.com/show_bug.cgi?id=2091811 bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016442 |
| 0041 CVE 2022 32546 outside the range of representable va.patch | (download) |
coders/pcl.c |
4 2 + 2 - 0 ! |
cve-2022-32546 outside the range of representable values of type 'unsigned long' at coders/pcl.c, bug: https://github.com/ImageMagick/ImageMagick/pull/4986 bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016442 |
| 0042 Fix CVE 2022 32547 unaligned access in property.patch | (download) |
magick/property.c |
6 4 + 2 - 0 ! |
fix cve-2022-32547: unaligned access in property bug: https://github.com/ImageMagick/ImageMagick/pull/5034 bug-debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016442 |
| 0043 1 2 CVE 2021 3610 eliminate heap buffer overflow vul.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
[1/2] cve-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group bug: https://github.com/ImageMagick/ImageMagick6/issues/244 |
| 0044 2 2 CVE 2021 3610 eliminate heap buffer overflow vul.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
[2/2] cve-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder Thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group bug: https://github.com/ImageMagick/ImageMagick6/issues/244 |
| 0045 heap based buffer overflow in TIFF coder alert from .patch | (download) |
coders/tiff.c |
9 7 + 2 - 0 ! |
heap-based buffer overflow in tiff coder (alert from hunter Mitchell) |
| 0046 heap based buffer overflow in TIFF coder alert from .patch | (download) |
coders/tiff.c |
4 2 + 2 - 0 ! |
heap-based buffer overflow in tiff coder (alert from hunter Mitchell) |
| 0047 heap based buffer overflow in TIFF coder alert from .patch | (download) |
coders/tiff.c |
7 1 + 6 - 0 ! |
heap-based buffer overflow in tiff coder (alert from hunter Mitchell) bug: https://github.com/ImageMagick/ImageMagick6/issues/245 |
| 0048 Fix a non initialized value passed to TIFFGetField.patch | (download) |
coders/tiff.c |
1 1 + 0 - 0 ! |
fix a non initialized value passed to tiffgetfield() bug-oss-fuzz: https://oss-fuzz.com/testcase-detail/6502669439598592 bug: https://github.com/ImageMagick/ImageMagick6/issues/246 |
| 0049 initialize buffer before calling TIFFGetField.patch | (download) |
coders/tiff.c |
16 7 + 9 - 0 ! |
initialize buffer before calling tiffgetfield() bug-oss-fuzz: https://oss-fuzz.com/testcase-detail/6502669439598592 bug: https://github.com/ImageMagick/ImageMagick6/issues/246 |
| 0050 Fix stack overflow when parsing malicious tiff image.patch | (download) |
coders/tiff.c |
5 5 + 0 - 0 ! |
fix stack overflow when parsing malicious tiff image (cherry picked from commit 85a370c79afeb45a97842b0959366af5236e9023) |
| 0051 early exit on exception.patch | (download) |
coders/tiff.c |
44 33 + 11 - 0 ! |
early exit on exception In case of malformed tiff image bail early |
| 0052 Fix buffer overrun in TIFF coder.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
fix buffer overrun in tiff coder |
| 0053 Fix buffer overrun in TIFF coder.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
fix buffer overrun in tiff coder |
| 0054 Fix buffer overrun in TIFF coder.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
fix buffer overrun in tiff coder bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42549 |
| 0055 Fix unintialised value.patch | (download) |
coders/tiff.c |
35 16 + 19 - 0 ! |
fix unintialised value bug: https://github.com/ImageMagick/ImageMagick/issues/4830 |
| 0056 Raise exception when image could not be read but no .patch | (download) |
coders/tiff.c |
2 2 + 0 - 0 ! |
raise exception when image could not be read but no exception was raised. Bail out in case of corrupted image https://github.com/ImageMagick/ImageMagick6/commit/3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b (cherry picked from commit 3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b) |
| 0057 CVE 2022 1115 heap based overflow with a specially c.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
cve-2022-1115: heap based overflow with a specially crafted tiff image bug: https://github.com/ImageMagick/ImageMagick/issues/4974 |
| 0056 CVE 2023 1289 recursion detection framework.patch | (download) |
magick/constitute.c |
12 12 + 0 - 0 ! |
cve-2023-1289: recursion detection framework |
| 0057 CVE 2023 1289 recursion detection.patch | (download) |
magick/draw.c |
1 1 + 0 - 0 ! |
cve-2023-1289 recursion detection |
| 0058 CVE 2023 1906.patch | (download) |
coders/tiff.c |
11 4 + 7 - 0 ! |
cve-2023-1906 A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. |
