Package: imagemagick / 8:6.9.11.60+dfsg-1.6+deb12u3
Metadata
Package | Version | Patches format |
---|---|---|
imagemagick | 8:6.9.11.60+dfsg-1.6+deb12u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 Fix br tag.patch | (download) |
www/api/Image++.html |
268 134 + 134 - 0 ! |
fix br tag find . -path './.git' -prune -o -type 'f' -name '*.html' -exec sed -i 's,<br>,<br />,g' {} \; |
0002 Fix api Image .html.patch | (download) |
www/api/Image++.html |
17 8 + 9 - 0 ! |
fix api/image++.html |
0003 Fix www api mophologie.html.patch | (download) |
www/api/morphology.html |
8 4 + 4 - 0 ! |
fix www/api/mophologie.html |
0004 Fix www command line options.html.patch | (download) |
www/command-line-options.html |
721 720 + 1 - 0 ! |
fix www/command-line-options.html |
0005 Use modern idiom for autoconf.patch | (download) |
configure.ac |
11 5 + 6 - 0 ! |
use modern idiom for autoconf |
0006 Allow distribution to custumize the html pointer to .patch | (download) |
configure.ac |
12 12 + 0 - 0 ! |
allow distribution to custumize the html pointer to documentation Allow to say on debian system you might install the imagemagick-doc package |
0007 Improve policy in order to be safer.patch | (download) |
config/policy.xml |
26 18 + 8 - 0 ! |
improve policy in order to be safer Limit memory and disk to safe value. Disable http delegate. You should really use curl |
0008 Fix remaining error in html files.patch | (download) |
www/changelog.html |
15 8 + 7 - 0 ! |
fix remaining error in html files |
0009 Improve man page to use version information and quan.patch | (download) |
configure.ac |
5 4 + 1 - 0 ! |
improve man page to use version information and quantum Use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,$1(1),$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@(1),g" *.in' sedtest use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,fB$1,fB$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,.TH $1,.TH $1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest |
0010 Fix changelog tag mismatch.patch | (download) |
www/changelog.html |
2 1 + 1 - 0 ! |
fix changelog tag mismatch |
0011 Fix html error in api Image .html.patch | (download) |
www/api/Image++.html |
14 6 + 8 - 0 ! |
fix html error in api/image++.html |
0012 Fix www escape.html.patch | (download) |
www/escape.html |
1 1 + 0 - 0 ! |
fix www/escape.html |
0013 Fix www magick script.html.patch | (download) |
www/magick-script.html |
1 1 + 0 - 0 ! |
fix www/magick-script.html |
0014 Fix www support.html.patch | (download) |
www/support.html |
1 1 + 0 - 0 ! |
fix www/support.html |
0015 Fix instead of lt and input form.patch | (download) |
index.html |
8 4 + 4 - 0 ! |
fix < instead of < and input form |
0016 Fix another errors in html files.patch | (download) |
www/api.html |
224 224 + 0 - 0 ! |
fix another errors in html files |
0017 Fix index.html.patch | (download) |
www/index.html |
8 4 + 4 - 0 ! |
fix index.html |
0018 Fix end tags.patch | (download) |
www/advanced-windows-installation.html |
2 1 + 1 - 0 ! |
fix end tags |
0019 Fix a few html error.patch | (download) |
www/binary-releases.html |
1 0 + 1 - 0 ! |
fix a few html error |
0020 Fix a typo in manpage.patch | (download) |
utilities/animate.1.in |
2 1 + 1 - 0 ! |
fix a typo in manpage debian-bug: 953279 |
0021 Finalize fixing error in html.patch | (download) |
index.html |
6 3 + 3 - 0 ! |
finalize fixing error in html |
0022 FIx error in new upstream html.patch | (download) |
www/api/magick++-classes.html |
2 1 + 1 - 0 ! |
fix error in new upstream html |
0001 https github.com ImageMagick ImageMagick6 issues 145.patch | (download) |
magick/annotate.c |
9 9 + 0 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick6/issues/145 |
0023 disable ghostscript formats.patch | (download) |
config/policy.xml |
7 7 + 0 - 0 ! |
disable ghostscript handled formats based on -safer insecurity Based on Tavis Ormandy's Recommendations updated: 2019-11-11 |
move profile property to cli option.patch | (download) |
magick/property.c |
20 0 + 20 - 0 ! |
[patch] move `-set profile` handler to cli |
CVE 2021 20241.patch | (download) |
coders/jp2.c |
4 2 + 2 - 0 ! |
[patch] fix division by zero in writejp2image() in coders/jp2.c |
CVE 2021 20243.patch | (download) |
magick/resize.c |
2 1 + 1 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/pull/3177 |
CVE 2021 20244.patch | (download) |
magick/visual-effects.c |
8 4 + 4 - 0 ! |
[patch] uses the perceptiblereciprocal() to prevent the divide-by-zero from occurring (#3194) Co-authored-by: Zhang Xiaohui <ruc_zhangxiaohui@163.com> (cherry picked from commit 329dd528ab79531d884c0ba131e97d43f872ab5d) This backports the fix for CVE-2021-20244 to IM6. |
CVE 2021 20245.patch | (download) |
coders/webp.c |
3 2 + 1 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/issues/3176 |
CVE 2021 20246.patch | (download) |
magick/resample.c |
4 2 + 2 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/issues/3195 |
CVE 2021 20309.patch | (download) |
magick/visual-effects.c |
2 1 + 1 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/issues/3296 |
CVE 2021 20312_20313.patch | (download) |
coders/thumbnail.c |
3 2 + 1 - 0 ! |
[patch] possible divide by zero + clear buffers |
CVE 2021 3574.patch | (download) |
coders/tiff.c |
10 5 + 5 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/issues/3540 |
CVE 2021 39212.patch | (download) |
magick/module.c |
2 1 + 1 - 0 ! |
[patch] use the correct rights. |
CVE 2021 4219.patch | (download) |
magick/draw.c |
2 1 + 1 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/issues/4626 |
CVE 2022 1114.patch | (download) |
coders/dcm.c |
14 7 + 7 - 0 ! |
[patch] coders: https://github.com/ImageMagick/ImageMagick/issues/4947 |
CVE 2022 28463.patch | (download) |
coders/cin.c |
2 2 + 0 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/issues/4988 |
CVE 2022 32545.patch | (download) |
coders/emf.c |
3 2 + 1 - 0 ! |
[patch] pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 |
CVE 2022 32546.patch | (download) |
coders/pcl.c |
4 2 + 2 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/pull/4986 |
CVE 2022 32547.patch | (download) |
magick/property.c |
6 4 + 2 - 0 ! |
[patch] https://github.com/imagemagick/imagemagick/pull/5034 |
0041 1 2 CVE 2021 3610 eliminate heap buffer overflow vul.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
[1/2] cve-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group bug: https://github.com/ImageMagick/ImageMagick6/issues/244 |
0042 2 2 CVE 2021 3610 eliminate heap buffer overflow vul.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
[2/2] cve-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder Thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group bug: https://github.com/ImageMagick/ImageMagick6/issues/244 |
0043 heap based buffer overflow in TIFF coder alert from .patch | (download) |
coders/tiff.c |
9 7 + 2 - 0 ! |
heap-based buffer overflow in tiff coder (alert from hunter Mitchell) |
0044 heap based buffer overflow in TIFF coder alert from .patch | (download) |
coders/tiff.c |
4 2 + 2 - 0 ! |
heap-based buffer overflow in tiff coder (alert from hunter Mitchell) |
0045 heap based buffer overflow in TIFF coder alert from .patch | (download) |
coders/tiff.c |
7 1 + 6 - 0 ! |
heap-based buffer overflow in tiff coder (alert from hunter Mitchell) bug: https://github.com/ImageMagick/ImageMagick6/issues/245 |
0046 Fix a non initialized value passed to TIFFGetField.patch | (download) |
coders/tiff.c |
1 1 + 0 - 0 ! |
fix a non initialized value passed to tiffgetfield() bug-oss-fuzz: https://oss-fuzz.com/testcase-detail/6502669439598592 bug: https://github.com/ImageMagick/ImageMagick6/issues/246 |
0047 initialize buffer before calling TIFFGetField.patch | (download) |
coders/tiff.c |
16 7 + 9 - 0 ! |
initialize buffer before calling tiffgetfield() bug-oss-fuzz: https://oss-fuzz.com/testcase-detail/6502669439598592 bug: https://github.com/ImageMagick/ImageMagick6/issues/246 |
0048 Fix stack overflow when parsing malicious tiff image.patch | (download) |
coders/tiff.c |
5 5 + 0 - 0 ! |
fix stack overflow when parsing malicious tiff image (cherry picked from commit 85a370c79afeb45a97842b0959366af5236e9023) |
0049 early exit on exception.patch | (download) |
coders/tiff.c |
44 33 + 11 - 0 ! |
early exit on exception In case of malformed tiff image bail early |
0050 Fix buffer overrun in TIFF coder.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
fix buffer overrun in tiff coder |
0051 Fix buffer overrun in TIFF coder.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
fix buffer overrun in tiff coder |
0052 Fix buffer overrun in TIFF coder.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
fix buffer overrun in tiff coder bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42549 |
0053 Fix unintialised value.patch | (download) |
coders/tiff.c |
35 16 + 19 - 0 ! |
fix unintialised value bug: https://github.com/ImageMagick/ImageMagick/issues/4830 |
0054 Raise exception when image could not be read but no .patch | (download) |
coders/tiff.c |
2 2 + 0 - 0 ! |
raise exception when image could not be read but no exception was raised. Bail out in case of corrupted image https://github.com/ImageMagick/ImageMagick6/commit/3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b (cherry picked from commit 3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b) |
0055 CVE 2022 1115 heap based overflow with a specially c.patch | (download) |
coders/tiff.c |
2 1 + 1 - 0 ! |
cve-2022-1115: heap based overflow with a specially crafted tiff image bug: https://github.com/ImageMagick/ImageMagick/issues/4974 |
0056 CVE 2023 1289 recursion detection framework.patch | (download) |
magick/constitute.c |
12 12 + 0 - 0 ! |
cve-2023-1289: recursion detection framework |
0057 CVE 2023 1289 recursion detection.patch | (download) |
magick/draw.c |
1 1 + 0 - 0 ! |
cve-2023-1289 recursion detection |
0058 CVE 2023 1906.patch | (download) |
coders/tiff.c |
11 4 + 7 - 0 ! |
cve-2023-1906 A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. |
0059 1 2 Prepare CVE 2023 34151 improved range checking.patch | (download) |
magick/image-private.h |
20 20 + 0 - 0 ! |
[1/2] prepare cve-2023-34151 :improved range checking |
0060 2 2 Prepare CVE 2023 34151 add additional checks for.patch | (download) |
magick/image-private.h |
3 3 + 0 - 0 ! |
[2/2] prepare cve-2023-34151: add additional checks for casting double to size_t |