Package: imagemagick / 8:6.9.11.60+dfsg-1.6+deb12u4
Metadata
| Package | Version | Patches format | 
|---|---|---|
| imagemagick | 8:6.9.11.60+dfsg-1.6+deb12u4 | 3.0 (quilt) | 
Patch series
view the series file| Patch | File delta | Description | 
|---|---|---|
| 0001 Fix br tag.patch | (download) | 
              www/api/Image++.html |
                  268 	134 +	134 -	0 !  | 
           fix br tag
find . -path './.git' -prune -o -type 'f' -name '*.html' -exec sed -i 's,<br>,<br />,g' {} \;
           | 
        
| 0002 Fix api Image .html.patch | (download) | 
              www/api/Image++.html |
                   17 	8 +	9 -	0 !  | 
          fix api/image++.html  | 
        
| 0003 Fix www api mophologie.html.patch | (download) | 
              www/api/morphology.html |
                    8 	4 +	4 -	0 !  | 
          fix www/api/mophologie.html  | 
        
| 0004 Fix www command line options.html.patch | (download) | 
              www/command-line-options.html |
                  721 	720 +	1 -	0 !  | 
          fix www/command-line-options.html  | 
        
| 0005 Use modern idiom for autoconf.patch | (download) | 
              configure.ac |
                   11 	5 +	6 -	0 !  | 
          use modern idiom for autoconf  | 
        
| 0006 Allow distribution to custumize the html pointer to .patch | (download) | 
              configure.ac |
                   12 	12 +	0 -	0 !  | 
          allow distribution to custumize the html pointer to documentation Allow to say on debian system you might install the imagemagick-doc package  | 
        
| 0007 Improve policy in order to be safer.patch | (download) | 
              config/policy.xml |
                   26 	18 +	8 -	0 !  | 
          improve policy in order to be safer Limit memory and disk to safe value. Disable http delegate. You should really use curl  | 
        
| 0008 Fix remaining error in html files.patch | (download) | 
              www/changelog.html |
                   15 	8 +	7 -	0 !  | 
          fix remaining error in html files  | 
        
| 0009 Improve man page to use version information and quan.patch | (download) | 
              configure.ac |
                    5 	4 +	1 -	0 !  | 
          improve man page to use version information and quantum Use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,$1(1),$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@(1),g" *.in' sedtest use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,fB$1,fB$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,.TH $1,.TH $1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest  | 
        
| 0010 Fix changelog tag mismatch.patch | (download) | 
              www/changelog.html |
                    2 	1 +	1 -	0 !  | 
          fix changelog tag mismatch  | 
        
| 0011 Fix html error in api Image .html.patch | (download) | 
              www/api/Image++.html |
                   14 	6 +	8 -	0 !  | 
          fix html error in api/image++.html  | 
        
| 0012 Fix www escape.html.patch | (download) | 
              www/escape.html |
                    1 	1 +	0 -	0 !  | 
          fix www/escape.html  | 
        
| 0013 Fix www magick script.html.patch | (download) | 
              www/magick-script.html |
                    1 	1 +	0 -	0 !  | 
          fix www/magick-script.html  | 
        
| 0014 Fix www support.html.patch | (download) | 
              www/support.html |
                    1 	1 +	0 -	0 !  | 
          fix www/support.html  | 
        
| 0015 Fix instead of lt and input form.patch | (download) | 
              index.html |
                    8 	4 +	4 -	0 !  | 
          fix < instead of < and input form  | 
        
| 0016 Fix another errors in html files.patch | (download) | 
              www/api.html |
                  224 	224 +	0 -	0 !  | 
          fix another errors in html files  | 
        
| 0017 Fix index.html.patch | (download) | 
              www/index.html |
                    8 	4 +	4 -	0 !  | 
          fix index.html  | 
        
| 0018 Fix end tags.patch | (download) | 
              www/advanced-windows-installation.html |
                    2 	1 +	1 -	0 !  | 
          fix end tags  | 
        
| 0019 Fix a few html error.patch | (download) | 
              www/binary-releases.html |
                    1 	0 +	1 -	0 !  | 
          fix a few html error  | 
        
| 0020 Fix a typo in manpage.patch | (download) | 
              utilities/animate.1.in |
                    2 	1 +	1 -	0 !  | 
          fix a typo in manpage debian-bug: 953279  | 
        
| 0021 Finalize fixing error in html.patch | (download) | 
              index.html |
                    6 	3 +	3 -	0 !  | 
          finalize fixing error in html  | 
        
| 0022 FIx error in new upstream html.patch | (download) | 
              www/api/magick++-classes.html |
                    2 	1 +	1 -	0 !  | 
          fix error in new upstream html  | 
        
| 0001 https github.com ImageMagick ImageMagick6 issues 145.patch | (download) | 
              magick/annotate.c |
                    9 	9 +	0 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick6/issues/145  | 
        
| 0023 disable ghostscript formats.patch | (download) | 
              config/policy.xml |
                    7 	7 +	0 -	0 !  | 
          disable ghostscript handled formats based on -safer insecurity Based on Tavis Ormandy's Recommendations updated: 2019-11-11  | 
        
| move profile property to cli option.patch | (download) | 
              magick/property.c |
                   20 	0 +	20 -	0 !  | 
          [patch] move `-set profile` handler to cli  | 
        
| CVE 2021 20241.patch | (download) | 
              coders/jp2.c |
                    4 	2 +	2 -	0 !  | 
          [patch] fix division by zero in writejp2image() in coders/jp2.c  | 
        
| CVE 2021 20243.patch | (download) | 
              magick/resize.c |
                    2 	1 +	1 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/pull/3177  | 
        
| CVE 2021 20244.patch | (download) | 
              magick/visual-effects.c |
                    8 	4 +	4 -	0 !  | 
          [patch] uses the perceptiblereciprocal() to prevent the divide-by-zero from occurring (#3194) Co-authored-by: Zhang Xiaohui <ruc_zhangxiaohui@163.com> (cherry picked from commit 329dd528ab79531d884c0ba131e97d43f872ab5d) This backports the fix for CVE-2021-20244 to IM6.  | 
        
| CVE 2021 20245.patch | (download) | 
              coders/webp.c |
                    3 	2 +	1 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/issues/3176  | 
        
| CVE 2021 20246.patch | (download) | 
              magick/resample.c |
                    4 	2 +	2 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/issues/3195  | 
        
| CVE 2021 20309.patch | (download) | 
              magick/visual-effects.c |
                    2 	1 +	1 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/issues/3296  | 
        
| CVE 2021 20312_20313.patch | (download) | 
              coders/thumbnail.c |
                    3 	2 +	1 -	0 !  | 
          [patch] possible divide by zero + clear buffers  | 
        
| CVE 2021 3574.patch | (download) | 
              coders/tiff.c |
                   10 	5 +	5 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/issues/3540  | 
        
| CVE 2021 39212.patch | (download) | 
              magick/module.c |
                    2 	1 +	1 -	0 !  | 
          [patch] use the correct rights.  | 
        
| CVE 2021 4219.patch | (download) | 
              magick/draw.c |
                    2 	1 +	1 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/issues/4626  | 
        
| CVE 2022 1114.patch | (download) | 
              coders/dcm.c |
                   14 	7 +	7 -	0 !  | 
          [patch] coders: https://github.com/ImageMagick/ImageMagick/issues/4947  | 
        
| CVE 2022 28463.patch | (download) | 
              coders/cin.c |
                    2 	2 +	0 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/issues/4988  | 
        
| CVE 2022 32545.patch | (download) | 
              coders/emf.c |
                    3 	2 +	1 -	0 !  | 
          [patch] pull request: https://github.com/ImageMagick/ImageMagick/pull/4963  | 
        
| CVE 2022 32546.patch | (download) | 
              coders/pcl.c |
                    4 	2 +	2 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/pull/4986  | 
        
| CVE 2022 32547.patch | (download) | 
              magick/property.c |
                    6 	4 +	2 -	0 !  | 
          [patch] https://github.com/imagemagick/imagemagick/pull/5034  | 
        
| 0041 1 2 CVE 2021 3610 eliminate heap buffer overflow vul.patch | (download) | 
              coders/tiff.c |
                    2 	1 +	1 -	0 !  | 
          [1/2] cve-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group bug: https://github.com/ImageMagick/ImageMagick6/issues/244  | 
        
| 0042 2 2 CVE 2021 3610 eliminate heap buffer overflow vul.patch | (download) | 
              coders/tiff.c |
                    2 	1 +	1 -	0 !  | 
          [2/2] cve-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder Thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group bug: https://github.com/ImageMagick/ImageMagick6/issues/244  | 
        
| 0043 heap based buffer overflow in TIFF coder alert from .patch | (download) | 
              coders/tiff.c |
                    9 	7 +	2 -	0 !  | 
          heap-based buffer overflow in tiff coder (alert from hunter Mitchell)  | 
        
| 0044 heap based buffer overflow in TIFF coder alert from .patch | (download) | 
              coders/tiff.c |
                    4 	2 +	2 -	0 !  | 
          heap-based buffer overflow in tiff coder (alert from hunter Mitchell)  | 
        
| 0045 heap based buffer overflow in TIFF coder alert from .patch | (download) | 
              coders/tiff.c |
                    7 	1 +	6 -	0 !  | 
          heap-based buffer overflow in tiff coder (alert from hunter Mitchell) bug: https://github.com/ImageMagick/ImageMagick6/issues/245  | 
        
| 0046 Fix a non initialized value passed to TIFFGetField.patch | (download) | 
              coders/tiff.c |
                    1 	1 +	0 -	0 !  | 
          fix a non initialized value passed to tiffgetfield() bug-oss-fuzz: https://oss-fuzz.com/testcase-detail/6502669439598592 bug: https://github.com/ImageMagick/ImageMagick6/issues/246  | 
        
| 0047 initialize buffer before calling TIFFGetField.patch | (download) | 
              coders/tiff.c |
                   16 	7 +	9 -	0 !  | 
          initialize buffer before calling tiffgetfield() bug-oss-fuzz: https://oss-fuzz.com/testcase-detail/6502669439598592 bug: https://github.com/ImageMagick/ImageMagick6/issues/246  | 
        
| 0048 Fix stack overflow when parsing malicious tiff image.patch | (download) | 
              coders/tiff.c |
                    5 	5 +	0 -	0 !  | 
          fix stack overflow when parsing malicious tiff image (cherry picked from commit 85a370c79afeb45a97842b0959366af5236e9023)  | 
        
| 0049 early exit on exception.patch | (download) | 
              coders/tiff.c |
                   44 	33 +	11 -	0 !  | 
          early exit on exception In case of malformed tiff image bail early  | 
        
| 0050 Fix buffer overrun in TIFF coder.patch | (download) | 
              coders/tiff.c |
                    2 	1 +	1 -	0 !  | 
          fix buffer overrun in tiff coder  | 
        
| 0051 Fix buffer overrun in TIFF coder.patch | (download) | 
              coders/tiff.c |
                    2 	1 +	1 -	0 !  | 
          fix buffer overrun in tiff coder  | 
        
| 0052 Fix buffer overrun in TIFF coder.patch | (download) | 
              coders/tiff.c |
                    2 	1 +	1 -	0 !  | 
          fix buffer overrun in tiff coder bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42549  | 
        
| 0053 Fix unintialised value.patch | (download) | 
              coders/tiff.c |
                   35 	16 +	19 -	0 !  | 
          fix unintialised value bug: https://github.com/ImageMagick/ImageMagick/issues/4830  | 
        
| 0054 Raise exception when image could not be read but no .patch | (download) | 
              coders/tiff.c |
                    2 	2 +	0 -	0 !  | 
          raise exception when image could not be read but no exception was raised. Bail out in case of corrupted image https://github.com/ImageMagick/ImageMagick6/commit/3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b (cherry picked from commit 3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b)  | 
        
| 0055 CVE 2022 1115 heap based overflow with a specially c.patch | (download) | 
              coders/tiff.c |
                    2 	1 +	1 -	0 !  | 
          cve-2022-1115: heap based overflow with a specially crafted tiff image bug: https://github.com/ImageMagick/ImageMagick/issues/4974  | 
        
| 0056 CVE 2023 1289 recursion detection framework.patch | (download) | 
              magick/constitute.c |
                   12 	12 +	0 -	0 !  | 
          cve-2023-1289: recursion detection framework  | 
        
| 0057 CVE 2023 1289 recursion detection.patch | (download) | 
              magick/draw.c |
                    1 	1 +	0 -	0 !  | 
          cve-2023-1289 recursion detection  | 
        
| 0058 CVE 2023 1906.patch | (download) | 
              coders/tiff.c |
                   11 	4 +	7 -	0 !  | 
          cve-2023-1906 A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.  | 
        
| 0059 1 2 Prepare CVE 2023 34151 improved range checking.patch | (download) | 
              magick/image-private.h |
                   20 	20 +	0 -	0 !  | 
          [1/2] prepare cve-2023-34151 :improved range checking  | 
        
| 0060 2 2 Prepare CVE 2023 34151 add additional checks for.patch | (download) | 
              magick/image-private.h |
                    3 	3 +	0 -	0 !  | 
          [2/2] prepare cve-2023-34151: add additional checks for casting double to size_t  | 
        
