Debian Patches

Status for imagemagick/8:6.9.11.60+dfsg-1.6+deb12u1

Patch Description Author Forwarded Bugs Origin Last update
0001-Fix-br-tag.patch Fix br tag
find . -path './.git' -prune -o -type 'f' -name '*.html' -exec sed -i 's,<br>,<br />,g' {} \;
=?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2018-02-02
0002-Fix-api-Image-.html.patch Fix api/Image++.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2016-12-14
0003-Fix-www-api-mophologie.html.patch Fix www/api/mophologie.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2016-12-14
0004-Fix-www-command-line-options.html.patch Fix www/command-line-options.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2016-12-14
0005-Use-modern-idiom-for-autoconf.patch Use modern idiom for autoconf =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2015-09-15
0006-Allow-distribution-to-custumize-the-html-pointer-to-.patch Allow distribution to custumize the html pointer to documentation
Allow to say on debian system you might install the imagemagick-doc package
=?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid debian 2018-02-02
0007-Improve-policy-in-order-to-be-safer.patch Improve policy in order to be safer
Limit memory and disk to safe value.

Disable http delegate. You should really use curl
=?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> no 2016-11-22
0008-Fix-remaining-error-in-html-files.patch Fix remaining error in html files =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> no 2017-03-18
0009-Improve-man-page-to-use-version-information-and-quan.patch Improve man page to use version information and quantum
Use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,$1(1),$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@(1),g" *.in' sedtest
use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,fB$1,fB$1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest
use ls *.in |sed 's,[.]1.in,,g' |xargs -n1 sh -c 'sed -i "s,.TH $1,.TH $1-im@MAGICK_MAJOR_VERSION@.@MAGICK_ABI_SUFFIX_LC@,g" *.in' sedtest
=?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> no 2017-03-21
0010-Fix-changelog-tag-mismatch.patch Fix changelog tag mismatch =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> no 2017-06-04
0011-Fix-html-error-in-api-Image-.html.patch Fix html error in api/Image++.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2017-08-11
0012-Fix-www-escape.html.patch Fix www/escape.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2017-08-11
0013-Fix-www-magick-script.html.patch Fix www/magick-script.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2017-08-11
0014-Fix-www-support.html.patch Fix www/support.html =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2017-08-11
0015-Fix-instead-of-lt-and-input-form.patch Fix < instead of &lt; and input form =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2018-02-03
0016-Fix-another-errors-in-html-files.patch Fix another errors in html files =?UTF-8?q?Bastien=20ROUCARI=C3=88S?= <roucaries.bastien@gmail.com> invalid 2018-03-19
0017-Fix-index.html.patch Fix index.html =?UTF-8?q?Bastien=20Roucari=C3=A8s?= <rouca@debian.org> invalid 2018-07-30
0018-Fix-end-tags.patch Fix end tags =?UTF-8?q?Bastien=20Roucari=C3=A8s?= <rouca@debian.org> invalid 2018-07-30
0019-Fix-a-few-html-error.patch Fix a few html error =?UTF-8?q?Bastien=20Roucari=C3=A8s?= <rouca@debian.org> invalid 2020-07-26
0020-Fix-a-typo-in-manpage.patch Fix a typo in manpage =?UTF-8?q?Bastien=20Roucari=C3=A8s?= <rouca@debian.org> no 2020-07-27
0021-Finalize-fixing-error-in-html.patch Finalize fixing error in html =?UTF-8?q?Bastien=20Roucari=C3=A8s?= <rouca@debian.org> no 2021-01-11
0022-FIx-error-in-new-upstream-html.patch FIx error in new upstream html =?UTF-8?q?Bastien=20Roucari=C3=A8s?= <rouca@debian.org> invalid 2021-02-01
0001-https-github.com-ImageMagick-ImageMagick6-issues-145.patch [PATCH] https://github.com/ImageMagick/ImageMagick6/issues/145 Cristy <mikayla-grace@urban-warrior.org> no 2021-04-10
0023-disable-ghostscript-formats.patch disable ghostscript handled formats based on -SAFER insecurity
Based on Tavis Ormandy's Recommendations
Steve Beattie <steve.beattie@canonical.com> no
move-profile-property-to-cli-option.patch [PATCH] move `-set profile` handler to CLI Cristy <urban-warrior@imagemagick.org> no 2023-02-03
CVE-2021-20241.patch [PATCH] fix division by zero in WriteJP2Image() in coders/jp2.c Zhang Xiaohui <ruc_zhangxiaohui@163.com> no 2021-02-02
CVE-2021-20243.patch [PATCH] https://github.com/ImageMagick/ImageMagick/pull/3177 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-03
CVE-2021-20244.patch [PATCH] uses the PerceptibleReciprocal() to prevent the divide-by-zero from occurring (#3194)

(cherry picked from commit 329dd528ab79531d884c0ba131e97d43f872ab5d)

This backports the fix for CVE-2021-20244 to IM6.
ruc_zhangxiaohui <553441439@qq.com> no 2021-02-04
CVE-2021-20245.patch [PATCH] https://github.com/ImageMagick/ImageMagick/issues/3176 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-03
CVE-2021-20246.patch [PATCH] https://github.com/ImageMagick/ImageMagick/issues/3195 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-03
CVE-2021-20309.patch [PATCH] https://github.com/ImageMagick/ImageMagick/issues/3296 Cristy <mikayla-grace@urban-warrior.org> no 2021-02-25
CVE-2021-20312_20313.patch [PATCH] possible divide by zero + clear buffers Cristy <mikayla-grace@urban-warrior.org> no 2021-02-25
CVE-2021-3574.patch [PATCH] https://github.com/ImageMagick/ImageMagick/issues/3540 Cristy <mikayla-grace@urban-warrior.org> no 2021-04-13
CVE-2021-39212.patch [PATCH] Use the correct rights. Dirk Lemstra <dirk@lemstra.org> no 2021-09-11
CVE-2021-4219.patch [PATCH] https://github.com/ImageMagick/ImageMagick/issues/4626 Cristy <mikayla-grace@urban-warrior.org> no 2021-12-22
CVE-2022-1114.patch [PATCH] Coders: https://github.com/ImageMagick/ImageMagick/issues/4947 Cristy <urban-warrior@imagemagick.org> no 2022-03-15
CVE-2022-28463.patch [PATCH] https://github.com/ImageMagick/ImageMagick/issues/4988 Cristy <urban-warrior@imagemagick.org> no 2022-03-26
CVE-2022-32545.patch [PATCH] Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 Cristy <urban-warrior@imagemagick.org> no 2022-03-19
CVE-2022-32546.patch [PATCH] https://github.com/ImageMagick/ImageMagick/pull/4986 Cristy <urban-warrior@imagemagick.org> no 2022-03-24
CVE-2022-32547.patch [PATCH] https://github.com/ImageMagick/ImageMagick/pull/5034 Cristy <urban-warrior@imagemagick.org> no 2022-04-09
0041-1-2-CVE-2021-3610-eliminate-heap-buffer-overflow-vul.patch [1/2] CVE-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder

thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group
Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b307bcadcdf6ea6819951ac1786b7904f27b25c6.patch 2021-05-27
0042-2-2-CVE-2021-3610-eliminate-heap-buffer-overflow-vul.patch [2/2] CVE-2021-3610 eliminate heap buffer overflow vulnerability in TIFF coder

Thanks to ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group

(cherry picked from commit c75ae771a00c38b757c5ef4b424b51e761b02552)
Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/b307bcadcdf6ea6819951ac1786b7904f27b25c6.patch 2021-05-30
0043-heap-based-buffer-overflow-in-TIFF-coder-alert-from-.patch heap-based buffer overflow in TIFF coder (alert from Hunter Mitchell) Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/e1fbcdf3aad96d51db65c1601117396eac665a6d 2021-07-26
0044-heap-based-buffer-overflow-in-TIFF-coder-alert-from-.patch heap-based buffer overflow in TIFF coder (alert from Hunter Mitchell) Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/35b88c9166bc1b3ce8893f52217bae00d8e2c532 2021-07-26
0045-heap-based-buffer-overflow-in-TIFF-coder-alert-from-.patch heap-based buffer overflow in TIFF coder (alert from Hunter Mitchell) Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/f90a091c7dd12cc53b0999bf49d1c80651534eea 2021-07-26
0046-Fix-a-non-initialized-value-passed-to-TIFFGetField.patch Fix a non initialized value passed to TIFFGetField() Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/995de330310dd35531165d9471fe4d31e0fa79ae 2021-09-03
0047-initialize-buffer-before-calling-TIFFGetField.patch initialize buffer before calling TIFFGetField() Cristy <mikayla-grace@urban-warrior.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/995de330310dd35531165d9471fe4d31e0fa79ae 2021-09-04
0048-Fix-stack-overflow-when-parsing-malicious-tiff-image.patch Fix stack overflow when parsing malicious tiff image
(cherry picked from commit 85a370c79afeb45a97842b0959366af5236e9023)
Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023 2021-10-19
0049-early-exit-on-exception.patch early exit on exception
In case of malformed tiff image bail early

(cherry picked from commit b272acab91444f2115099fe51ee6c91bb4db5d50)
Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/b272acab91444f2115099fe51ee6c91bb4db5d50 2021-11-06
0050-Fix-buffer-overrun-in-TIFF-coder.patch Fix buffer overrun in TIFF coder Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/2204eb57ae00b005b39165a47b8984eac01600a5 2021-03-14
0051-Fix-buffer-overrun-in-TIFF-coder.patch Fix buffer overrun in TIFF coder Cristy <mikayla-grace@urban-warrior.org> no https://github.com/ImageMagick/ImageMagick6/commit/add9cb14e14eef02806715d97abcf5d04a3e55dd 2021-12-17
0052-Fix-buffer-overrun-in-TIFF-coder.patch Fix buffer overrun in TIFF coder Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/de6ada9a068b01494bfb848024ed46942da9d238 2022-03-17
0053-Fix-unintialised-value.patch Fix unintialised value Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/409d42205927c98cbb852ca96e109716f38f04ab 2022-02-11
0054-Raise-exception-when-image-could-not-be-read-but-no-.patch Raise exception when image could not be read but no exception was raised.

Bail out in case of corrupted image

https://github.com/ImageMagick/ImageMagick6/commit/3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b
(cherry picked from commit 3e15c68efcb1e6383c93e7dfe38ba6c37e614d1b)
Dirk Lemstra <dirk@lemstra.org> no 2022-02-19
0055-CVE-2022-1115-heap-based-overflow-with-a-specially-c.patch CVE-2022-1115: heap based overflow with a specially crafted TIFF image Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51 2022-03-22
0056-CVE-2023-1289-recursion-detection-framework.patch CVE-2023-1289: recursion detection framework Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/e8c0090c6d2df7b1553053dca2008e96724204bf 2023-03-06
0057-CVE-2023-1289-recursion-detection.patch CVE-2023-1289 recursion detection Cristy <urban-warrior@imagemagick.org> yes upstream https://github.com/ImageMagick/ImageMagick6/commit/706d381b7eb79927d328c96f7b7faab5dc109368 2023-03-06
0058-CVE-2023-1906.patch CVE-2023-1906
A heap-based buffer overflow issue was discovered in ImageMagick's
ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c.
An attacker could pass specially crafted file to convert, triggering
an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/e30c693b37c3b41723f1469d1226a2c814ca443d 2023-04-01
0059-1-2-Prepare-CVE-2023-34151-improved-range-checking.patch [1/2] Prepare CVE-2023-34151 :improved range checking Cristy <urban-warrior@imagemagick.org> no 2023-04-15
0060-2-2-Prepare-CVE-2023-34151-add-additional-checks-for.patch [2/2] Prepare CVE-2023-34151: add additional checks for casting double to size_t Cristy <urban-warrior@imagemagick.org> no 2023-04-13
0061-CVE-2023-34151-properly-cast-double-to-size_t.patch CVE-2023-34151: properly cast double to size_t Cristy <urban-warrior@imagemagick.org> yes upstream 2023-05-17
0062-heap-buffer-overflow-in-ImageMagick-7.1.1-12-contrib.patch heap-buffer-overflow in ImageMagick <= 7.1.1-12, contributed by Hardik shah of Vehere (Dawn Treaders team)


This fix CVE-2023-3428
Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/0d00400727170b0540a355a1bc52787bc7bcdea5 2023-06-26
0063-Added-check-for-invalid-size.patch Added check for invalid size. Dirk Lemstra <dirk@lemstra.org> no https://github.com/ImageMagick/ImageMagick6/commit/94f76dd2f760241bec51e7d66873e77a58d812ba.patch 2021-11-30
0064-improve-BMP-error-checking.patch improve BMP error checking
bug; https://github.com/ImageMagick/ImageMagick/issues/5980
Cristy <urban-warrior@imagemagick.org> no 2023-01-18
0065-CVE-2023-5341.patch CVE-2023-5341 Cristy <urban-warrior@imagemagick.org> no https://github.com/ImageMagick/ImageMagick6/commit/405684654eb9b43424c3c0276ea343681021d9e0 2023-09-24

All known versions for source package 'imagemagick'

Links