* [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES
@ 2026-03-03 8:13 Thomas Perale via buildroot
2026-03-03 8:13 ` [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 " Thomas Perale via buildroot
` (4 more replies)
0 siblings, 5 replies; 10+ messages in thread
From: Thomas Perale via buildroot @ 2026-03-03 8:13 UTC (permalink / raw)
To: buildroot; +Cc: Grzegorz Blach
This vulnerability match on every version of graphicsmagick. Since it's
really old it's unlikely it will be updated and is thus added to
IGNORE_CVES. See [1].
[1] https://nvd.nist.gov//vuln/detail/CVE-2008-6621
Signed-off-by: Thomas Perale <thomas.perale@mind.be>
---
package/graphicsmagick/graphicsmagick.mk | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk
index 4b9f3bd23c..40107b3aae 100644
--- a/package/graphicsmagick/graphicsmagick.mk
+++ b/package/graphicsmagick/graphicsmagick.mk
@@ -11,6 +11,10 @@ GRAPHICSMAGICK_LICENSE = MIT
GRAPHICSMAGICK_LICENSE_FILES = Copyright.txt
GRAPHICSMAGICK_CPE_ID_VENDOR = graphicsmagick
+# Wrong NVD annotations
+# Fixed in version 1.2.3
+GRAPHICSMAGICK_IGNORE_CVES += CVE-2008-6621
+
# 0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch
GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795
--
2.53.0
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 10+ messages in thread* [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 to IGNORE_CVES 2026-03-03 8:13 [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Thomas Perale via buildroot @ 2026-03-03 8:13 ` Thomas Perale via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 3/4] package/graphicsmagick: add patch for CVE-2025-27796 Thomas Perale via buildroot ` (3 subsequent siblings) 4 siblings, 1 reply; 10+ messages in thread From: Thomas Perale via buildroot @ 2026-03-03 8:13 UTC (permalink / raw) To: buildroot; +Cc: Grzegorz Blach This vulnerability match on every version of graphicsmagick [1]. It was issued because of an incomplete patch for CVE-2006-5456 and has been since remediated [2]. Since it's really old it's unlikely it will be updated and is thus added to IGNORE_CVES. [1] https://nvd.nist.gov//vuln/detail/CVE-2007-0770 [2] https://bugzilla.redhat.com/show_bug.cgi?id=210921#c5 Signed-off-by: Thomas Perale <thomas.perale@mind.be> --- package/graphicsmagick/graphicsmagick.mk | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk index 40107b3aae..6c2885b7d8 100644 --- a/package/graphicsmagick/graphicsmagick.mk +++ b/package/graphicsmagick/graphicsmagick.mk @@ -15,6 +15,11 @@ GRAPHICSMAGICK_CPE_ID_VENDOR = graphicsmagick # Fixed in version 1.2.3 GRAPHICSMAGICK_IGNORE_CVES += CVE-2008-6621 +# Wrong NVD annotations englobbing all versions +# Wrong patch for CVE-2006-5456 later updated +# https://bugzilla.redhat.com/show_bug.cgi?id=210921#c5 +GRAPHICSMAGICK_IGNORE_CVES += CVE-2007-0770 + # 0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795 -- 2.53.0 _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 to IGNORE_CVES 2026-03-03 8:13 ` [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 " Thomas Perale via buildroot @ 2026-03-06 19:53 ` Thomas Perale via buildroot 0 siblings, 0 replies; 10+ messages in thread From: Thomas Perale via buildroot @ 2026-03-06 19:53 UTC (permalink / raw) To: Thomas Perale; +Cc: buildroot In reply of: > This vulnerability match on every version of graphicsmagick [1]. > It was issued because of an incomplete patch for CVE-2006-5456 and has > been since remediated [2]. > > Since it's really old it's unlikely it will be updated and is thus added > to IGNORE_CVES. > > [1] https://nvd.nist.gov//vuln/detail/CVE-2007-0770 > [2] https://bugzilla.redhat.com/show_bug.cgi?id=210921#c5 > > Signed-off-by: Thomas Perale <thomas.perale@mind.be> Applied to 2025.02.x & 2025.11.x. Thanks > --- > package/graphicsmagick/graphicsmagick.mk | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk > index 40107b3aae..6c2885b7d8 100644 > --- a/package/graphicsmagick/graphicsmagick.mk > +++ b/package/graphicsmagick/graphicsmagick.mk > @@ -15,6 +15,11 @@ GRAPHICSMAGICK_CPE_ID_VENDOR = graphicsmagick > # Fixed in version 1.2.3 > GRAPHICSMAGICK_IGNORE_CVES += CVE-2008-6621 > > +# Wrong NVD annotations englobbing all versions > +# Wrong patch for CVE-2006-5456 later updated > +# https://bugzilla.redhat.com/show_bug.cgi?id=210921#c5 > +GRAPHICSMAGICK_IGNORE_CVES += CVE-2007-0770 > + > # 0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch > GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795 > > -- > 2.53.0 > > _______________________________________________ > buildroot mailing list > buildroot@buildroot.org > https://lists.buildroot.org/mailman/listinfo/buildroot _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 10+ messages in thread
* [Buildroot] [PATCH 3/4] package/graphicsmagick: add patch for CVE-2025-27796 2026-03-03 8:13 [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 " Thomas Perale via buildroot @ 2026-03-03 8:13 ` Thomas Perale via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 Thomas Perale via buildroot ` (2 subsequent siblings) 4 siblings, 1 reply; 10+ messages in thread From: Thomas Perale via buildroot @ 2026-03-03 8:13 UTC (permalink / raw) To: buildroot; +Cc: Grzegorz Blach Fixes the following vulnerability: - CVE-2025-27796: ReadWPGImage in WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation, resulting in out-of-bounds access to heap memory in ReadBlob. For more information, see - https://www.cve.org/CVERecord?id=CVE-2025-27796 - https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3 Signed-off-by: Thomas Perale <thomas.perale@mind.be> --- ...er-is-allocated-and-the-current-size.patch | 55 +++++++++++++++++++ package/graphicsmagick/graphicsmagick.mk | 3 + 2 files changed, 58 insertions(+) create mode 100644 package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch diff --git a/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch b/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch new file mode 100644 index 0000000000..8a98034833 --- /dev/null +++ b/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch @@ -0,0 +1,55 @@ +# HG changeset patch +# User Bob Friesenhahn <bfriesen@GraphicsMagick.org> +# Date 1734634653 21600 +# Thu Dec 19 12:57:33 2024 -0600 +# Node ID 883ebf8cae6dfa5873d975fe3476b1a188ef3f9f +# Parent cf7cd5ebabb0ca40204de7539f4fb9ae02121958 +ReadWPGImage(): Assure that palette buffer is allocated and the current size. + +CVE: CVE-2025-27796 +Upstream: https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f +[thomas: remove changelog and binary] +Signed-off-by: Thomas Perale <thomas.perale@mind.be> + +diff --git a/coders/wpg.c b/coders/wpg.c +--- a/coders/wpg.c ++++ b/coders/wpg.c +@@ -1704,28 +1704,23 @@ + ThrowReaderException(CorruptImageError,InvalidColormapIndex,image); + } + +- if(pPalette!=NULL && +- PaletteAllocBytes < 4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries)) +- { +- MagickFreeResourceLimitedMemory(pPalette); +- PaletteAllocBytes = 0; +- } ++ /* Assure that buffer is allocated and the current size */ ++ if (PaletteAllocBytes != Max(4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries),4*256)) ++ { ++ PaletteAllocBytes = Max(4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries),4*256); ++ MagickReallocateResourceLimitedMemory(unsigned char *,pPalette,PaletteAllocBytes); ++ } + if(pPalette==NULL) +- { +- PaletteItems = WPG_Palette.NumOfEntries; +- PaletteAllocBytes = 4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries); +- if(PaletteAllocBytes < 4*256) PaletteAllocBytes = 4*256; +- pPalette = MagickAllocateResourceLimitedMemory(unsigned char *,(size_t)PaletteAllocBytes); +- if(pPalette==NULL) +- ThrowReaderException(ResourceLimitError,MemoryAllocationFailed,image); +- for(i=0; i<=255; i++) ++ ThrowReaderException(ResourceLimitError,MemoryAllocationFailed,image); ++ ++ PaletteItems = WPG_Palette.NumOfEntries; ++ for(i=0; i<=255; i++) + { + pPalette[4*i] = WPG1_Palette[i].Red; + pPalette[4*i+1] = WPG1_Palette[i].Green; + pPalette[4*i+2] = WPG1_Palette[i].Blue; + pPalette[4*i+3] = OpaqueOpacity; + } +- } + if(ReadBlob(image,(size_t) PaletteItems*4,pPalette+((size_t)4*WPG_Palette.StartIndex)) != (size_t) PaletteItems*4) + { + MagickFreeResourceLimitedMemory(pPalette); diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk index 6c2885b7d8..e329e51b70 100644 --- a/package/graphicsmagick/graphicsmagick.mk +++ b/package/graphicsmagick/graphicsmagick.mk @@ -26,6 +26,9 @@ GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795 # 0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-32460 +# 0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch +GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27796 + GRAPHICSMAGICK_INSTALL_STAGING = YES GRAPHICSMAGICK_CONFIG_SCRIPTS = GraphicsMagick-config GraphicsMagickWand-config -- 2.53.0 _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [Buildroot] [PATCH 3/4] package/graphicsmagick: add patch for CVE-2025-27796 2026-03-03 8:13 ` [Buildroot] [PATCH 3/4] package/graphicsmagick: add patch for CVE-2025-27796 Thomas Perale via buildroot @ 2026-03-06 19:53 ` Thomas Perale via buildroot 0 siblings, 0 replies; 10+ messages in thread From: Thomas Perale via buildroot @ 2026-03-06 19:53 UTC (permalink / raw) To: Thomas Perale; +Cc: buildroot In reply of: > Fixes the following vulnerability: > > - CVE-2025-27796: > ReadWPGImage in WPG in GraphicsMagick before 1.3.46 mishandles palette > buffer allocation, resulting in out-of-bounds access to heap memory in > ReadBlob. > > For more information, see > - https://www.cve.org/CVERecord?id=CVE-2025-27796 > - https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3 > > Signed-off-by: Thomas Perale <thomas.perale@mind.be> Applied to 2025.02.x & 2025.11.x. Thanks > --- > ...er-is-allocated-and-the-current-size.patch | 55 +++++++++++++++++++ > package/graphicsmagick/graphicsmagick.mk | 3 + > 2 files changed, 58 insertions(+) > create mode 100644 package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch > > diff --git a/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch b/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch > new file mode 100644 > index 0000000000..8a98034833 > --- /dev/null > +++ b/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch > @@ -0,0 +1,55 @@ > +# HG changeset patch > +# User Bob Friesenhahn <bfriesen@GraphicsMagick.org> > +# Date 1734634653 21600 > +# Thu Dec 19 12:57:33 2024 -0600 > +# Node ID 883ebf8cae6dfa5873d975fe3476b1a188ef3f9f > +# Parent cf7cd5ebabb0ca40204de7539f4fb9ae02121958 > +ReadWPGImage(): Assure that palette buffer is allocated and the current size. > + > +CVE: CVE-2025-27796 > +Upstream: https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f > +[thomas: remove changelog and binary] > +Signed-off-by: Thomas Perale <thomas.perale@mind.be> > + > +diff --git a/coders/wpg.c b/coders/wpg.c > +--- a/coders/wpg.c > ++++ b/coders/wpg.c > +@@ -1704,28 +1704,23 @@ > + ThrowReaderException(CorruptImageError,InvalidColormapIndex,image); > + } > + > +- if(pPalette!=NULL && > +- PaletteAllocBytes < 4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries)) > +- { > +- MagickFreeResourceLimitedMemory(pPalette); > +- PaletteAllocBytes = 0; > +- } > ++ /* Assure that buffer is allocated and the current size */ > ++ if (PaletteAllocBytes != Max(4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries),4*256)) > ++ { > ++ PaletteAllocBytes = Max(4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries),4*256); > ++ MagickReallocateResourceLimitedMemory(unsigned char *,pPalette,PaletteAllocBytes); > ++ } > + if(pPalette==NULL) > +- { > +- PaletteItems = WPG_Palette.NumOfEntries; > +- PaletteAllocBytes = 4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries); > +- if(PaletteAllocBytes < 4*256) PaletteAllocBytes = 4*256; > +- pPalette = MagickAllocateResourceLimitedMemory(unsigned char *,(size_t)PaletteAllocBytes); > +- if(pPalette==NULL) > +- ThrowReaderException(ResourceLimitError,MemoryAllocationFailed,image); > +- for(i=0; i<=255; i++) > ++ ThrowReaderException(ResourceLimitError,MemoryAllocationFailed,image); > ++ > ++ PaletteItems = WPG_Palette.NumOfEntries; > ++ for(i=0; i<=255; i++) > + { > + pPalette[4*i] = WPG1_Palette[i].Red; > + pPalette[4*i+1] = WPG1_Palette[i].Green; > + pPalette[4*i+2] = WPG1_Palette[i].Blue; > + pPalette[4*i+3] = OpaqueOpacity; > + } > +- } > + if(ReadBlob(image,(size_t) PaletteItems*4,pPalette+((size_t)4*WPG_Palette.StartIndex)) != (size_t) PaletteItems*4) > + { > + MagickFreeResourceLimitedMemory(pPalette); > diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk > index 6c2885b7d8..e329e51b70 100644 > --- a/package/graphicsmagick/graphicsmagick.mk > +++ b/package/graphicsmagick/graphicsmagick.mk > @@ -26,6 +26,9 @@ GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795 > # 0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch > GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-32460 > > +# 0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch > +GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27796 > + > GRAPHICSMAGICK_INSTALL_STAGING = YES > GRAPHICSMAGICK_CONFIG_SCRIPTS = GraphicsMagick-config GraphicsMagickWand-config > > -- > 2.53.0 > > _______________________________________________ > buildroot mailing list > buildroot@buildroot.org > https://lists.buildroot.org/mailman/listinfo/buildroot _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 10+ messages in thread
* [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 2026-03-03 8:13 [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 " Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 3/4] package/graphicsmagick: add patch for CVE-2025-27796 Thomas Perale via buildroot @ 2026-03-03 8:13 ` Thomas Perale via buildroot 2026-03-03 17:38 ` Julien Olivain via buildroot 2026-03-03 17:36 ` [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Julien Olivain via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot 4 siblings, 1 reply; 10+ messages in thread From: Thomas Perale via buildroot @ 2026-03-03 8:13 UTC (permalink / raw) To: buildroot; +Cc: Grzegorz Blach For more information, see the release note: - http://www.graphicsmagick.org/NEWS.html#october-29-2025 - https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/compare/GraphicsMagick-1_3_45...GraphicsMagick-1_3_46 This release include now upstream fixes for CVE-2025-27795, CVE-2025-32460, CVE-2025-27796. Copyright year updated in [1]. [1] https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/13454c83b42327a29796b2bf418e4f90f5fc9292 Signed-off-by: Thomas Perale <thomas.perale@mind.be> --- ...pply-image-dimension-resource-limits.patch | 33 ---------- ...ixel_format-num_channels-needs-to-be.patch | 61 ------------------- ...er-is-allocated-and-the-current-size.patch | 55 ----------------- package/graphicsmagick/graphicsmagick.hash | 4 +- package/graphicsmagick/graphicsmagick.mk | 11 +--- 5 files changed, 3 insertions(+), 161 deletions(-) delete mode 100644 package/graphicsmagick/0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch delete mode 100644 package/graphicsmagick/0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch delete mode 100644 package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch diff --git a/package/graphicsmagick/0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch b/package/graphicsmagick/0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch deleted file mode 100644 index 56122e466e..0000000000 --- a/package/graphicsmagick/0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch +++ /dev/null @@ -1,33 +0,0 @@ -# HG changeset patch -# User Bob Friesenhahn <bfriesen@GraphicsMagick.org> -# Date 1725886903 18000 -# Mon Sep 09 08:01:43 2024 -0500 -# Node ID 9bbae7314e3c3b19b830591010ed90bb136b9c42 -# Parent db3ff8d00c28c38895e1600a28706ce251dac570 -ReadJXLImage(): Apply image dimension resource limits. Addresses oss-fuzz Issue 69728 - -CVE: CVE-2025-27795 -Upstream: https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/9bbae7314e3c3b19b830591010ed90bb136b9c42 -Signed-off-by: Peter Korsgaard <peter@korsgaard.com> -[Peter: drop ChangeLog/version changes] -diff --git a/coders/jxl.c b/coders/jxl.c ---- a/coders/jxl.c -+++ b/coders/jxl.c -@@ -571,6 +571,7 @@ - basic_info.alpha_bits, basic_info.num_color_channels, - basic_info.have_animation == JXL_FALSE ? "False" : "True"); - } -+ - if (basic_info.num_extra_channels) - { - size_t index; -@@ -637,6 +638,9 @@ - - image->orientation=convert_orientation(basic_info.orientation); - -+ if (CheckImagePixelLimits(image, exception) != MagickPass) -+ ThrowJXLReaderException(ResourceLimitError,ImagePixelLimitExceeded,image); -+ - pixel_format.endianness=JXL_NATIVE_ENDIAN; - pixel_format.align=0; - if (basic_info.num_color_channels == 1) diff --git a/package/graphicsmagick/0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch b/package/graphicsmagick/0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch deleted file mode 100644 index 004594523c..0000000000 --- a/package/graphicsmagick/0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch +++ /dev/null @@ -1,61 +0,0 @@ -# HG changeset patch -# User Bob Friesenhahn <bfriesen@GraphicsMagick.org> -# Date 1743004970 18000 -# Wed Mar 26 11:02:50 2025 -0500 -# Node ID 8e56520435df50f618a03f2721a39a70a515f1cb -# Parent 036a1376a2a6dc9504c5148249cbd8feaef72de6 -ReadJXLImage(): pixel_format.num_channels needs to be 2 for grayscale matte. - -CVE: CVE-2025-32460 -Upstream: https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb -Signed-off-by: Peter Korsgaard <peter@korsgaard.com> -[Peter: drop ChangeLog/version changes] - -diff --git a/coders/jxl.c b/coders/jxl.c ---- a/coders/jxl.c -+++ b/coders/jxl.c -@@ -658,7 +658,7 @@ - ThrowJXLReaderException(ResourceLimitError,MemoryAllocationFailed,image); - } - grayscale=MagickTrue; -- pixel_format.num_channels=1; -+ pixel_format.num_channels=image->matte ? 2 : 1; - pixel_format.data_type=(basic_info.bits_per_sample <= 8 ? JXL_TYPE_UINT8 : - (basic_info.bits_per_sample <= 16 ? JXL_TYPE_UINT16 : - JXL_TYPE_FLOAT)); -@@ -843,6 +843,24 @@ - size_t - out_len; - -+ if (image->logging) -+ (void) LogMagickEvent(CoderEvent,GetMagickModule(), -+ "JxlPixelFormat:\n" -+ " num_channels: %u\n" -+ " data_type: %s\n" -+ " endianness: %s\n" -+ " align: %" MAGICK_SIZE_T_F "u", -+ pixel_format.num_channels, -+ pixel_format.data_type == JXL_TYPE_FLOAT ? "float" : -+ (pixel_format.data_type == JXL_TYPE_UINT8 ? "uint8" : -+ (pixel_format.data_type == JXL_TYPE_UINT16 ? "uint16" : -+ (pixel_format.data_type == JXL_TYPE_FLOAT16 ? "float16" : -+ "unknown"))) , -+ pixel_format.endianness == JXL_NATIVE_ENDIAN ? "native" : -+ (pixel_format.endianness == JXL_LITTLE_ENDIAN ? "little" : -+ (pixel_format.endianness == JXL_BIG_ENDIAN ? "big" : "unknown")), -+ pixel_format.align); -+ - status=JxlDecoderImageOutBufferSize(jxl_decoder,&pixel_format,&out_len); - if (status != JXL_DEC_SUCCESS) - { -@@ -852,6 +870,10 @@ - break; - } - -+ if (image->logging) -+ (void) LogMagickEvent(CoderEvent,GetMagickModule(), -+ "JxlDecoderImageOutBufferSize() returns %" MAGICK_SIZE_T_F "u", -+ (MAGICK_SIZE_T) out_len); - out_buf=MagickAllocateResourceLimitedArray(unsigned char *,out_len,sizeof(*out_buf)); - if (out_buf == (unsigned char *) NULL) - ThrowJXLReaderException(ResourceLimitError,MemoryAllocationFailed,image); diff --git a/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch b/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch deleted file mode 100644 index 8a98034833..0000000000 --- a/package/graphicsmagick/0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch +++ /dev/null @@ -1,55 +0,0 @@ -# HG changeset patch -# User Bob Friesenhahn <bfriesen@GraphicsMagick.org> -# Date 1734634653 21600 -# Thu Dec 19 12:57:33 2024 -0600 -# Node ID 883ebf8cae6dfa5873d975fe3476b1a188ef3f9f -# Parent cf7cd5ebabb0ca40204de7539f4fb9ae02121958 -ReadWPGImage(): Assure that palette buffer is allocated and the current size. - -CVE: CVE-2025-27796 -Upstream: https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f -[thomas: remove changelog and binary] -Signed-off-by: Thomas Perale <thomas.perale@mind.be> - -diff --git a/coders/wpg.c b/coders/wpg.c ---- a/coders/wpg.c -+++ b/coders/wpg.c -@@ -1704,28 +1704,23 @@ - ThrowReaderException(CorruptImageError,InvalidColormapIndex,image); - } - -- if(pPalette!=NULL && -- PaletteAllocBytes < 4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries)) -- { -- MagickFreeResourceLimitedMemory(pPalette); -- PaletteAllocBytes = 0; -- } -+ /* Assure that buffer is allocated and the current size */ -+ if (PaletteAllocBytes != Max(4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries),4*256)) -+ { -+ PaletteAllocBytes = Max(4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries),4*256); -+ MagickReallocateResourceLimitedMemory(unsigned char *,pPalette,PaletteAllocBytes); -+ } - if(pPalette==NULL) -- { -- PaletteItems = WPG_Palette.NumOfEntries; -- PaletteAllocBytes = 4*(WPG_Palette.StartIndex+WPG_Palette.NumOfEntries); -- if(PaletteAllocBytes < 4*256) PaletteAllocBytes = 4*256; -- pPalette = MagickAllocateResourceLimitedMemory(unsigned char *,(size_t)PaletteAllocBytes); -- if(pPalette==NULL) -- ThrowReaderException(ResourceLimitError,MemoryAllocationFailed,image); -- for(i=0; i<=255; i++) -+ ThrowReaderException(ResourceLimitError,MemoryAllocationFailed,image); -+ -+ PaletteItems = WPG_Palette.NumOfEntries; -+ for(i=0; i<=255; i++) - { - pPalette[4*i] = WPG1_Palette[i].Red; - pPalette[4*i+1] = WPG1_Palette[i].Green; - pPalette[4*i+2] = WPG1_Palette[i].Blue; - pPalette[4*i+3] = OpaqueOpacity; - } -- } - if(ReadBlob(image,(size_t) PaletteItems*4,pPalette+((size_t)4*WPG_Palette.StartIndex)) != (size_t) PaletteItems*4) - { - MagickFreeResourceLimitedMemory(pPalette); diff --git a/package/graphicsmagick/graphicsmagick.hash b/package/graphicsmagick/graphicsmagick.hash index 044214c8fc..0a2e926c3f 100644 --- a/package/graphicsmagick/graphicsmagick.hash +++ b/package/graphicsmagick/graphicsmagick.hash @@ -1,3 +1,3 @@ # Locally computed: -sha256 dcea5167414f7c805557de2d7a47a9b3147bcbf617b91f5f0f4afe5e6543026b GraphicsMagick-1.3.45.tar.xz -sha256 27d121f97ad71ff506ac5a6a9539e969154f3a66f3da24fd5b6f268acd106295 Copyright.txt +sha256 c7c706a505e9c6c3764156bb94a0c9644d79131785df15a89c9f8721d1abd061 GraphicsMagick-1.3.46.tar.xz +sha256 a610fd86484bf7c80b53f84f9644995c25c74f1dd711f16d2608bbe81176d18b Copyright.txt diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk index e329e51b70..0b7875b5cc 100644 --- a/package/graphicsmagick/graphicsmagick.mk +++ b/package/graphicsmagick/graphicsmagick.mk @@ -4,7 +4,7 @@ # ################################################################################ -GRAPHICSMAGICK_VERSION = 1.3.45 +GRAPHICSMAGICK_VERSION = 1.3.46 GRAPHICSMAGICK_SOURCE = GraphicsMagick-$(GRAPHICSMAGICK_VERSION).tar.xz GRAPHICSMAGICK_SITE = https://downloads.sourceforge.net/project/graphicsmagick/graphicsmagick/$(GRAPHICSMAGICK_VERSION) GRAPHICSMAGICK_LICENSE = MIT @@ -20,15 +20,6 @@ GRAPHICSMAGICK_IGNORE_CVES += CVE-2008-6621 # https://bugzilla.redhat.com/show_bug.cgi?id=210921#c5 GRAPHICSMAGICK_IGNORE_CVES += CVE-2007-0770 -# 0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch -GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795 - -# 0002-ReadJXLImage-pixel_format-num_channels-needs-to-be.patch -GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-32460 - -# 0003-Assure-that-palette-buffer-is-allocated-and-the-current-size.patch -GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27796 - GRAPHICSMAGICK_INSTALL_STAGING = YES GRAPHICSMAGICK_CONFIG_SCRIPTS = GraphicsMagick-config GraphicsMagickWand-config -- 2.53.0 _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 2026-03-03 8:13 ` [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 Thomas Perale via buildroot @ 2026-03-03 17:38 ` Julien Olivain via buildroot 2026-03-04 21:48 ` Julien Olivain via buildroot 0 siblings, 1 reply; 10+ messages in thread From: Julien Olivain via buildroot @ 2026-03-03 17:38 UTC (permalink / raw) To: Thomas Perale; +Cc: buildroot, Grzegorz Blach On 03/03/2026 09:13, Thomas Perale via buildroot wrote: > For more information, see the release note: > > - http://www.graphicsmagick.org/NEWS.html#october-29-2025 > - > https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/compare/GraphicsMagick-1_3_45...GraphicsMagick-1_3_46 > > This release include now upstream fixes for CVE-2025-27795, > CVE-2025-32460, CVE-2025-27796. > > Copyright year updated in [1]. > > [1] > https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/13454c83b42327a29796b2bf418e4f90f5fc9292 > > Signed-off-by: Thomas Perale <thomas.perale@mind.be> Since we are already in the 2026.02-rc3 release cycle, I would prefer to apply this patch a bit later, after 2026.02 is release (hopefully, very soon). Best regards, Julien. _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 2026-03-03 17:38 ` Julien Olivain via buildroot @ 2026-03-04 21:48 ` Julien Olivain via buildroot 0 siblings, 0 replies; 10+ messages in thread From: Julien Olivain via buildroot @ 2026-03-04 21:48 UTC (permalink / raw) To: Julien Olivain; +Cc: Thomas Perale, buildroot, Grzegorz Blach Hi, On 03/03/2026 18:38, Julien Olivain via buildroot wrote: > On 03/03/2026 09:13, Thomas Perale via buildroot wrote: >> For more information, see the release note: >> >> - http://www.graphicsmagick.org/NEWS.html#october-29-2025 >> - >> https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/compare/GraphicsMagick-1_3_45...GraphicsMagick-1_3_46 >> >> This release include now upstream fixes for CVE-2025-27795, >> CVE-2025-32460, CVE-2025-27796. >> >> Copyright year updated in [1]. >> >> [1] >> https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/13454c83b42327a29796b2bf418e4f90f5fc9292 >> >> Signed-off-by: Thomas Perale <thomas.perale@mind.be> > > Since we are already in the 2026.02-rc3 release cycle, I would prefer > to apply > this patch a bit later, after 2026.02 is release (hopefully, very > soon). Now 2026.02 was released, I applied this patch on master, thanks. > Best regards, > > Julien. _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES 2026-03-03 8:13 [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Thomas Perale via buildroot ` (2 preceding siblings ...) 2026-03-03 8:13 ` [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 Thomas Perale via buildroot @ 2026-03-03 17:36 ` Julien Olivain via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot 4 siblings, 0 replies; 10+ messages in thread From: Julien Olivain via buildroot @ 2026-03-03 17:36 UTC (permalink / raw) To: Thomas Perale; +Cc: buildroot, Grzegorz Blach On 03/03/2026 09:13, Thomas Perale via buildroot wrote: > This vulnerability match on every version of graphicsmagick. Since it's > really old it's unlikely it will be updated and is thus added to > IGNORE_CVES. See [1]. > > [1] https://nvd.nist.gov//vuln/detail/CVE-2008-6621 > > Signed-off-by: Thomas Perale <thomas.perale@mind.be> I applied patches 1 to 3 of this series to master, thanks. _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES 2026-03-03 8:13 [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Thomas Perale via buildroot ` (3 preceding siblings ...) 2026-03-03 17:36 ` [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Julien Olivain via buildroot @ 2026-03-06 19:53 ` Thomas Perale via buildroot 4 siblings, 0 replies; 10+ messages in thread From: Thomas Perale via buildroot @ 2026-03-06 19:53 UTC (permalink / raw) To: Thomas Perale; +Cc: buildroot In reply of: > This vulnerability match on every version of graphicsmagick. Since it's > really old it's unlikely it will be updated and is thus added to > IGNORE_CVES. See [1]. > > [1] https://nvd.nist.gov//vuln/detail/CVE-2008-6621 > > Signed-off-by: Thomas Perale <thomas.perale@mind.be> Applied to 2025.02.x & 2025.11.x. Thanks > --- > package/graphicsmagick/graphicsmagick.mk | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/package/graphicsmagick/graphicsmagick.mk b/package/graphicsmagick/graphicsmagick.mk > index 4b9f3bd23c..40107b3aae 100644 > --- a/package/graphicsmagick/graphicsmagick.mk > +++ b/package/graphicsmagick/graphicsmagick.mk > @@ -11,6 +11,10 @@ GRAPHICSMAGICK_LICENSE = MIT > GRAPHICSMAGICK_LICENSE_FILES = Copyright.txt > GRAPHICSMAGICK_CPE_ID_VENDOR = graphicsmagick > > +# Wrong NVD annotations > +# Fixed in version 1.2.3 > +GRAPHICSMAGICK_IGNORE_CVES += CVE-2008-6621 > + > # 0001-ReadJXLImage-Apply-image-dimension-resource-limits.patch > GRAPHICSMAGICK_IGNORE_CVES += CVE-2025-27795 > > -- > 2.53.0 > > _______________________________________________ > buildroot mailing list > buildroot@buildroot.org > https://lists.buildroot.org/mailman/listinfo/buildroot _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2026-03-06 19:53 UTC | newest] Thread overview: 10+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-03-03 8:13 [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 2/4] package/graphicsmagick: add CVE-2007-0770 " Thomas Perale via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 3/4] package/graphicsmagick: add patch for CVE-2025-27796 Thomas Perale via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot 2026-03-03 8:13 ` [Buildroot] [PATCH 4/4] package/graphicsmagick: bump to v1.3.46 Thomas Perale via buildroot 2026-03-03 17:38 ` Julien Olivain via buildroot 2026-03-04 21:48 ` Julien Olivain via buildroot 2026-03-03 17:36 ` [Buildroot] [PATCH 1/4] package/graphicsmagick: add CVE-2008-6621 to IGNORE_CVES Julien Olivain via buildroot 2026-03-06 19:53 ` Thomas Perale via buildroot
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox