* [Buildroot] [PATCH] package/imagemagick: security bump to v7.1.2-15
@ 2026-02-25 8:10 Thomas Perale via buildroot
2026-02-25 20:55 ` Julien Olivain via buildroot
2026-03-06 19:53 ` Thomas Perale via buildroot
0 siblings, 2 replies; 3+ messages in thread
From: Thomas Perale via buildroot @ 2026-02-25 8:10 UTC (permalink / raw)
To: buildroot
For more information on the version bump, see:
- https://github.com/ImageMagick/Website/blob/main/ChangeLog.md
- https://github.com/ImageMagick/ImageMagick/compare/7.1.2-12...7.1.2-15
Fixes the following vulnerabilities:
- CVE-2026-22770:
The BilateralBlurImage method will allocate a set of double buffers
inside AcquireBilateralTLS. But, in versions prior to 7.1.2-13, the
last element in the set is not properly initialized. This will
result in a release of an invalid pointer inside DestroyBilateralTLS
when the memory allocation fails.
https://www.cve.org/CVERecord?id=CVE-2026-22770
- CVE-2026-23874:
Versions prior to 7.1.2-13 have a stack overflow via infinite
recursion in MSL (Magick Scripting Language) `<write>` command when
writing to MSL format.
https://www.cve.org/CVERecord?id=CVE-2026-23874
- CVE-2026-23876:
Prior to versions 7.1.2-13 and 6.9.13-38, a heap buffer overflow
vulnerability in the XBM image decoder (ReadXBMImage) allows an
attacker to write controlled data past the allocated heap buffer
when processing a maliciously crafted image file. Any operation that
reads or identifies an image can trigger the overflow, making it
exploitable via common image upload and processing pipelines.
https://www.cve.org/CVERecord?id=CVE-2026-23876
- CVE-2026-24481:
Prior to versions 7.1.2-15 and 6.9.13-40, a heap information
disclosure vulnerability exists in ImageMagick's PSD (Adobe
Photoshop) format handler. When processing a maliciously crafted PSD
file containing ZIP-compressed layer data that decompresses to less
than the expected size, uninitialized heap memory is leaked into the
output image.
https://www.cve.org/CVERecord?id=CVE-2026-24481
- CVE-2026-25638:
Prior to versions 7.1.2-15 and 6.9.13-40, memory leak exists in
`coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file,
resources are allocated. But the function returns early without
releasing these allocated resources.
https://www.cve.org/CVERecord?id=CVE-2026-25638
- CVE-2026-25794:
`WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute
the pixel buffer size. Prior to version 7.1.2-15, when image
dimensions are large, the multiplication overflows 32-bit `int`,
causing an undersized heap allocation followed by an out-of-bounds
write. This can crash the process or potentially lead to an out of
bounds heap write.
https://www.cve.org/CVERecord?id=CVE-2026-25794
- CVE-2026-25795:
Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSFWImage()`
(`coders/sfw.c`), when temporary file creation fails, `read_info` is
destroyed before its `filename` member is accessed, causing a NULL
pointer dereference and crash.
https://www.cve.org/CVERecord?id=CVE-2026-25795
- CVE-2026-25796:
Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSTEGANOImage()`
(`coders/stegano.c`), the `watermark` Image object is not freed on
three early-return paths, resulting in a definite memory leak
(~13.5KB+ per invocation) that can be exploited for denial of
service.
https://www.cve.org/CVERecord?id=CVE-2026-25796
- CVE-2026-25798:
Prior to versions 7.1.2-15 and 6.9.13-40, a NULL pointer dereference
in ClonePixelCacheRepository allows a remote attacker to crash any
application linked against ImageMagick by supplying a crafted image
file, resulting in denial of service.
https://www.cve.org/CVERecord?id=CVE-2026-25798
- CVE-2026-25799:
Prior to versions 7.1.2-15 and 6.9.13-40, a logic error in YUV
sampling factor validation allows an invalid sampling factor to
bypass checks and trigger a division-by-zero during image loading,
resulting in a reliable denial-of-service.
https://www.cve.org/CVERecord?id=CVE-2026-25799
- CVE-2026-25897:
Prior to versions 7.1.2-15 and 6.9.13-40, an Integer Overflow
vulnerability exists in the sun decoder. On 32-bit systems/builds, a
carefully crafted image can lead to an out of bounds heap write.
https://www.cve.org/CVERecord?id=CVE-2026-25897
- CVE-2026-25989:
Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can
cause a denial of service. An off-by-one boundary check (`>` instead
of `>=`) that allows bypass the guard and reach an undefined
`(size_t)` cast.
https://www.cve.org/CVERecord?id=CVE-2026-25989
- CVE-2026-26066:
Prior to versions 7.1.2-15 and 6.9.13-40, a crafted profile contain
invalid IPTC data may cause an infinite loop when writing it with
`IPTCTEXT`.
https://www.cve.org/CVERecord?id=CVE-2026-26066
- CVE-2026-26283:
Prior to versions 7.1.2-15 and 6.9.13-40, a `continue` statement in
the JPEG extent binary search loop in the jpeg encoder causes an
infinite loop when writing persistently fails. An attacker can
trigger a 100% CPU consumption and process hang (Denial of Service)
with a crafted image.
https://www.cve.org/CVERecord?id=CVE-2026-26283
- CVE-2026-26284:
Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper
boundary checking when processing Huffman- coded data from PCD
(Photo CD) files. The decoder contains an function that has an
incorrect initialization that could cause an out of bounds read.
https://www.cve.org/CVERecord?id=CVE-2026-26284
- CVE-2026-26983:
Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter
crashes when processing a invalid `<map>` element that causes it to
use an image after it has been freed.
https://www.cve.org/CVERecord?id=CVE-2026-26983
Signed-off-by: Thomas Perale <thomas.perale@mind.be>
---
package/imagemagick/imagemagick.hash | 4 ++--
package/imagemagick/imagemagick.mk | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/package/imagemagick/imagemagick.hash b/package/imagemagick/imagemagick.hash
index eead3a9f97..90383c4d17 100644
--- a/package/imagemagick/imagemagick.hash
+++ b/package/imagemagick/imagemagick.hash
@@ -1,3 +1,3 @@
# Locally computed
-sha256 521fa7a8c0f664a3f5cf7437cbcc219f12bd6d5fe0c1fb014f212fa145076e60 imagemagick-7.1.2-12.tar.gz
-sha256 a556c5292c87c9a6ac795c80669b0c3660f9f729de8c476bf2b10f83ab1b34ec LICENSE
+sha256 bf646e7fffdf50b7d886eec6bbe51c3ced1c4d68fbabfcc534e014575359fe7f imagemagick-7.1.2-15.tar.gz
+sha256 131447ad0099069beaa32acf1700716eea294a5bdf936d8211d7026b1849e5d4 LICENSE
diff --git a/package/imagemagick/imagemagick.mk b/package/imagemagick/imagemagick.mk
index 0d5eb2aa34..5a03fbfd8f 100644
--- a/package/imagemagick/imagemagick.mk
+++ b/package/imagemagick/imagemagick.mk
@@ -4,7 +4,7 @@
#
################################################################################
-IMAGEMAGICK_VERSION = 7.1.2-12
+IMAGEMAGICK_VERSION = 7.1.2-15
IMAGEMAGICK_SITE = $(call github,ImageMagick,ImageMagick,$(IMAGEMAGICK_VERSION))
IMAGEMAGICK_LICENSE = Apache-2.0
IMAGEMAGICK_LICENSE_FILES = LICENSE
--
2.53.0
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [Buildroot] [PATCH] package/imagemagick: security bump to v7.1.2-15
2026-02-25 8:10 [Buildroot] [PATCH] package/imagemagick: security bump to v7.1.2-15 Thomas Perale via buildroot
@ 2026-02-25 20:55 ` Julien Olivain via buildroot
2026-03-06 19:53 ` Thomas Perale via buildroot
1 sibling, 0 replies; 3+ messages in thread
From: Julien Olivain via buildroot @ 2026-02-25 20:55 UTC (permalink / raw)
To: Thomas Perale; +Cc: buildroot
On 25/02/2026 09:10, Thomas Perale via buildroot wrote:
> For more information on the version bump, see:
> - https://github.com/ImageMagick/Website/blob/main/ChangeLog.md
> -
> https://github.com/ImageMagick/ImageMagick/compare/7.1.2-12...7.1.2-15
[...]
> Signed-off-by: Thomas Perale <thomas.perale@mind.be>
Applied to master, thanks.
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [Buildroot] [PATCH] package/imagemagick: security bump to v7.1.2-15
2026-02-25 8:10 [Buildroot] [PATCH] package/imagemagick: security bump to v7.1.2-15 Thomas Perale via buildroot
2026-02-25 20:55 ` Julien Olivain via buildroot
@ 2026-03-06 19:53 ` Thomas Perale via buildroot
1 sibling, 0 replies; 3+ messages in thread
From: Thomas Perale via buildroot @ 2026-03-06 19:53 UTC (permalink / raw)
To: Thomas Perale; +Cc: buildroot
In reply of:
> For more information on the version bump, see:
> - https://github.com/ImageMagick/Website/blob/main/ChangeLog.md
> - https://github.com/ImageMagick/ImageMagick/compare/7.1.2-12...7.1.2-15
>
> Fixes the following vulnerabilities:
>
> - CVE-2026-22770:
> The BilateralBlurImage method will allocate a set of double buffers
> inside AcquireBilateralTLS. But, in versions prior to 7.1.2-13, the
> last element in the set is not properly initialized. This will
> result in a release of an invalid pointer inside DestroyBilateralTLS
> when the memory allocation fails.
>
> https://www.cve.org/CVERecord?id=CVE-2026-22770
>
> - CVE-2026-23874:
> Versions prior to 7.1.2-13 have a stack overflow via infinite
> recursion in MSL (Magick Scripting Language) `<write>` command when
> writing to MSL format.
>
> https://www.cve.org/CVERecord?id=CVE-2026-23874
>
> - CVE-2026-23876:
> Prior to versions 7.1.2-13 and 6.9.13-38, a heap buffer overflow
> vulnerability in the XBM image decoder (ReadXBMImage) allows an
> attacker to write controlled data past the allocated heap buffer
> when processing a maliciously crafted image file. Any operation that
> reads or identifies an image can trigger the overflow, making it
> exploitable via common image upload and processing pipelines.
>
> https://www.cve.org/CVERecord?id=CVE-2026-23876
>
> - CVE-2026-24481:
> Prior to versions 7.1.2-15 and 6.9.13-40, a heap information
> disclosure vulnerability exists in ImageMagick's PSD (Adobe
> Photoshop) format handler. When processing a maliciously crafted PSD
> file containing ZIP-compressed layer data that decompresses to less
> than the expected size, uninitialized heap memory is leaked into the
> output image.
>
> https://www.cve.org/CVERecord?id=CVE-2026-24481
>
> - CVE-2026-25638:
> Prior to versions 7.1.2-15 and 6.9.13-40, memory leak exists in
> `coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file,
> resources are allocated. But the function returns early without
> releasing these allocated resources.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25638
>
> - CVE-2026-25794:
> `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute
> the pixel buffer size. Prior to version 7.1.2-15, when image
> dimensions are large, the multiplication overflows 32-bit `int`,
> causing an undersized heap allocation followed by an out-of-bounds
> write. This can crash the process or potentially lead to an out of
> bounds heap write.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25794
>
> - CVE-2026-25795:
> Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSFWImage()`
> (`coders/sfw.c`), when temporary file creation fails, `read_info` is
> destroyed before its `filename` member is accessed, causing a NULL
> pointer dereference and crash.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25795
>
> - CVE-2026-25796:
> Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSTEGANOImage()`
> (`coders/stegano.c`), the `watermark` Image object is not freed on
> three early-return paths, resulting in a definite memory leak
> (~13.5KB+ per invocation) that can be exploited for denial of
> service.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25796
>
> - CVE-2026-25798:
> Prior to versions 7.1.2-15 and 6.9.13-40, a NULL pointer dereference
> in ClonePixelCacheRepository allows a remote attacker to crash any
> application linked against ImageMagick by supplying a crafted image
> file, resulting in denial of service.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25798
>
> - CVE-2026-25799:
> Prior to versions 7.1.2-15 and 6.9.13-40, a logic error in YUV
> sampling factor validation allows an invalid sampling factor to
> bypass checks and trigger a division-by-zero during image loading,
> resulting in a reliable denial-of-service.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25799
>
> - CVE-2026-25897:
> Prior to versions 7.1.2-15 and 6.9.13-40, an Integer Overflow
> vulnerability exists in the sun decoder. On 32-bit systems/builds, a
> carefully crafted image can lead to an out of bounds heap write.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25897
>
> - CVE-2026-25989:
> Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can
> cause a denial of service. An off-by-one boundary check (`>` instead
> of `>=`) that allows bypass the guard and reach an undefined
> `(size_t)` cast.
>
> https://www.cve.org/CVERecord?id=CVE-2026-25989
>
> - CVE-2026-26066:
> Prior to versions 7.1.2-15 and 6.9.13-40, a crafted profile contain
> invalid IPTC data may cause an infinite loop when writing it with
> `IPTCTEXT`.
>
> https://www.cve.org/CVERecord?id=CVE-2026-26066
>
> - CVE-2026-26283:
> Prior to versions 7.1.2-15 and 6.9.13-40, a `continue` statement in
> the JPEG extent binary search loop in the jpeg encoder causes an
> infinite loop when writing persistently fails. An attacker can
> trigger a 100% CPU consumption and process hang (Denial of Service)
> with a crafted image.
>
> https://www.cve.org/CVERecord?id=CVE-2026-26283
>
> - CVE-2026-26284:
> Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper
> boundary checking when processing Huffman- coded data from PCD
> (Photo CD) files. The decoder contains an function that has an
> incorrect initialization that could cause an out of bounds read.
>
> https://www.cve.org/CVERecord?id=CVE-2026-26284
>
> - CVE-2026-26983:
> Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter
> crashes when processing a invalid `<map>` element that causes it to
> use an image after it has been freed.
>
> https://www.cve.org/CVERecord?id=CVE-2026-26983
>
> Signed-off-by: Thomas Perale <thomas.perale@mind.be>
Applied to 2025.02.x & 2025.11.x. Thanks
> ---
> package/imagemagick/imagemagick.hash | 4 ++--
> package/imagemagick/imagemagick.mk | 2 +-
> 2 files changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/package/imagemagick/imagemagick.hash b/package/imagemagick/imagemagick.hash
> index eead3a9f97..90383c4d17 100644
> --- a/package/imagemagick/imagemagick.hash
> +++ b/package/imagemagick/imagemagick.hash
> @@ -1,3 +1,3 @@
> # Locally computed
> -sha256 521fa7a8c0f664a3f5cf7437cbcc219f12bd6d5fe0c1fb014f212fa145076e60 imagemagick-7.1.2-12.tar.gz
> -sha256 a556c5292c87c9a6ac795c80669b0c3660f9f729de8c476bf2b10f83ab1b34ec LICENSE
> +sha256 bf646e7fffdf50b7d886eec6bbe51c3ced1c4d68fbabfcc534e014575359fe7f imagemagick-7.1.2-15.tar.gz
> +sha256 131447ad0099069beaa32acf1700716eea294a5bdf936d8211d7026b1849e5d4 LICENSE
> diff --git a/package/imagemagick/imagemagick.mk b/package/imagemagick/imagemagick.mk
> index 0d5eb2aa34..5a03fbfd8f 100644
> --- a/package/imagemagick/imagemagick.mk
> +++ b/package/imagemagick/imagemagick.mk
> @@ -4,7 +4,7 @@
> #
> ################################################################################
>
> -IMAGEMAGICK_VERSION = 7.1.2-12
> +IMAGEMAGICK_VERSION = 7.1.2-15
> IMAGEMAGICK_SITE = $(call github,ImageMagick,ImageMagick,$(IMAGEMAGICK_VERSION))
> IMAGEMAGICK_LICENSE = Apache-2.0
> IMAGEMAGICK_LICENSE_FILES = LICENSE
> --
> 2.53.0
>
> _______________________________________________
> buildroot mailing list
> buildroot@buildroot.org
> https://lists.buildroot.org/mailman/listinfo/buildroot
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2026-03-06 19:53 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-02-25 8:10 [Buildroot] [PATCH] package/imagemagick: security bump to v7.1.2-15 Thomas Perale via buildroot
2026-02-25 20:55 ` Julien Olivain via buildroot
2026-03-06 19:53 ` Thomas Perale via buildroot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox