Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.2/patches/2224350/?format=api
{ "id": 2224350, "url": "http://patchwork.ozlabs.org/api/1.2/patches/2224350/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260417102200.137169-1-thomas.perale@mind.be/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/1.2/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260417102200.137169-1-thomas.perale@mind.be>", "list_archive_url": null, "date": "2026-04-17T10:22:00", "name": "[2025.02.x] package/giflib: patch CVE-2021-40633, CVE-2025-31344, CVE-2026-23868", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "0bda584ce3ec32298daea9e59c732fb5e4fdff49", "submitter": { "id": 87308, "url": "http://patchwork.ozlabs.org/api/1.2/people/87308/?format=api", "name": "Thomas Perale", "email": "thomas.perale@mind.be" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260417102200.137169-1-thomas.perale@mind.be/mbox/", "series": [ { "id": 500301, "url": "http://patchwork.ozlabs.org/api/1.2/series/500301/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=500301", "date": "2026-04-17T10:22:00", "name": "[2025.02.x] package/giflib: patch CVE-2021-40633, CVE-2025-31344, CVE-2026-23868", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/500301/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2224350/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2224350/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@buildroot.org>", "X-Original-To": [ "incoming-buildroot@patchwork.ozlabs.org", "buildroot@buildroot.org" ], "Delivered-To": [ "patchwork-incoming-buildroot@legolas.ozlabs.org", "buildroot@buildroot.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=LGr9bw5z;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)" ], "Received": [ "from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxrXh3GNKz1yDF\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Fri, 17 Apr 2026 20:22:10 +1000 (AEST)", "from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 1EA8381422;\n\tFri, 17 Apr 2026 10:22:08 +0000 (UTC)", "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id C3hap6T-mZ-t; Fri, 17 Apr 2026 10:22:07 +0000 (UTC)", "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 11F8381425;\n\tFri, 17 Apr 2026 10:22:07 +0000 (UTC)", "from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138])\n by lists1.osuosl.org (Postfix) with ESMTP id 743D7396\n for <buildroot@buildroot.org>; Fri, 17 Apr 2026 10:22:06 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by smtp1.osuosl.org (Postfix) with ESMTP id 6622281425\n for <buildroot@buildroot.org>; Fri, 17 Apr 2026 10:22:06 +0000 (UTC)", "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id OlEPIzrJqXKI for <buildroot@buildroot.org>;\n Fri, 17 Apr 2026 10:22:05 +0000 (UTC)", "from mail-wm1-x334.google.com (mail-wm1-x334.google.com\n [IPv6:2a00:1450:4864:20::334])\n by smtp1.osuosl.org (Postfix) with ESMTPS id 36B9181422\n for <buildroot@buildroot.org>; Fri, 17 Apr 2026 10:22:04 +0000 (UTC)", "by mail-wm1-x334.google.com with SMTP id\n 5b1f17b1804b1-488aa77a06eso8915035e9.0\n for <buildroot@buildroot.org>; Fri, 17 Apr 2026 03:22:04 -0700 (PDT)", "from arch ([79.132.232.220]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488fbc92a9dsm19073065e9.1.2026.04.17.03.22.01\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Fri, 17 Apr 2026 03:22:01 -0700 (PDT)" ], "X-Virus-Scanned": [ "amavis at osuosl.org", "amavis at osuosl.org" ], "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ", "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 smtp1.osuosl.org 11F8381425", "OpenDKIM Filter v2.11.0 smtp1.osuosl.org 36B9181422" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776421327;\n\tbh=x+VTy7QHtWeUqUBtofS7Qy+OhcpkriqwDO1xmqlYLjs=;\n\th=To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From:Reply-To:From;\n\tb=LGr9bw5z1PwYpDNlna4GF01t8gSDrtjyQvS/zPzSAPYcg0k/0rCQU7BNPyOsVkwCc\n\t pqVkFA2nI2IR1RLKo9ZZpHuQiAWIQlUzEkFIA0un/VsZdPkG27b0ds7WgRampkEM3c\n\t uPTcWoAXJF+edokB/jabHRzJrNxQMqxGB7gCLOy3ghUBK5MtldWCJhigeyMZFH8uEA\n\t iSgpSwyb27AB4Q7LfeojYCh5cypTctd3fxBUdYtd8HKOlU+GC7yVGXBzZhn1UwfKm3\n\t kf286oH6L3KrCqb1OS5aZBrEW2Law+mrhC2R9bkx/c9kYVm+wRK0Lw+W7BnVM01vFC\n\t 8Ju6cKRbiag/Q==", "Received-SPF": "Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::334; helo=mail-wm1-x334.google.com;\n envelope-from=thomas.perale@essensium.com; receiver=<UNKNOWN>", "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp1.osuosl.org 36B9181422", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776421322; x=1777026122;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=wajPflPVdBsJoovade+f58u3//bE7PpsbGC66tJWqyU=;\n b=qA333KgE4yloKlXsgjj5elQ45gvStdQll2bRnMqtuKjyEiScKdhlBSzHjEO4TjBQkt\n +O41RXwueuNdSTCfFX3iaKt5jZ6vmpnwXBuMNyRtP/ROka//OH7HyECx3VRVmWr5JT2j\n sOW+7oWlTPoHLHBdnKcfrnu9+YPY1zTFXjuRV6IRAwHuRQzA3nAesGwWIVjurhtN1BvG\n vZlEw9lFnBrxfHelzHttHxJN4euYWgCoueF3Dux/MsxmA0WAuKgrIq9bE4kNLsvyrXHA\n oOAxqSJfhi7cKcBBiNijtfrF8BBJmTUosqV4eOcuDZO0laoctXhaO5gHDwBtwam1d4i3\n ZZ7g==", "X-Gm-Message-State": "AOJu0Yw3Rqe9y91rLGN472JFbTimAuF2P/YlCoQUjEzv2Zp/Cmmkm8Ou\n LqlrMSgGOsU2pXm0wHAdBfRU255gZvifDVqEzKKgTZ1FiYl1wJoOSrfxxq4PSm7C6NMxpQImaKx\n cQ+Al", "X-Gm-Gg": "AeBDievTgohw8VsGbiOS7Iu3uY3IAPKFoxXpCk61/koi2d0SFN6k7MBgnbejwAgOcUW\n VGv/vjRi2trB222FxNM5OwMhGW6/HbwCEGWe8CeTGBQIeodTMxePL3Ch6DSnfrnBQTkCjE+/Wsk\n vODc6quoWPdb/Dq182+ykLvzmKGjzsUiMxweqGOKBS2Y2DBtYRQyEh4mQIJglDE7tQL8VzSkmKk\n BmY9xNCgiCZqtDyuy3pjz1sft4vv/9pGAd4P04G53wAU9TRzWFrQfVvFNb+31pZa4Uw3oXP97gV\n jHggI+VOFFKqiGoTuq08GCf0chyrkQLX5h+PqFVcwIGBwzdDejkUuhoxboRdMpfULyyWbd0w8Zx\n etUQHkbcyZV2y9Vz42WYNdkwUd9kbZTK6//toVANmoA1FPD4sVLwnbll15Otz+njAgBxEr9ZKCT\n BsiOCprNRUImqtDvK9pUzaqX1HFho=", "X-Received": "by 2002:a05:600c:a116:b0:488:a8f0:35bd with SMTP id\n 5b1f17b1804b1-488fb746d7fmr22649155e9.8.1776421322057;\n Fri, 17 Apr 2026 03:22:02 -0700 (PDT)", "To": "buildroot@buildroot.org", "Cc": "Bernd Kuhls <bernd@kuhls.net>", "Date": "Fri, 17 Apr 2026 12:22:00 +0200", "Message-ID": "<20260417102200.137169-1-thomas.perale@mind.be>", "X-Mailer": "git-send-email 2.53.0", "MIME-Version": "1.0", "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=mind.be; s=google; t=1776421322; x=1777026122; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:from:to:cc:subject:date:message-id:reply-to;\n bh=wajPflPVdBsJoovade+f58u3//bE7PpsbGC66tJWqyU=;\n b=NuvxncOUdB8XUIx1aqf91/AgW+eof575ZyIONuwwfJMnFBZr9J+xH8mGkr+cvuv93Q\n S0FLPzfn71mPuw8ObawyQq5JaKJV/tc/YZPY311lwIanFSPHuht4/PwbagusEuVbP0I9\n Dw4kJ+HbywWz+jomnkEQCYczuTpmH1jXrmCRtP1ZXY8Y2E3gUrsZL4bQbhc1dr2Nswx0\n tFhyimgCr0fJZ/FZROmHYHjdZtf8BleQA6JwGoz+tmCpIHKp6BR5XeaahHjnpsYdM2Tu\n oIK/NLNOhG/xxF3lETQ9yrOr/NOAu9IJpBIctgfuIwP/2YaLI9aKNkLb84DXsZ8dpIW0\n vV4A==", "X-Mailman-Original-Authentication-Results": [ "smtp1.osuosl.org;\n dmarc=pass (p=quarantine dis=none)\n header.from=mind.be", "smtp1.osuosl.org;\n dkim=pass (2048-bit key) header.d=mind.be header.i=@mind.be\n header.a=rsa-sha256 header.s=google header.b=NuvxncOU" ], "Subject": "[Buildroot] [PATCH 2025.02.x] package/giflib: patch CVE-2021-40633,\n CVE-2025-31344, CVE-2026-23868", "X-BeenThere": "buildroot@buildroot.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>", "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>", "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@buildroot.org>", "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>", "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>", "From": "Thomas Perale via buildroot <buildroot@buildroot.org>", "Reply-To": "Thomas Perale <thomas.perale@mind.be>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@buildroot.org", "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>" }, "content": "Fixes the following vulnerabilities:\n\n- CVE-2021-40633:\n A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib\n 5.1.4 allows remote attackers trigger an out of memory exception or\n denial of service via a gif format file.\n\nFor more information, see:\n - https://www.cve.org/CVERecord?id=CVE-2021-40633\n - https://sourceforge.net/p/giflib/code/ci/ccbc956432650734c91acb3fc88837f7b81267ff/\n\n- CVE-2025-31344:\n Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux.\n This vulnerability is associated with program files gif2rgb.C. This\n issue affects giflib: through 5.2.2.\n\nFor more information, see:\n - https://www.cve.org/CVERecord?id=CVE-2025-31344\n - https://sourceforge.net/p/giflib/code/ci/7bbe8ea1a595bb7509ffa0a86b076e9b720e85af\n\n- CVE-2026-23868:\n Giflib contains a double-free vulnerability that is the result of a\n shallow copy in GifMakeSavedImage and incorrect error handling. The\n conditions needed to trigger this vulnerability are difficult but may\n be possible.\n\nFor more information, see:\n - https://www.cve.org/CVERecord?id=CVE-2026-23868\n - https://sourceforge.net/p/giflib/code/ci/f5b7267aed3665ef025c13823e454170d031c106\n\nThis package is still vulnerable to CVE-2024-45993 [1] & CVE-2026-26740\n[2] that doesn't have a documented fix yet.\n\n[1] https://security-tracker.debian.org/tracker/CVE-2024-45993\n[2] https://security-tracker.debian.org/tracker/CVE-2026-26740\n\nSigned-off-by: Thomas Perale <thomas.perale@mind.be>\n---\n package/giflib/0003-CVE-2021-40633.patch | 24 ++++++++++++++++++++\n package/giflib/0004-CVE-2025-31344.patch | 26 +++++++++++++++++++++\n package/giflib/0005-CVE-2026-23868.patch | 29 ++++++++++++++++++++++++\n package/giflib/giflib.mk | 9 ++++++++\n 4 files changed, 88 insertions(+)\n create mode 100644 package/giflib/0003-CVE-2021-40633.patch\n create mode 100644 package/giflib/0004-CVE-2025-31344.patch\n create mode 100644 package/giflib/0005-CVE-2026-23868.patch", "diff": "diff --git a/package/giflib/0003-CVE-2021-40633.patch b/package/giflib/0003-CVE-2021-40633.patch\nnew file mode 100644\nindex 0000000000..4e0070401e\n--- /dev/null\n+++ b/package/giflib/0003-CVE-2021-40633.patch\n@@ -0,0 +1,24 @@\n+commit ccbc956432650734c91acb3fc88837f7b81267ff\n+Author: Eric S. Raymond <esr@thyrsus.com>\n+Date: Wed Feb 21 18:55:00 2024 -0500\n+\n+ Clean up memory better at end of run (CVE-2021-40633)\n+\n+CVE: CVE-2021-40633\n+Upstream: https://sourceforge.net/p/giflib/code/ci/ccbc956432650734c91acb3fc88837f7b81267ff/\n+Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n+\n+diff --git a/gif2rgb.c b/gif2rgb.c\n+index d51226d..fc2e683 100644\n+--- a/gif2rgb.c\n++++ b/gif2rgb.c\n+@@ -525,6 +525,9 @@ static void GIF2RGB(int NumFiles, char *FileName, bool OneFileFlag,\n+ \tDumpScreen2RGB(OutFileName, OneFileFlag, ColorMap, ScreenBuffer,\n+ \t GifFile->SWidth, GifFile->SHeight);\n+ \n++\tfor (i = 0; i < GifFile->SHeight; i++) {\n++ \t(void)free(ScreenBuffer[i]);\n++\t}\n+ \t(void)free(ScreenBuffer);\n+ \n+ \t{\ndiff --git a/package/giflib/0004-CVE-2025-31344.patch b/package/giflib/0004-CVE-2025-31344.patch\nnew file mode 100644\nindex 0000000000..2d74b526c4\n--- /dev/null\n+++ b/package/giflib/0004-CVE-2025-31344.patch\n@@ -0,0 +1,26 @@\n+commit 7bbe8ea1a595bb7509ffa0a86b076e9b720e85af\n+Author: Eric S. Raymond <esr@thyrsus.com>\n+Date: Wed Feb 18 18:06:50 2026 -0500\n+\n+ Resolve SourceForge bug #187: CVE-2025-31344\n+\n+CVE: CVE-2025-31344\n+Upstream: https://sourceforge.net/p/giflib/code/ci/7bbe8ea1a595bb7509ffa0a86b076e9b720e85af\n+Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n+\n+diff --git a/gif2rgb.c b/gif2rgb.c\n+index b80ebcd..da4fa23 100644\n+--- a/gif2rgb.c\n++++ b/gif2rgb.c\n+@@ -327,6 +327,11 @@ static void DumpScreen2RGB(char *FileName, int OneFileFlag,\n+ \t\t\tGifRow = ScreenBuffer[i];\n+ \t\t\tGifQprintf(\"\\b\\b\\b\\b%-4d\", ScreenHeight - i);\n+ \t\t\tfor (j = 0; j < ScreenWidth; j++) {\n++\t\t\t\t/* Check if color is within color palete */\n++\t\t\t\tif (GifRow[j] >= ColorMap->ColorCount) {\n++\t\t\t\t\tGIF_EXIT(GifErrorString(\n++\t\t\t\t\t D_GIF_ERR_IMAGE_DEFECT));\n++\t\t\t\t}\n+ \t\t\t\tColorMapEntry = &ColorMap->Colors[GifRow[j]];\n+ \t\t\t\tBuffers[0][j] = ColorMapEntry->Red;\n+ \t\t\t\tBuffers[1][j] = ColorMapEntry->Green;\ndiff --git a/package/giflib/0005-CVE-2026-23868.patch b/package/giflib/0005-CVE-2026-23868.patch\nnew file mode 100644\nindex 0000000000..176325ef77\n--- /dev/null\n+++ b/package/giflib/0005-CVE-2026-23868.patch\n@@ -0,0 +1,29 @@\n+commit f5b7267aed3665ef025c13823e454170d031c106\n+Author: Eric S. Raymond <esr@thyrsus.com>\n+Date: Wed Mar 4 18:49:49 2026 -0500\n+\n+ Avoid potentuial double-free on weird images.\n+\n+CVE: CVE-2026-23868\n+Upstream: https://sourceforge.net/p/giflib/code/ci/f5b7267aed3665ef025c13823e454170d031c106\n+Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n+\n+diff --git a/gifalloc.c b/gifalloc.c\n+index 01a845d..ff70cb0 100644\n+--- a/gifalloc.c\n++++ b/gifalloc.c\n+@@ -349,6 +349,14 @@ SavedImage *GifMakeSavedImage(GifFileType *GifFile,\n+ \t\t\t * aliasing problems.\n+ \t\t\t */\n+ \n++\t\t\t/* Null out aliased pointers before any allocations\n++\t\t\t * so that FreeLastSavedImage won't free CopyFrom's\n++\t\t\t * data if an allocation fails partway through. */\n++\t\t\tsp->ImageDesc.ColorMap = NULL;\n++\t\t\tsp->RasterBits = NULL;\n++\t\t\tsp->ExtensionBlocks = NULL;\n++\t\t\tsp->ExtensionBlockCount = 0;\n++ \n+ \t\t\t/* first, the local color map */\n+ \t\t\tif (CopyFrom->ImageDesc.ColorMap != NULL) {\n+ \t\t\t\tsp->ImageDesc.ColorMap = GifMakeMapObject(\ndiff --git a/package/giflib/giflib.mk b/package/giflib/giflib.mk\nindex 00922ce2db..db9886342c 100644\n--- a/package/giflib/giflib.mk\n+++ b/package/giflib/giflib.mk\n@@ -12,6 +12,15 @@ GIFLIB_LICENSE = MIT\n GIFLIB_LICENSE_FILES = COPYING\n GIFLIB_CPE_ID_VALID = YES\n \n+# 0003-CVE-2021-40633.patch\n+GIFLIB_IGNORE_CVES += CVE-2021-40633\n+\n+# 0004-CVE-2025-31344.patch\n+GIFLIB_IGNORE_CVES += CVE-2025-31344\n+\n+# 0005-CVE-2026-23868.patch\n+GIFLIB_IGNORE_CVES += CVE-2026-23868\n+\n ifeq ($(BR2_STATIC_LIBS),y)\n GIFLIB_BUILD_LIBS = static-lib\n GIFLIB_INSTALL_LIBS = install-static-lib\n", "prefixes": [ "2025.02.x" ] }