Package: gimp / 2.10.34-1+deb12u3
Metadata
Package | Version | Patches format |
---|---|---|
gimp | 2.10.34-1+deb12u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
01_hurd_ftbfs.patch | (download) |
libgimpbase/gimpreloc.c |
3 3 + 0 - 0 ! |
define path_max to fix build on the hurd. |
02_hurd_ftbfs.patch | (download) |
plug-ins/common/qbist.c |
3 3 + 0 - 0 ! |
qbist: define path_max on hurd Bug-Debian: https://bugs.debian.org/934077 |
plug ins Fix vulnerabilities in file psp.patch | (download) |
plug-ins/common/file-psp.c |
13 11 + 2 - 0 ! |
plug-ins: fix vulnerabilities in file-psp |
plug ins Fix vulnerability in file psd.patch | (download) |
plug-ins/file-psd/psd-util.c |
1 1 + 0 - 0 ! |
plug-ins: fix vulnerability in file-psd |
plug ins Fix DDS vulnerability ZDI CAN 22093.patch | (download) |
plug-ins/file-dds/ddsread.c |
15 15 + 0 - 0 ! |
plug-ins: fix dds vulnerability (zdi-can-22093) |
plug ins Fix DDS import regression from 7db71cd0.patch | (download) |
plug-ins/file-dds/ddsread.c |
39 29 + 10 - 0 ! |
plug-ins: fix dds import regression from 7db71cd0 |
plug ins Additional fixes for DDS Import.patch | (download) |
plug-ins/file-dds/ddsread.c |
8 6 + 2 - 0 ! |
plug-ins: additional fixes for dds import |
CVE 2025 2760.patch | (download) |
plug-ins/file-dds/ddsread.c |
8 8 + 0 - 0 ! |
--- |
CVE 2025 2761.patch | (download) |
plug-ins/file-fli/fli.c |
2 1 + 1 - 0 ! |
[patch] plug-ins: fix zdi-can-25100 for fli plug-in Resolves #13073 This patch adds a check to make sure we're not writing beyond the bounds of the "pos" array. This is the same check that we do earlier when writing pos[xc++], but it was left off of the last write command. Since "n" will be 0 if we get to the end of the array, it prevents us from writing beyond that. |
CVE 2025 48797 1.patch | (download) |
plug-ins/common/file-tga.c |
11 2 + 9 - 0 ! |
--- |
CVE 2025 48797 2.patch | (download) |
plug-ins/common/file-tga.c |
47 23 + 24 - 0 ! |
--- |
CVE 2025 48797 3.patch | (download) |
plug-ins/common/file-tga.c |
2 1 + 1 - 0 ! |
--- |
CVE 2025 48797 4.patch | (download) |
plug-ins/common/file-tga.c |
19 17 + 2 - 0 ! |
--- |
CVE 2025 48798 1.patch | (download) |
app/xcf/xcf-load.c |
18 14 + 4 - 0 ! |
--- |
CVE 2025 48798 2.patch | (download) |
app/xcf/xcf-load.c |
22 22 + 0 - 0 ! |
--- |
ZDI CAN 26752.patch | (download) |
plug-ins/file-ico/ico-load.c |
6 5 + 1 - 0 ! |
[patch] plug-ins: zdi-can-26752 mitigation Resolves #13910 Since ICO can store PNGs, it's possible to create an icon that's much larger than the stated image size and cause a buffer overflow. This patch adds a check to make sure the width * height * 4 calculation does not overflow in addition to making sure it doesn't exceed the maximum allowed size for that icon. |