Package: gimp / 2.10.34-1+deb12u3
Metadata
| Package | Version | Patches format | 
|---|---|---|
| gimp | 2.10.34-1+deb12u3 | 3.0 (quilt) | 
Patch series
view the series file| Patch | File delta | Description | 
|---|---|---|
| 01_hurd_ftbfs.patch | (download) | 
              libgimpbase/gimpreloc.c |
                    3 	3 +	0 -	0 !  | 
          define path_max to fix build on the hurd.  | 
        
| 02_hurd_ftbfs.patch | (download) | 
              plug-ins/common/qbist.c |
                    3 	3 +	0 -	0 !  | 
          qbist: define path_max on hurd Bug-Debian: https://bugs.debian.org/934077  | 
        
| plug ins Fix vulnerabilities in file psp.patch | (download) | 
              plug-ins/common/file-psp.c |
                   13 	11 +	2 -	0 !  | 
          plug-ins: fix vulnerabilities in file-psp  | 
        
| plug ins Fix vulnerability in file psd.patch | (download) | 
              plug-ins/file-psd/psd-util.c |
                    1 	1 +	0 -	0 !  | 
          plug-ins: fix vulnerability in file-psd  | 
        
| plug ins Fix DDS vulnerability ZDI CAN 22093.patch | (download) | 
              plug-ins/file-dds/ddsread.c |
                   15 	15 +	0 -	0 !  | 
          plug-ins: fix dds vulnerability (zdi-can-22093)  | 
        
| plug ins Fix DDS import regression from 7db71cd0.patch | (download) | 
              plug-ins/file-dds/ddsread.c |
                   39 	29 +	10 -	0 !  | 
          plug-ins: fix dds import regression from 7db71cd0  | 
        
| plug ins Additional fixes for DDS Import.patch | (download) | 
              plug-ins/file-dds/ddsread.c |
                    8 	6 +	2 -	0 !  | 
          plug-ins: additional fixes for dds import  | 
        
| CVE 2025 2760.patch | (download) | 
              plug-ins/file-dds/ddsread.c |
                    8 	8 +	0 -	0 !  | 
          ---  | 
        
| CVE 2025 2761.patch | (download) | 
              plug-ins/file-fli/fli.c |
                    2 	1 +	1 -	0 !  | 
          [patch] plug-ins: fix zdi-can-25100 for fli plug-in Resolves #13073 This patch adds a check to make sure we're not writing beyond the bounds of the "pos" array. This is the same check that we do earlier when writing pos[xc++], but it was left off of the last write command. Since "n" will be 0 if we get to the end of the array, it prevents us from writing beyond that.  | 
        
| CVE 2025 48797 1.patch | (download) | 
              plug-ins/common/file-tga.c |
                   11 	2 +	9 -	0 !  | 
          ---  | 
        
| CVE 2025 48797 2.patch | (download) | 
              plug-ins/common/file-tga.c |
                   47 	23 +	24 -	0 !  | 
          ---  | 
        
| CVE 2025 48797 3.patch | (download) | 
              plug-ins/common/file-tga.c |
                    2 	1 +	1 -	0 !  | 
          ---  | 
        
| CVE 2025 48797 4.patch | (download) | 
              plug-ins/common/file-tga.c |
                   19 	17 +	2 -	0 !  | 
          ---  | 
        
| CVE 2025 48798 1.patch | (download) | 
              app/xcf/xcf-load.c |
                   18 	14 +	4 -	0 !  | 
          ---  | 
        
| CVE 2025 48798 2.patch | (download) | 
              app/xcf/xcf-load.c |
                   22 	22 +	0 -	0 !  | 
          ---  | 
        
| ZDI CAN 26752.patch | (download) | 
              plug-ins/file-ico/ico-load.c |
                    6 	5 +	1 -	0 !  | 
          [patch] plug-ins: zdi-can-26752 mitigation Resolves #13910 Since ICO can store PNGs, it's possible to create an icon that's much larger than the stated image size and cause a buffer overflow. This patch adds a check to make sure the width * height * 4 calculation does not overflow in addition to making sure it doesn't exceed the maximum allowed size for that icon.  | 
        
