Debian Patches

Status for gimp/3.0.4-6.1

Patch Description Author Forwarded Bugs Origin Last update
plug-ins-dds-fix-12790-for-32-bit.patch plug-ins/dds: fix #12790 for 32-bit
On 32-bit systems the computed linear size can overflow, causing a
crash.
Use a function that checks for overflow when multiplying and return
an error if that fails.
As extra security also update the loop to compute the base offset after
each line of data, and convert to gsize first when computing the
size for g_malloc and memset.

(cherry picked from commit c17b324910204a47828d6fbb542bdcefbd66bcc1)
Jacob Boerema <jgboerema@gmail.com> no 2025-06-12
app-Port-from-appstream-glib-to-appstream.patch app: Port from appstream-glib to appstream
From the horse's mouth:
"WARNING: appstream-glib is heavy maintenance mode, use appstream
instead"

Additionally, appstream-glib no longer conforms fully to the
appstream specification.

Some care is taken to taken to support both libappstream 1.0 as well
as libappstream 0.16.x to support stable distros.

(cherry picked from commit 8277817b6250632a5b2499f5fb650f393821b780)
Joey Riches <josephriches@gmail.com> no upstream, after 3.1.2 2025-06-15
plug-ins-Fix-ZDI-CAN-27684.patch plug-ins: Fix ZDI-CAN-27684
Prevent overflow attack by checking if
output >= max, not just output > max.
Alx Sa <cmyk.student@gmail.com> yes debian upstream https://gitlab.gnome.org/GNOME/gimp/-/commit/5f4329d324b0db7a857918941ef7e1d27f3d3992 2025-09-03
plug-ins-fix-dicom-plug-in-ZDI-CAN-27863.patch plug-ins: fix dicom plug-in ZDI-CAN-27863
GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution
Vulnerability

This adds more safety checks and sets actual GError's instead of just
calling gimp_quit.

Closes #14811
Jacob Boerema <jgboerema@gmail.com> yes debian upstream https://gitlab.gnome.org/GNOME/gimp/-/commit/0f309f9a8d82f43fa01383bc5a5c41d28727d9e3 2025-09-03
plug-ins-fix-ZDI-CAN-27878.patch plug-ins: fix ZDI-CAN-27878
GIMP WBMP File Parsing Integer Overflow Remote Code Execution
Vulnerability

We recently fixed one instance of not upgrading the size, but forgot
the other. Fix that here by casting to (gsize). While we're at it,
also add a warning, when reading more data fails unexpectedly.

Closes #14812
Jacob Boerema <jgboerema@gmail.com> yes debian upstream https://gitlab.gnome.org/GNOME/gimp/-/commit/fb31ddf32298bb2f0f09b3ccc53464b8693a050e 2025-09-03
plug-ins-Fix-ZDI-CAN-27836.patch plug-ins: Fix ZDI-CAN-27836
ZDI-CAN-27836: GIMP FF File Parsing Integer Overflow
Remote Code Execution Vulnerability

This patch increases the row_size data type to gsize and checks if it
would overflow based on the width given. It also makes sure the image
size does not exceed GIMP's image size limits.
Alx Sa <cmyk.student@gmail.com> yes debian upstream https://gitlab.gnome.org/GNOME/gimp/-/commit/53b18653bca9404efeab953e75960b1cf7dedbed 2025-09-03

All known versions for source package 'gimp'

Links