Debian Patches
Status for gimp/3.0.4-6.1
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
plug-ins-dds-fix-12790-for-32-bit.patch | plug-ins/dds: fix #12790 for 32-bit On 32-bit systems the computed linear size can overflow, causing a crash. Use a function that checks for overflow when multiplying and return an error if that fails. As extra security also update the loop to compute the base offset after each line of data, and convert to gsize first when computing the size for g_malloc and memset. (cherry picked from commit c17b324910204a47828d6fbb542bdcefbd66bcc1) |
Jacob Boerema <jgboerema@gmail.com> | no | 2025-06-12 | ||
app-Port-from-appstream-glib-to-appstream.patch | app: Port from appstream-glib to appstream From the horse's mouth: "WARNING: appstream-glib is heavy maintenance mode, use appstream instead" Additionally, appstream-glib no longer conforms fully to the appstream specification. Some care is taken to taken to support both libappstream 1.0 as well as libappstream 0.16.x to support stable distros. (cherry picked from commit 8277817b6250632a5b2499f5fb650f393821b780) |
Joey Riches <josephriches@gmail.com> | no | upstream, after 3.1.2 | 2025-06-15 | |
plug-ins-Fix-ZDI-CAN-27684.patch | plug-ins: Fix ZDI-CAN-27684 Prevent overflow attack by checking if output >= max, not just output > max. |
Alx Sa <cmyk.student@gmail.com> | yes | debian upstream | https://gitlab.gnome.org/GNOME/gimp/-/commit/5f4329d324b0db7a857918941ef7e1d27f3d3992 | 2025-09-03 |
plug-ins-fix-dicom-plug-in-ZDI-CAN-27863.patch | plug-ins: fix dicom plug-in ZDI-CAN-27863 GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability This adds more safety checks and sets actual GError's instead of just calling gimp_quit. Closes #14811 |
Jacob Boerema <jgboerema@gmail.com> | yes | debian upstream | https://gitlab.gnome.org/GNOME/gimp/-/commit/0f309f9a8d82f43fa01383bc5a5c41d28727d9e3 | 2025-09-03 |
plug-ins-fix-ZDI-CAN-27878.patch | plug-ins: fix ZDI-CAN-27878 GIMP WBMP File Parsing Integer Overflow Remote Code Execution Vulnerability We recently fixed one instance of not upgrading the size, but forgot the other. Fix that here by casting to (gsize). While we're at it, also add a warning, when reading more data fails unexpectedly. Closes #14812 |
Jacob Boerema <jgboerema@gmail.com> | yes | debian upstream | https://gitlab.gnome.org/GNOME/gimp/-/commit/fb31ddf32298bb2f0f09b3ccc53464b8693a050e | 2025-09-03 |
plug-ins-Fix-ZDI-CAN-27836.patch | plug-ins: Fix ZDI-CAN-27836 ZDI-CAN-27836: GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability This patch increases the row_size data type to gsize and checks if it would overflow based on the width given. It also makes sure the image size does not exceed GIMP's image size limits. |
Alx Sa <cmyk.student@gmail.com> | yes | debian upstream | https://gitlab.gnome.org/GNOME/gimp/-/commit/53b18653bca9404efeab953e75960b1cf7dedbed | 2025-09-03 |
All known versions for source package 'gimp'
- 3.0.4-6.1 (sid)
- 3.0.4-6 (forky)
- 3.0.4-3+deb13u1 (trixie-security)
- 3.0.4-3 (trixie)
- 2.10.34-1+deb12u3 (bookworm-security, bookworm)