Debian Package Tracker
Register | Log in
Subscribe

gegl

Generic Graphics Library Test Program

Choose email to subscribe with

general
  • source: gegl (main)
  • version: 1:0.4.26-2
  • maintainer: Debian GNOME Maintainers (archive) (DMD)
  • uploaders: Jeremy Bicha [DMD]
  • arch: all any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.2.0-7
  • oldstable: 0.3.8-4
  • stable: 0.4.12-2
  • testing: 1:0.4.26-2
  • unstable: 1:0.4.26-2
versioned links
  • 0.2.0-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3.8-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.4.12-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:0.4.26-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gegl
  • gir1.2-gegl-0.4
  • libgegl-0.4-0 (1 bugs: 0, 1, 0, 0)
  • libgegl-common
  • libgegl-dev (2 bugs: 0, 2, 0, 0)
  • libgegl-doc
action needed
A new upstream version is available: 0.4.28 high
A new upstream version 0.4.28 is available, you should consider packaging it.
Created: 2020-12-22 Last update: 2021-01-16 14:01
2 security issues in sid high
There are 2 open security issues in sid.
2 important issues:
  • CVE-2018-10111: An issue was discovered in GEGL through 0.3.32. The render_rectangle function in process/gegl-processor.c has unbounded memory allocation, leading to a denial of service (application crash) upon allocation failure.
  • CVE-2018-10112: An issue was discovered in GEGL through 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.
Please fix them.
Created: 2018-04-15 Last update: 2020-12-14 23:36
lintian reports 4 errors and 2 warnings high
Lintian reports 4 errors and 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2020-08-22 06:03
4 ignored security issues in stretch low
There are 4 open security issues in stretch.
4 issues skipped by the security teams:
  • CVE-2018-10111: An issue was discovered in GEGL through 0.3.32. The render_rectangle function in process/gegl-processor.c has unbounded memory allocation, leading to a denial of service (application crash) upon allocation failure.
  • CVE-2018-10112: An issue was discovered in GEGL through 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.
  • CVE-2018-10113: An issue was discovered in GEGL through 0.3.32. The process function in operations/external/ppm-load.c has unbounded memory allocation, leading to a denial of service (application crash) upon allocation failure.
  • CVE-2018-10114: An issue was discovered in GEGL through 0.3.32. The gegl_buffer_iterate_read_simple function in buffer/gegl-buffer-access.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PPM file, related to improper restrictions on memory allocation in the ppm_load_read_header function in operations/external/ppm-load.c.
Please fix them.
Created: 2018-04-15 Last update: 2020-12-14 23:36
2 ignored security issues in buster low
There are 2 open security issues in buster.
2 issues skipped by the security teams:
  • CVE-2018-10111: An issue was discovered in GEGL through 0.3.32. The render_rectangle function in process/gegl-processor.c has unbounded memory allocation, leading to a denial of service (application crash) upon allocation failure.
  • CVE-2018-10112: An issue was discovered in GEGL through 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.
Please fix them.
Created: 2018-04-15 Last update: 2020-12-14 23:36
2 ignored security issues in bullseye low
There are 2 open security issues in bullseye.
2 issues skipped by the security teams:
  • CVE-2018-10111: An issue was discovered in GEGL through 0.3.32. The render_rectangle function in process/gegl-processor.c has unbounded memory allocation, leading to a denial of service (application crash) upon allocation failure.
  • CVE-2018-10112: An issue was discovered in GEGL through 0.3.32. The gegl_tile_backend_swap_constructed function in buffer/gegl-tile-backend-swap.c allows remote attackers to cause a denial of service (write access violation) or possibly have unspecified other impact via a malformed PNG file that is mishandled during a call to the babl_format_get_bytes_per_pixel function in babl-format.c in babl 0.1.46.
Please fix them.
Created: 2019-07-07 Last update: 2020-12-14 23:36
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2020-08-19 Last update: 2020-08-19 16:33
news
[rss feed]
  • [2020-11-29] gegl 1:0.4.26-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-29] gegl 1:0.4.26-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-24] Accepted gegl 1:0.4.26-2 (source) into unstable (Simon McVittie)
  • [2020-08-31] gegl 1:0.4.26-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-26] Accepted gegl 1:0.4.26-1 (source) into unstable (Simon McVittie)
  • [2020-07-01] gegl 0.4.24-1 MIGRATED to testing (Debian testing watch)
  • [2020-06-13] Accepted gegl 0.4.24-1 (source) into unstable (Jeremy Bicha)
  • [2020-03-23] gegl 0.4.22-3 MIGRATED to testing (Debian testing watch)
  • [2020-03-18] Accepted gegl 0.4.22-3 (source) into unstable (Simon McVittie)
  • [2020-03-17] Accepted gegl 0.4.22-2 (source) into unstable (Simon McVittie)
  • [2020-02-22] Accepted gegl 0.4.22-1 (source) into unstable (Andreas Henriksson)
  • [2019-11-21] Accepted gegl 0.4.18-2 (source) into unstable (Sebastien Bacher)
  • [2019-11-09] Accepted gegl 0.4.18-1 (source) into unstable (Jeremy Bicha)
  • [2019-11-02] gegl 0.4.16-2 MIGRATED to testing (Debian testing watch)
  • [2019-10-27] Accepted gegl 0.4.16-2 (source) into unstable (Jeremy Bicha)
  • [2019-10-19] gegl 0.4.16-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-14] Accepted gegl 0.4.16-1 (source) into unstable (Jeremy Bicha)
  • [2019-09-18] gegl 0.4.14-2 MIGRATED to testing (Debian testing watch)
  • [2019-09-16] Accepted gegl 0.4.14-2 (source) into unstable (Jeremy Bicha)
  • [2019-03-05] Accepted gegl 0.4.14-1 (source) into unstable (Jeremy Bicha)
  • [2018-12-31] gegl 0.4.12-2 MIGRATED to testing (Debian testing watch)
  • [2018-12-24] Accepted gegl 0.4.12-2 (source) into unstable (Jeremy Bicha)
  • [2018-11-14] gegl 0.4.12-1 MIGRATED to testing (Debian testing watch)
  • [2018-11-09] Accepted gegl 0.4.12-1 (source) into unstable (Jeremy Bicha)
  • [2018-10-22] gegl 0.4.10-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-16] Accepted gegl 0.4.10-1 (source) into unstable (Jeremy Bicha)
  • [2018-08-25] gegl 0.4.8-1 MIGRATED to testing (Debian testing watch)
  • [2018-08-20] Accepted gegl 0.4.8-1 (source) into unstable (Jeremy Bicha)
  • [2018-08-06] gegl 0.4.6-1 MIGRATED to testing (Debian testing watch)
  • [2018-07-31] Accepted gegl 0.4.6-1 (source) into unstable (Jeremy Bicha)
  • 1
  • 2
bugs [bug history graph]
  • all: 6
  • RC: 0
  • I&N: 6
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (4, 2)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 79)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:0.4.26-2
  • 4 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing