Debian Package Tracker
Register | Log in
Subscribe

xcftools

command-line tools for extracting data for XCF files

Choose email to subscribe with

general
  • source: xcftools (main)
  • version: 1.0.7-6
  • maintainer: Jan Hauke Rahm (DMD)
  • arch: any
  • std-ver: 3.9.8
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.0.7-4
  • oldstable: 1.0.7-6
  • stable: 1.0.7-6
  • testing: 1.0.7-6
  • unstable: 1.0.7-6
versioned links
  • 1.0.7-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.7-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • xcftools (1 bugs: 0, 1, 0, 0)
action needed
Failed to analyze the VCS repository. Please troubleshoot and fix the issue. high
vcswatch reports that there is an error with this package's VCS, or the debian/changelog file inside it. Please check the error shown below and try to fix it. You might have to update the VCS URL in the debian/control file to point to the correct repository.

fatal: repository 'https://anonscm.debian.org/git/collab-maint/xcftools.git/' not found
Created: 2018-06-01 Last update: 2019-12-13 22:44
2 security issues in buster high
There are 2 open security issues in buster.
2 important issues:
  • CVE-2019-5086: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
  • CVE-2019-5087: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
Please fix them.
Created: 2019-11-22 Last update: 2019-11-23 06:49
2 security issues in bullseye high
There are 2 open security issues in bullseye.
2 important issues:
  • CVE-2019-5086: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
  • CVE-2019-5087: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
Please fix them.
Created: 2019-11-22 Last update: 2019-11-23 06:49
2 security issues in sid high
There are 2 open security issues in sid.
2 important issues:
  • CVE-2019-5086: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
  • CVE-2019-5087: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
Please fix them.
Created: 2019-11-22 Last update: 2019-11-23 06:49
2 security issues in jessie high
There are 2 open security issues in jessie.
2 important issues:
  • CVE-2019-5086: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
  • CVE-2019-5087: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
Please fix them.
Created: 2019-11-22 Last update: 2019-11-23 06:49
2 security issues in stretch high
There are 2 open security issues in stretch.
2 important issues:
  • CVE-2019-5086: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
  • CVE-2019-5087: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.
Please fix them.
Created: 2019-11-22 Last update: 2019-11-23 06:49
Standards version of the package is outdated. high
The package is severely out of date with respect to the Debian Policy. The package should be updated to follow the last version of Debian Policy (Standards-Version 4.4.1 instead of 3.9.8).
Created: 2018-04-16 Last update: 2019-09-29 23:40
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2019-04-01 Last update: 2019-12-14 11:35
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2019-08-24 Last update: 2019-08-24 02:18
The URL(s) for this package had some recent persistent issues low
DUCK reports some issues concerning upstream URLs defined for this package.
Created: 2019-01-12 Last update: 2019-12-14 09:36
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2014-07-02 Last update: 2014-07-02 18:05
news
[rss feed]
  • [2016-05-24] xcftools 1.0.7-6 MIGRATED to testing (Debian testing watch)
  • [2016-05-18] Accepted xcftools 1.0.7-6 (source) into unstable (Gianfranco Costamagna)
  • [2016-01-29] xcftools 1.0.7-5 MIGRATED to testing (Debian testing watch)
  • [2016-01-24] Accepted xcftools 1.0.7-5 (source) into unstable (Tobias Frost)
  • [2012-03-05] xcftools 1.0.7-4 MIGRATED to testing (Debian testing watch)
  • [2012-02-23] Accepted xcftools 1.0.7-4 (source amd64) (Jan Hauke Rahm)
  • [2011-10-17] xcftools 1.0.7-3 MIGRATED to testing (Debian testing watch)
  • [2011-10-06] Accepted xcftools 1.0.7-3 (source amd64) (Jan Hauke Rahm)
  • [2010-03-23] xcftools 1.0.7-2 MIGRATED to testing (Debian testing watch)
  • [2010-03-05] Accepted xcftools 1.0.7-2 (source amd64) (Jan Hauke Rahm)
  • [2009-10-12] Accepted xcftools 1.0.4-1+etch1 (source amd64) (Jan Hauke Rahm)
  • [2009-09-04] Accepted xcftools 1.0.4-1+lenny1 (source amd64) (Jan Hauke Rahm)
  • [2009-07-26] xcftools 1.0.7-1 MIGRATED to testing (Debian testing watch)
  • [2009-07-25] xcftools 1.0.7-1 MIGRATED to testing (Debian testing watch)
  • [2009-07-24] xcftools 1.0.7-1 MIGRATED to testing (Debian testing watch)
  • [2009-07-14] Accepted xcftools 1.0.7-1 (source i386) (Jan Hauke Rahm) (signed by: George Danchev)
  • [2009-07-06] Accepted xcftools 1.0.4-1+lenny1 (source amd64) (Jan Hauke Rahm)
  • [2009-05-09] xcftools 1.0.4-2 MIGRATED to testing (Debian testing watch)
  • [2009-04-28] Accepted xcftools 1.0.4-2 (source i386) (Barry deFreese)
  • [2006-05-26] xcftools 1.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2006-05-14] Accepted xcftools 1.0.4-1 (source i386) (Henning Makholm)
  • [2006-04-29] xcftools 1.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2006-04-17] Accepted xcftools 1.0.3-1 (source i386) (Henning Makholm)
  • [2006-03-06] xcftools 1.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2006-02-22] Accepted xcftools 1.0.2-1 (source i386) (Henning Makholm)
  • [2006-02-20] Accepted xcftools 1.0.1-1 (source i386) (Henning Makholm)
  • [2006-02-20] Accepted xcftools 1.0-1 (source i386) (Henning Makholm)
  • [2006-02-19] Accepted xcftools 0.7.1-1 (source i386) (Henning Makholm)
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.0.7-6

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing