debian/0000775000000000000000000000000013267466701007204 5ustar debian/compat0000664000000000000000000000000213263722467010402 0ustar 9 debian/libsdl2-image-2.0-0.install0000664000000000000000000000004213247001323013614 0ustar usr/lib/*/libSDL2_image-2.0.so.0* debian/source/0000775000000000000000000000000013247001323010463 5ustar debian/source/format0000664000000000000000000000001413247001323011671 0ustar 3.0 (quilt) debian/control0000664000000000000000000000420713264667602010612 0ustar Source: libsdl2-image Maintainer: Debian SDL packages maintainers Uploaders: Felix Geyer , Manuel A. Fernandez Montecelo Section: libs Priority: optional Build-Depends: debhelper (>= 9), dh-autoreconf, libsdl2-dev (>= 2.0.0), libjpeg-dev, libpng-dev, libtiff-dev, libwebp-dev, zlib1g-dev Standards-Version: 3.9.4 Homepage: http://www.libsdl.org/projects/SDL_image/ Vcs-Browser: http://anonscm.debian.org/gitweb/?p=pkg-sdl/packages/libsdl2-image.git Vcs-Git: git://anonscm.debian.org/pkg-sdl/packages/libsdl2-image.git Package: libsdl2-image-2.0-0 Architecture: any Multi-Arch: same Pre-Depends: ${misc:Pre-Depends} Depends: ${shlibs:Depends}, ${misc:Depends} Description: Image loading library for Simple DirectMedia Layer 2, libraries This is a simple library to load images of various formats as SDL surfaces. It supports the following formats: BMP, GIF, JPEG, LBM, PCX, PNG, PNM, TGA, TIFF, WEBP, XCF, XPM, XV. . This package contains the shared library. Package: libsdl2-image-dbg Section: debug Architecture: any Multi-Arch: same Priority: extra Depends: ${misc:Depends}, libsdl2-image-2.0-0 (= ${binary:Version}) Description: Image loading library for Simple DirectMedia Layer 2, debugging symbols This is a simple library to load images of various formats as SDL surfaces. It supports the following formats: BMP, GIF, JPEG, LBM, PCX, PNG, PNM, TGA, TIFF, WEBP, XCF, XPM, XV. . This package contains the debugging information for the shared library. Package: libsdl2-image-dev Architecture: any Multi-Arch: same Section: libdevel Depends: ${misc:Depends}, libsdl2-image-2.0-0 (= ${binary:Version}), libsdl2-dev (>= 2.0.0) Description: Image loading library for Simple DirectMedia Layer 2, development files This is a simple library to load images of various formats as SDL surfaces. It supports the following formats: BMP, GIF, JPEG, LBM, PCX, PNG, PNM, TGA, TIFF, WEBP, XCF, XPM, XV. . This package contains the development files. debian/watch0000664000000000000000000000021313263722467010231 0ustar version=3 opts=dversionmangle=s/\+dfsg$// \ http://www.libsdl.org/projects/SDL_image/release/SDL2_image-([\d.]+)\.tar\.(?:gz|bz2|xz|lzma) debian/patches/0000775000000000000000000000000013264667602010633 5ustar debian/patches/CVE-2017-12122-2.patch0000664000000000000000000000135613263726532013466 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1516776304 18000 # Node ID 97f7f01e0665b7555a0e5e9465799e80c8f59528 # Parent 16772bbb1b094edcbd28a23979fa4089a9d560be lbm: Fail to load images with unsupported/bogus color depth. diff -r 16772bbb1b09 -r 97f7f01e0665 IMG_lbm.c --- a/IMG_lbm.c Wed Jan 24 01:44:36 2018 -0500 +++ b/IMG_lbm.c Wed Jan 24 01:45:04 2018 -0500 @@ -233,6 +233,12 @@ nbplanes = 1; } + if ((nbplanes != 1) && (nbplanes != 4) && (nbplanes != 8) && (nbplanes != 24)) + { + error="unsupported number of color planes"; + goto done; + } + stencil = (bmhd.mask & 1); /* There is a mask ( 'stencil' ) */ /* Allocate memory for a temporary buffer ( used for debian/patches/CVE-2017-14440.patch0000664000000000000000000000136013263726532013327 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1516813224 18000 # Node ID bfa08dc02b3c7b265ead6019f901f17f925570c3 # Parent 97f7f01e0665b7555a0e5e9465799e80c8f59528 lbm: Don't overflow static colormap buffer. diff -r 97f7f01e0665 -r bfa08dc02b3c IMG_lbm.c --- a/IMG_lbm.c Wed Jan 24 01:45:04 2018 -0500 +++ b/IMG_lbm.c Wed Jan 24 12:00:24 2018 -0500 @@ -183,6 +183,11 @@ if ( !SDL_memcmp( id, "CMAP", 4 ) ) /* palette ( Color Map ) */ { + if (size > sizeof (colormap)) { + error="colormap size is too large"; + goto done; + } + if ( !SDL_RWread( src, &colormap, size, 1 ) ) { error="error reading CMAP chunk"; debian/patches/CVE-2018-3837.patch0000664000000000000000000000137213264142500013247 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1518036231 18000 # Node ID 2938fc80591abeae74b971cbdf966eff3213297e # Parent f50c9c46ba52f5a594313774a938844e5cf82b4d pcx: don't overflow buffer if bytes-per-line is less than image width. diff -r f50c9c46ba52 -r 2938fc80591a IMG_pcx.c --- a/IMG_pcx.c Sun Jan 28 22:10:40 2018 -0800 +++ b/IMG_pcx.c Wed Feb 07 15:43:51 2018 -0500 @@ -147,7 +147,7 @@ if (bpl > surface->pitch) { error = "bytes per line is too large (corrupt?)"; } - buf = (Uint8 *)SDL_malloc(bpl); + buf = (Uint8 *)SDL_calloc(SDL_max(bpl, surface->pitch), 1); row = (Uint8 *)surface->pixels; for ( y=0; yh; ++y ) { /* decode a scan line to a temporary buffer first */ debian/patches/fix_ftbfs_big_endian.patch0000664000000000000000000000055513264667602015772 0ustar Description: Fix FTBFS on big endian architectures. Bug: https://bugzilla.libsdl.org/show_bug.cgi?id=2063 --- a/IMG_webp.c +++ b/IMG_webp.c @@ -186,7 +186,7 @@ SDL_Surface *IMG_LoadWEBP_RW(SDL_RWops *src) WebPBitstreamFeatures features; int raw_data_size; uint8_t *raw_data = NULL; - int r; + int r, s; uint8_t *ret; if ( !src ) { debian/patches/CVE-2018-3839.patch0000664000000000000000000000217313264142500013251 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1518038991 18000 # Node ID fb643e371806910f1973abfdfe7f981e8dba60f5 # Parent c5f9cbb5d2bbcb2150ba0596ea56b49efeed660d xcf: check for some potential integer overflows. diff -r c5f9cbb5d2bb -r fb643e371806 IMG_xcf.c --- a/IMG_xcf.c Wed Feb 07 16:18:54 2018 -0500 +++ b/IMG_xcf.c Wed Feb 07 16:29:51 2018 -0500 @@ -595,6 +595,18 @@ SDL_RWseek (src, layer->hierarchy_file_offset, RW_SEEK_SET); hierarchy = read_xcf_hierarchy (src); + if (hierarchy->bpp > 4) { /* unsupported. */ + fprintf(stderr, "Unknown Gimp image bpp (%u)\n", (unsigned int) hierarchy->bpp); + free_xcf_hierarchy(hierarchy); + return 1; + } + + if ((hierarchy->width > 20000) || (hierarchy->height > 20000)) { /* arbitrary limit to avoid integer overflow. */ + fprintf(stderr, "Gimp image too large (%ux%u)\n", (unsigned int) hierarchy->width, (unsigned int) hierarchy->height); + free_xcf_hierarchy(hierarchy); + return 1; + } + level = NULL; for (i = 0; hierarchy->level_file_offsets [i]; i++) { SDL_RWseek (src, hierarchy->level_file_offsets [i], RW_SEEK_SET); debian/patches/CVE-2017-12122-1.patch0000664000000000000000000000317013263726532013461 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1516776276 18000 # Node ID 16772bbb1b094edcbd28a23979fa4089a9d560be # Parent 3e1ebbbaba54e97a8da80f50c28f9e7cf5a5a56d lbm: use correct variable to check color planes. diff -r 3e1ebbbaba54 -r 16772bbb1b09 IMG_lbm.c --- a/IMG_lbm.c Wed Jan 24 01:43:46 2018 -0500 +++ b/IMG_lbm.c Wed Jan 24 01:44:36 2018 -0500 @@ -245,7 +245,7 @@ goto done; } - if ( ( Image = SDL_CreateRGBSurface( SDL_SWSURFACE, width, bmhd.h, (bmhd.planes==24 || flagHAM==1)?24:8, 0, 0, 0, 0 ) ) == NULL ) + if ( ( Image = SDL_CreateRGBSurface( SDL_SWSURFACE, width, bmhd.h, (nbplanes==24 || flagHAM==1)?24:8, 0, 0, 0, 0 ) ) == NULL ) goto done; if ( bmhd.mask & 2 ) /* There is a transparent color */ @@ -272,7 +272,7 @@ /* The 32 last colors are the same but divided by 2 */ /* Some Amiga pictures save 64 colors with 32 last wrong colors, */ /* they shouldn't !, and here we overwrite these 32 bad colors. */ - if ( (nbcolors==32 || flagEHB ) && (1< (1< (1< # Date 1517111418 18000 # Node ID d0142861559ccd4fde994fbd33c34fbdee25f84c # Parent 607436eb1473e55db8d18e6de4c947b191f60f4a xcf: don't double-free a pointer on bogus data. free_xcf_hierarchy() frees the same pointer that this code manually frees. diff -r 607436eb1473 -r d0142861559c IMG_xcf.c --- a/IMG_xcf.c Sat Jan 27 17:31:24 2018 -0500 +++ b/IMG_xcf.c Sat Jan 27 22:50:18 2018 -0500 @@ -651,9 +651,6 @@ fprintf (stderr, "Unknown Gimp image type (%d)\n", head->image_type); if (hierarchy) { - if (hierarchy->level_file_offsets) - SDL_free(hierarchy->level_file_offsets); - free_xcf_hierarchy(hierarchy); } if (level) debian/patches/CVE-2017-14442.patch0000664000000000000000000000144313263726532013333 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1516817527 18000 # Node ID 37445f6180a8ca7a218ab9f9eaaeaf088b4f6c3a # Parent a1e9b624ca1033f893e93691802682bf36400f7a bmp: don't overflow palette buffer with bogus biClrUsed values. diff -r a1e9b624ca10 -r 37445f6180a8 IMG_bmp.c --- a/IMG_bmp.c Wed Jan 24 13:02:04 2018 -0500 +++ b/IMG_bmp.c Wed Jan 24 13:12:07 2018 -0500 @@ -760,6 +760,11 @@ if (biClrUsed == 0) { biClrUsed = 1 << biBitCount; } + if (biClrUsed > SDL_arraysize(palette)) { + IMG_SetError("Unsupported or incorrect biClrUsed field"); + was_error = SDL_TRUE; + goto done; + } for (i = 0; i < (int) biClrUsed; ++i) { SDL_RWread(src, &palette[i], 4, 1); } debian/patches/CVE-2017-14450.patch0000664000000000000000000000136213263726532013332 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1517113689 18000 # Node ID 45e750f92c843dccea0820d86726e9cf1d524392 # Parent d0142861559ccd4fde994fbd33c34fbdee25f84c gif: report error on bogus LWZ data, instead of overflowing a buffer. diff -r d0142861559c -r 45e750f92c84 IMG_gif.c --- a/IMG_gif.c Sat Jan 27 22:50:18 2018 -0500 +++ b/IMG_gif.c Sat Jan 27 23:28:09 2018 -0500 @@ -497,8 +497,10 @@ return -3; } *sp++ = table[1][code]; - if (code == table[0][code]) - RWSetMsg("circular table entry BIG ERROR"); + if (code == table[0][code]) { + RWSetMsg("circular table entry BIG ERROR"); + return -3; + } code = table[0][code]; } debian/patches/series0000664000000000000000000000042713264667602012053 0ustar fix_ftbfs_big_endian.patch CVE-2017-2887.patch CVE-2017-12122-1.patch CVE-2017-12122-2.patch CVE-2017-14440.patch CVE-2017-14441.patch CVE-2017-14442.patch CVE-2017-14448.patch CVE-2017-14449.patch CVE-2017-14450.patch CVE-2018-3837.patch CVE-2018-3838.patch CVE-2018-3839.patch debian/patches/CVE-2018-3838.patch0000664000000000000000000000172513264142500013252 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1518038334 18000 # Node ID c5f9cbb5d2bbcb2150ba0596ea56b49efeed660d # Parent 2938fc80591abeae74b971cbdf966eff3213297e xcf: Prevent infinite loop and/or buffer overflow on bogus data. diff -r 2938fc80591a -r c5f9cbb5d2bb IMG_xcf.c --- a/IMG_xcf.c Wed Feb 07 15:43:51 2018 -0500 +++ b/IMG_xcf.c Wed Feb 07 16:18:54 2018 -0500 @@ -483,6 +483,10 @@ int i, size, count, j, length; unsigned char val; + if (len == 0) { /* probably bogus data. */ + return NULL; + } + t = load = (unsigned char *) SDL_malloc (len); reallen = SDL_RWread (src, t, 1, len); @@ -608,6 +612,16 @@ ox, oy); } + if (!tile) { + if (hierarchy) { + free_xcf_hierarchy(hierarchy); + } + if (level) { + free_xcf_level(level); + } + return 1; + } + p8 = tile; p16 = (Uint16 *) p8; p = (Uint32 *) p8; debian/patches/CVE-2017-14441.patch0000664000000000000000000000150513263726532013331 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1516816924 18000 # Node ID a1e9b624ca1033f893e93691802682bf36400f7a # Parent bfa08dc02b3c7b265ead6019f901f17f925570c3 ico: reject obviously incorrect image sizes. diff -r bfa08dc02b3c -r a1e9b624ca10 IMG_bmp.c --- a/IMG_bmp.c Wed Jan 24 12:00:24 2018 -0500 +++ b/IMG_bmp.c Wed Jan 24 13:02:04 2018 -0500 @@ -735,6 +735,14 @@ goto done; } + /* sanity check image size, so we don't overflow integers, etc. */ + if ((biWidth < 0) || (biWidth > 0xFFFFFF) || + (biHeight < 0) || (biHeight > 0xFFFFFF)) { + IMG_SetError("Unsupported or invalid ICO dimensions"); + was_error = SDL_TRUE; + goto done; + } + /* Create a RGBA surface */ biHeight = biHeight >> 1; //printf("%d x %d\n", biWidth, biHeight); debian/patches/CVE-2017-2887.patch0000664000000000000000000000170313263726472013267 0ustar # HG changeset patch # User Sam Lantinga # Date 1507329619 25200 # Node ID 318484db0705d07d4d1f4c0a1d3d5ea69f6ba2b0 # Parent 7ad06019831d474380fd5a63e518d21219031519 Fixed security vulnerability in XCF image loader (thanks Yves!) diff -r 7ad06019831d -r 318484db0705 IMG_xcf.c --- a/IMG_xcf.c Mon Sep 18 16:10:17 2017 -0700 +++ b/IMG_xcf.c Fri Oct 06 15:40:19 2017 -0700 @@ -251,6 +251,7 @@ } static void xcf_read_property (SDL_RWops * src, xcf_prop * prop) { + Uint32 len; prop->id = SDL_ReadBE32 (src); prop->length = SDL_ReadBE32 (src); @@ -274,7 +275,12 @@ break; case PROP_COMPRESSION: case PROP_COLOR: - SDL_RWread (src, &prop->data, prop->length, 1); + if (prop->length > sizeof(prop->data)) { + len = sizeof(prop->data); + } else { + len = prop->length; + } + SDL_RWread(src, &prop->data, len, 1); break; case PROP_VISIBLE: prop->data.visible = SDL_ReadBE32 (src); debian/patches/CVE-2017-14448.patch0000664000000000000000000000252613263726532013344 0ustar # HG changeset patch # User Ryan C. Gordon # Date 1517092075 18000 # Node ID 7df1580f1695d327c1c4580dccbf7ca6da5aed9e # Parent 37445f6180a8ca7a218ab9f9eaaeaf088b4f6c3a xcf: deal with bogus data in rle tile decoding. diff -r 37445f6180a8 -r 7df1580f1695 IMG_xcf.c --- a/IMG_xcf.c Wed Jan 24 13:12:07 2018 -0500 +++ b/IMG_xcf.c Sat Jan 27 17:27:55 2018 -0500 @@ -486,7 +486,7 @@ t = load = (unsigned char *) SDL_malloc (len); reallen = SDL_RWread (src, t, 1, len); - data = (unsigned char *) SDL_malloc (x*y*bpp); + data = (unsigned char *) SDL_calloc (1, x*y*bpp); for (i = 0; i < bpp; i++) { d = data + i; size = x*y; @@ -503,6 +503,12 @@ t += 2; } + if (((size_t) (t - load) + length) >= len) { + break; /* bogus data */ + } else if (length > size) { + break; /* bogus data */ + } + count += length; size -= length; @@ -518,6 +524,12 @@ t += 2; } + if (((size_t) (t - load)) >= len) { + break; /* bogus data */ + } else if (length > size) { + break; /* bogus data */ + } + count += length; size -= length; @@ -529,6 +541,11 @@ } } } + + if (size > 0) { + break; /* just drop out, untouched data initialized to zero. */ + } + } SDL_free (load); debian/copyright0000664000000000000000000000625713264667602011151 0ustar Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: SDL_image Upstream-Contact: Sam Lantinga Source: http://www.libsdl.org/projects/SDL_image/ Files: * Copyright: 1997-2013 Sam Lantinga License: zlib/libpng Files: IMG_gif.c Copyright: 1997-2013 Sam Lantinga 1990, 1991, 1993 David Koblas 1996 Torsten Martinsen License: zlib/libpng Files: IMG_png.c Copyright: 1997-2013 Sam Lantinga 1998 Philippe Lavoie License: LGPL-2+ Files: miniz.h Copyright: in public domain License: public-domain This is free and unencumbered software released into the public domain. . Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means. . In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law. . THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Files: debian/* Copyright: 2013, Manuel A. Fernandez Montecelo 2013, Felix Geyer License: LGPL-2+ License: zlib/libpng This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. . Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: . 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. License: LGPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. . On Debian systems, the complete text of version 2 of the GNU Lesser Public License can be found in '/usr/share/common-licenses/LGPL-2'. debian/rules0000775000000000000000000000221113264667602010260 0ustar #!/usr/bin/make -f export DEB_CFLAGS_MAINT_APPEND = -pipe -Wall export DEB_LDFLAGS_MAINT_APPEND = -Wl,--as-needed DEB_HOST_MULTIARCH ?= $(shell dpkg-architecture -qDEB_HOST_MULTIARCH) SHLIBVER = 2.0.0 # features -- disable building as plugins, otherwise dh_shlibs confflags = --disable-jpg-shared confflags += --disable-tif-shared confflags += --disable-png-shared confflags += --disable-webp-shared %: dh $@ --with autoreconf --parallel override_dh_autoreconf: AUTOMAKE="automake --foreign" dh_autoreconf --as-needed override_dh_auto_configure: dh_auto_configure -- $(confflags) override_dh_install: dh_install --fail-missing -XlibSDL2_image.la override_dh_installchangelogs: dh_installchangelogs -- CHANGES.txt override_dh_link: # fix lintian warning dev-pkg-without-shlib-symlink dh_link -plibsdl2-image-dev usr/lib/$(DEB_HOST_MULTIARCH)/libSDL2_image-2.0.so.0.0.0 usr/lib/$(DEB_HOST_MULTIARCH)/libSDL2_image-2.0.so dh_link --remaining-packages override_dh_compress: dh_compress -Xshowimage.c override_dh_strip: dh_strip --dbg-package=libsdl2-image-dbg override_dh_makeshlibs: dh_makeshlibs -V"libsdl2-image-2.0-0 (>= $(SHLIBVER))" debian/docs0000664000000000000000000000001313247001323010030 0ustar README.txt debian/changelog0000664000000000000000000000331213267466360011056 0ustar libsdl2-image (2.0.0+dfsg-3+deb8u1build0.14.04.1) trusty-security; urgency=medium * fake sync from Debian -- Steve Beattie Mon, 23 Apr 2018 16:32:00 -0700 libsdl2-image (2.0.0+dfsg-3+deb8u1) jessie-security; urgency=high * Backport various security fixes: - CVE-2017-2887 - CVE-2017-12122 - CVE-2017-14440 - CVE-2017-14441 - CVE-2017-14442 - CVE-2017-14448 - CVE-2017-14449 - CVE-2017-14450 - CVE-2018-3837 - CVE-2018-3838 - CVE-2018-3839 -- Felix Geyer Sun, 15 Apr 2018 17:28:03 +0200 libsdl2-image (2.0.0+dfsg-3) unstable; urgency=low * Really regenerate autoconf files. The upstream autogen.sh doesn't work properly. Thanks to Pino Toscano for the patch. - Fixes FTBFS on hurd. -- Felix Geyer Sun, 08 Sep 2013 11:16:14 +0200 libsdl2-image (2.0.0+dfsg-2) unstable; urgency=low * Tighten libsdl2-dev dependency to 2.0.0 and bump the shlibver to 2.0.0, thanks to Gianfranco Costamagna for the patch. * Fix FTBFS on big endian architectures. - Add fix_ftbfs_big_endian.patch -- Felix Geyer Sun, 25 Aug 2013 11:26:16 +0200 libsdl2-image (2.0.0+dfsg-1) unstable; urgency=low * New upstream release. * Add a watch file. * Remove external/ from upstream tarball. * Document miniz.h license in debian/copyright. -- Felix Geyer Wed, 21 Aug 2013 09:44:44 +0200 libsdl2-image (2.0.0~rc1+dfsg-1) unstable; urgency=low * Initial release. (Closes: #710698) * Filter upstream tarball to remove precompiled binaries that don't ship with the corresponding source code. -- Felix Geyer Fri, 12 Jul 2013 17:38:44 +0200 debian/libsdl2-image-dev.install0000664000000000000000000000016413247001323013743 0ustar usr/include/SDL2/SDL_image.h usr/lib/*/libSDL2_image.a usr/lib/*/libSDL2_image.so usr/lib/*/pkgconfig/SDL2_image.pc debian/gbp.conf0000664000000000000000000000031613264667602010623 0ustar [DEFAULT] pristine-tar = True sign-tags = True [git-import-orig] filter = [ 'debian', 'external', 'VisualC', 'VisualCE', 'Xcode', 'Xcode-iOS', 'IMG_ImageIO.m', 'IMG_UIImage.m' ] filter-pristine-tar = True debian/libsdl2-image-dev.examples0000664000000000000000000000001413247001323014105 0ustar showimage.c