<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to bugs</title><link>https://sourceforge.net/p/freeimage/bugs/</link><description>Recent changes to bugs</description><atom:link href="https://sourceforge.net/p/freeimage/bugs/feed.rss" rel="self"/><language>en</language><lastBuildDate>Fri, 12 Dec 2025 20:14:18 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/freeimage/bugs/feed.rss" rel="self" type="application/rss+xml"/><item><title>CVE-2025-65803: Heap Buffer Overflow DoS Vulnerability in FreeImage (psdParser::ReadImageData)</title><link>https://sourceforge.net/p/freeimage/bugs/390/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;There is in &lt;a href="https://gist.github.com/1mxml/cabd6d972557d9d992fe5f4f6ca1dd87" rel="nofollow"&gt;https://gist.github.com/1mxml/cabd6d972557d9d992fe5f4f6ca1dd87&lt;/a&gt; a report about heap-based buffer overflow in psdParser::ReadImageData and has CVE-2025-65803 assigned.&lt;/p&gt;
&lt;p&gt;It might be a duplicate of CVE-2024-28565 which was forwarded as &lt;a href="https://sourceforge.net/p/freeimage/bugs/366/"&gt;https://sourceforge.net/p/freeimage/bugs/366/&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Salvatore Bonaccorso</dc:creator><pubDate>Fri, 12 Dec 2025 20:14:18 -0000</pubDate><guid>https://sourceforge.net0de50f901d3ecfe573e727c23e1c1e19ff51a42b</guid></item><item><title>GCC 14 build fixes</title><link>https://sourceforge.net/p/freeimage/bugs/389/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;libfreeimage fails to build with GCC 14+ compilers due to issues in the bundled libjxr library. Debian's libjxr library has some fixes:&lt;br/&gt;
&lt;a href="https://sources.debian.org/patches/jxrlib/1.2~git20170615.f752187-5.3/0013-jxrlib-ftbfs-with-GCC-14.patch/" rel="nofollow"&gt;https://sources.debian.org/patches/jxrlib/1.2~git20170615.f752187-5.3/0013-jxrlib-ftbfs-with-GCC-14.patch/&lt;/a&gt;&lt;br/&gt;
&lt;a href="https://sources.debian.org/patches/jxrlib/1.2~git20170615.f752187-5.3/0015-FTBFS-fix-for-function-prototype-error.patch/" rel="nofollow"&gt;https://sources.debian.org/patches/jxrlib/1.2~git20170615.f752187-5.3/0015-FTBFS-fix-for-function-prototype-error.patch/&lt;/a&gt;&lt;br/&gt;
which are needed to get the build working.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Petazzoni</dc:creator><pubDate>Mon, 08 Sep 2025 17:53:46 -0000</pubDate><guid>https://sourceforge.netdf64938cedb0a8c806ee5fde58ff8903cdd7f8c1</guid></item><item><title>[Workaround] Build with GCC 14 fails with `gzlib.c:14:17: error: implicit declaration of function ‘lseek’; did you mean ‘fseek’? [-Wimplicit-function-declaration]`.</title><link>https://sourceforge.net/p/freeimage/bugs/388/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Trying to build the latest release (version 3.18.0) with GCC version 14.2.1 fails with&lt;br/&gt;
&lt;code&gt;gzlib.c:14:17: error: implicit declaration of function ‘lseek’; did you mean ‘fseek’? [-Wimplicit-function-declaration]&lt;/code&gt;:  &lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="k"&gt;[...]&lt;/span&gt;
&lt;span class="na"&gt;gcc -march&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s"&gt;i686 -m32 -march=native -mtune=native -O3 -pipe -fno-plt -fexceptions -Wp,-D_FORTIFY_SOURCE=2 -fstack-clash-protection -fcf-protection -w -flto=auto -O3 -fPIC -fvisibility=hidden -DNO_LCMS -DOPJ_STATIC -DNO_LCMS -DDISABLE_PERF_MEASUREMENT -D__ANSI__ -I. -ISource -ISource/Metadata -ISource/FreeImageToolkit -ISource/LibJPEG -ISource/LibPNG -ISource/LibTIFF4 -ISource/ZLib -ISource/LibOpenJPEG -ISource/OpenEXR -ISource/OpenEXR/Half -ISource/OpenEXR/Iex -ISource/OpenEXR/IlmImf -ISource/OpenEXR/IlmThread -ISource/OpenEXR/Imath -ISource/OpenEXR/IexMath -ISource/LibRawLite -ISource/LibRawLite/dcraw -ISource/LibRawLite/internal -ISource/LibRawLite/libraw -ISource/LibRawLite/src -ISource/LibWebP -ISource/LibJXR -ISource/LibJXR/common/include -ISource/LibJXR/image/sys -ISource/LibJXR/jxrgluelib -fPIC -c Source/ZLib/zutil.c -o Source/ZLib/zutil.o&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzlib.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;In function ‘gz_open’:&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzlib.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="s"&gt;14:17: error: implicit declaration of function ‘lseek’&lt;/span&gt;&lt;span class="c1"&gt;; did you mean ‘fseek’? [-Wimplicit-function-declaration]&lt;/span&gt;
&lt;span class="w"&gt;   &lt;/span&gt;&lt;span class="na"&gt;14 | #  define LSEEK lseek&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|                 ^~~~~&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzlib.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="s"&gt;252:9: note: in expansion of macro ‘LSEEK’&lt;/span&gt;
&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="na"&gt;252 |         LSEEK(state-&amp;gt;fd, 0, SEEK_END);  /* so gzoffset() is correct */&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|         ^~~~~&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzwrite.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;In function ‘gz_comp’:&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzwrite.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="s"&gt;89:20: error: implicit declaration of function ‘write’&lt;/span&gt;&lt;span class="c1"&gt;; did you mean ‘fwrite’? [-Wimplicit-function-declaration]&lt;/span&gt;
&lt;span class="w"&gt;   &lt;/span&gt;&lt;span class="na"&gt;89 |             writ&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;write(state-&amp;gt;fd, strm-&amp;gt;next_in, put)&lt;/span&gt;&lt;span class="c1"&gt;;&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|                    ^~~~~&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|                    fwrite&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzwrite.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;In function ‘gzclose_w’:&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzwrite.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="s"&gt;661:9: error: implicit declaration of function ‘close’&lt;/span&gt;&lt;span class="c1"&gt;; did you mean ‘pclose’? [-Wimplicit-function-declaration]&lt;/span&gt;
&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="na"&gt;661 |     if (close(state-&amp;gt;fd)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s"&gt;= -1)&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|         ^~~~~&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|         pclose&lt;/span&gt;
&lt;span class="na"&gt;gcc -march&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s"&gt;i686 -m32 -march=native -mtune=native -O3 -pipe -fno-plt -fexceptions -Wp,-D_FORTIFY_SOURCE=2 -fstack-clash-protection -fcf-protection -w -flto=auto -O3 -fPIC -fvisibility=hidden -DNO_LCMS -DOPJ_STATIC -DNO_LCMS -DDISABLE_PERF_MEASUREMENT -D__ANSI__ -I. -ISource -ISource/Metadata -ISource/FreeImageToolkit -ISource/LibJPEG -ISource/LibPNG -ISource/LibTIFF4 -ISource/ZLib -ISource/LibOpenJPEG -ISource/OpenEXR -ISource/OpenEXR/Half -ISource/OpenEXR/Iex -ISource/OpenEXR/IlmImf -ISource/OpenEXR/IlmThread -ISource/OpenEXR/Imath -ISource/OpenEXR/IexMath -ISource/LibRawLite -ISource/LibRawLite/dcraw -ISource/LibRawLite/internal -ISource/LibRawLite/libraw -ISource/LibRawLite/src -ISource/LibWebP -ISource/LibJXR -ISource/LibJXR/common/include -ISource/LibJXR/image/sys -ISource/LibJXR/jxrgluelib -fPIC -c Source/LibOpenJPEG/bio.c -o Source/LibOpenJPEG/bio.o&lt;/span&gt;
&lt;span class="na"&gt;make[1]&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;*** [Makefile.gnu:61: Source/ZLib/gzlib.o] Error 1&lt;/span&gt;
&lt;span class="na"&gt;make[1]&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;*** Waiting for unfinished jobs....&lt;/span&gt;
&lt;span class="na"&gt;make[1]&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;*** [Makefile.gnu:61: Source/ZLib/gzwrite.o] Error 1&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzread.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;In function ‘gz_load’:&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzread.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="s"&gt;35:15: error: implicit declaration of function ‘read’&lt;/span&gt;&lt;span class="c1"&gt;; did you mean ‘fread’? [-Wimplicit-function-declaration]&lt;/span&gt;
&lt;span class="w"&gt;   &lt;/span&gt;&lt;span class="na"&gt;35 |         ret&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;read(state-&amp;gt;fd, buf + *have, get)&lt;/span&gt;&lt;span class="c1"&gt;;&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|               ^~~~&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|               fread&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzread.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;In function ‘gzclose_r’:&lt;/span&gt;
&lt;span class="na"&gt;Source/ZLib/gzread.c&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="s"&gt;651:11: error: implicit declaration of function ‘close’&lt;/span&gt;&lt;span class="c1"&gt;; did you mean ‘pclose’? [-Wimplicit-function-declaration]&lt;/span&gt;
&lt;span class="w"&gt;  &lt;/span&gt;&lt;span class="na"&gt;651 |     ret&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;close(state-&amp;gt;fd)&lt;/span&gt;&lt;span class="c1"&gt;;&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|           ^~~~~&lt;/span&gt;
&lt;span class="w"&gt;      &lt;/span&gt;&lt;span class="na"&gt;|           pclose&lt;/span&gt;
&lt;span class="na"&gt;make[1]&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;*** [Makefile.gnu:61: Source/ZLib/gzread.o] Error 1&lt;/span&gt;
&lt;span class="na"&gt;make[1]&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s"&gt;Leaving directory '/var/cache/makepkg/build/lib32-freeimage/src/FreeImage'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;

&lt;p&gt;A workaround is to add &lt;code&gt;-Wno-error=implicit-function-declaration&lt;/code&gt; to &lt;code&gt;CFLAGS&lt;/code&gt;/ &lt;code&gt;CXXFLAGS&lt;/code&gt; environment variable, but it should be fixed in the source code.&lt;/p&gt;
&lt;p&gt;Also warnings are generated.&lt;/p&gt;
&lt;p&gt;Regards!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Drei Eck</dc:creator><pubDate>Tue, 04 Mar 2025 20:46:37 -0000</pubDate><guid>https://sourceforge.net8a769de2b38cad7253af27d80ae03cc2b28807da</guid></item><item><title>Potential regression in LoadPixelDataRLE8 since 3.19.0</title><link>https://sourceforge.net/p/freeimage/bugs/387/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I reported first in &lt;a href="https://github.com/danoli3/FreeImage/issues/23" rel="nofollow"&gt;https://github.com/danoli3/FreeImage/issues/23&lt;/a&gt;, but only later I observed that &lt;a class="" href="https://sourceforge.net/p/freeimage/svn/1832/"&gt;r-1332&lt;/a&gt; introduced the potential regression.&lt;/p&gt;
&lt;p&gt;Thank you and sorry for cross-posting.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">tbeu</dc:creator><pubDate>Mon, 30 Dec 2024 13:19:35 -0000</pubDate><guid>https://sourceforge.net3baeb0643fabeec482a370a14178fb97e028abd1</guid></item><item><title>#386 CVE-2024-31570: stack-based buffer overflow in the PluginXPM.cpp Load function when handling  XPM files</title><link>https://sourceforge.net/p/freeimage/bugs/386/?limit=25#ead9</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;This is probably a duplicate of #355 (it is currently private, and I don't have access to it)&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago R.R.</dc:creator><pubDate>Tue, 08 Oct 2024 14:19:36 -0000</pubDate><guid>https://sourceforge.net7abdc3bf8533bd5f690073ab58afbe82d37e13ed</guid></item><item><title>CVE-2024-31570: stack-based buffer overflow in the PluginXPM.cpp Load function when handling  XPM files</title><link>https://sourceforge.net/p/freeimage/bugs/386/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;In FreeImage library version 3.19.0 &lt;a class="alink" href="/p/freeimage/svn/1909/"&gt;[r1909]&lt;/a&gt;, when reading images in XPM format, the Load() function has a stack overflow write vulnerability, which may lead to a command execution.&lt;/p&gt;
&lt;p&gt;The aim of this ticket is to forward upstream the vulnerabilities published at&lt;br/&gt;
&lt;a href="https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909." rel="nofollow"&gt;https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909.&lt;/a&gt;&lt;br/&gt;
Please see there for more details.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago R.R.</dc:creator><pubDate>Mon, 07 Oct 2024 21:47:46 -0000</pubDate><guid>https://sourceforge.net96a58b7bbf2c872e64e98947395a1674b3df7f1e</guid></item><item><title>CVE-2024-28584: Null Pointer Dereference in J2KImageToFIBITMAP()</title><link>https://sourceforge.net/p/freeimage/bugs/385/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Null Pointer Dereference vulnerability in open source FreeImage v.3.19.0 &lt;a class="alink" href="/p/freeimage/svn/1909/"&gt;[r1909]&lt;/a&gt; allows a local attacker to cause a denial of service (DoS) via the J2KImageToFIBITMAP() function when reading images in J2K format.&lt;/p&gt;
&lt;p&gt;The aim of this ticket is to forward upstream the vulnerabilities published at&lt;br/&gt;
&lt;a class="" href="https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909" rel="nofollow"&gt;https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909&lt;/a&gt;.&lt;br/&gt;
Please see there for more details.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago R.R.</dc:creator><pubDate>Mon, 07 Oct 2024 21:00:58 -0000</pubDate><guid>https://sourceforge.net54033badc00934e61ff57a2b2c8f4b600d9ef2a4</guid></item><item><title>CVE-2024-28583: Buffer Overflow in readLine() when reading XPM images</title><link>https://sourceforge.net/p/freeimage/bugs/384/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Buffer Overflow vulnerability in open source FreeImage v.3.19.0 &lt;a class="alink" href="/p/freeimage/svn/1909/"&gt;[r1909]&lt;/a&gt; allows a local attacker to execute arbitrary code via the readLine() function when reading images in XPM format.&lt;/p&gt;
&lt;p&gt;The aim of this ticket is to forward upstream the vulnerabilities published at&lt;br/&gt;
&lt;a class="" href="https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909" rel="nofollow"&gt;https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909&lt;/a&gt;.&lt;br/&gt;
Please see there for more details.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago R.R.</dc:creator><pubDate>Mon, 07 Oct 2024 21:00:25 -0000</pubDate><guid>https://sourceforge.netb08445f4de86db0a6ed9cac163891a6d20a28182</guid></item><item><title>CVE-2024-28582: Buffer Overflow in rgbe_RGBEToFloat()</title><link>https://sourceforge.net/p/freeimage/bugs/383/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Buffer Overflow vulnerability in open source FreeImage v.3.19.0 &lt;a class="alink" href="/p/freeimage/svn/1909/"&gt;[r1909]&lt;/a&gt; allows a local attacker to execute arbitrary code via the rgbe_RGBEToFloat() function when reading images in HDR format.&lt;/p&gt;
&lt;p&gt;The aim of this ticket is to forward upstream the vulnerabilities published at&lt;br/&gt;
&lt;a class="" href="https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909" rel="nofollow"&gt;https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909&lt;/a&gt;.&lt;br/&gt;
Please see there for more details.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago R.R.</dc:creator><pubDate>Mon, 07 Oct 2024 20:59:51 -0000</pubDate><guid>https://sourceforge.netd3754dc1f79b64d19a527f07fc32dda80a460a30</guid></item><item><title>CVE-2024-28581: Buffer Overflow in _assignPixel() relating to TARGA images</title><link>https://sourceforge.net/p/freeimage/bugs/382/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Buffer Overflow vulnerability in open source FreeImage v.3.19.0 &lt;a class="alink" href="/p/freeimage/svn/1909/"&gt;[r1909]&lt;/a&gt; allows a local attacker to execute arbitrary code via the _assignPixel() function when reading images in TARGA format.&lt;/p&gt;
&lt;p&gt;The aim of this ticket is to forward upstream the vulnerabilities published at&lt;br/&gt;
&lt;a class="" href="https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909" rel="nofollow"&gt;https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909&lt;/a&gt;.&lt;br/&gt;
Please see there for more details.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Santiago R.R.</dc:creator><pubDate>Mon, 07 Oct 2024 20:59:23 -0000</pubDate><guid>https://sourceforge.net7cea6c336fa1a105ab2d753249108588766221e1</guid></item></channel></rss>