Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0513

Опубликовано: 26 сент. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0513: Moderate: gimp security update (MODERATE)

[1.2.3-20.9.el3]

  • validate bytesperline header field when loading PCX files (#247570)

[1.2.3-20.8.el3]

  • reduce GIMP_MAX_IMAGE_SIZE to 2^18 to detect bogus image widths/heights (#247570)

[1.2.3-20.7.el3]

  • replace gimp_error() by gimp_message()/gimp_quit() in a few plugins so they don't crash but gracefully exit when encountering error conditions
  • fix endianness issues in the PSP plugin to avoid it doing (seemingly) endless loops when loading images
  • fix endianness issues in the PCX plugin which cause it to not detect corrupt images

[1.2.3-20.6.el3]

  • add ChangeLog entry to psd-invalid-dimensions patch (#247570)
  • validate size values read from files before using them to allocate memory in various file plugins (#247570, patch by Mukund Sivaraman and Rapha??l Quinet, adapted)
  • detect invalid image data when reading files in several plugins (#247570, patch by Sven Neumann and Rapha??l Quinet, adapted)
  • validate size values read from files before using them to allocate memory in the PSD and sunras plugins (#247570, patch by Mukund Sivaraman and Sven Neumann, partly adapted)
  • add safeguard to avoid crashes while loading corrupt PSD images (#247570, patch by Rapha??l Quinet, adapted)
  • convert spec file to UTF-8

[1.2.3-20.5.el3]

  • use adapted upstream PSD fix by Sven Neumann (#244406)

[1.2.3-20.4.el3]

  • refuse to open PSD files with insanely large dimensions (#244406)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

gimp

2.2.13-2.0.7.el5

gimp-devel

2.2.13-2.0.7.el5

gimp-libs

2.2.13-2.0.7.el5

Oracle Linux x86_64

gimp

2.2.13-2.0.7.el5

gimp-devel

2.2.13-2.0.7.el5

gimp-libs

2.2.13-2.0.7.el5

Oracle Linux i386

gimp

2.2.13-2.0.7.el5

gimp-devel

2.2.13-2.0.7.el5

gimp-libs

2.2.13-2.0.7.el5

Связанные уязвимости

ubuntu
почти 18 лет назад

Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.

redhat
почти 18 лет назад

Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.

nvd
почти 18 лет назад

Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.

debian
почти 18 лет назад

Integer overflow in the seek_to_and_unpack_pixeldata function in the p ...

github
около 3 лет назад

Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.

Уязвимость ELSA-2007-0513