Описание
ELSA-2007-0513: Moderate: gimp security update (MODERATE)
[1.2.3-20.9.el3]
- validate bytesperline header field when loading PCX files (#247570)
[1.2.3-20.8.el3]
- reduce GIMP_MAX_IMAGE_SIZE to 2^18 to detect bogus image widths/heights (#247570)
[1.2.3-20.7.el3]
- replace gimp_error() by gimp_message()/gimp_quit() in a few plugins so they don't crash but gracefully exit when encountering error conditions
- fix endianness issues in the PSP plugin to avoid it doing (seemingly) endless loops when loading images
- fix endianness issues in the PCX plugin which cause it to not detect corrupt images
[1.2.3-20.6.el3]
- add ChangeLog entry to psd-invalid-dimensions patch (#247570)
- validate size values read from files before using them to allocate memory in various file plugins (#247570, patch by Mukund Sivaraman and Rapha??l Quinet, adapted)
- detect invalid image data when reading files in several plugins (#247570, patch by Sven Neumann and Rapha??l Quinet, adapted)
- validate size values read from files before using them to allocate memory in the PSD and sunras plugins (#247570, patch by Mukund Sivaraman and Sven Neumann, partly adapted)
- add safeguard to avoid crashes while loading corrupt PSD images (#247570, patch by Rapha??l Quinet, adapted)
- convert spec file to UTF-8
[1.2.3-20.5.el3]
- use adapted upstream PSD fix by Sven Neumann (#244406)
[1.2.3-20.4.el3]
- refuse to open PSD files with insanely large dimensions (#244406)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
gimp
2.2.13-2.0.7.el5
gimp-devel
2.2.13-2.0.7.el5
gimp-libs
2.2.13-2.0.7.el5
Oracle Linux x86_64
gimp
2.2.13-2.0.7.el5
gimp-devel
2.2.13-2.0.7.el5
gimp-libs
2.2.13-2.0.7.el5
Oracle Linux i386
gimp
2.2.13-2.0.7.el5
gimp-devel
2.2.13-2.0.7.el5
gimp-libs
2.2.13-2.0.7.el5
Связанные CVE
Связанные уязвимости
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
Integer overflow in the seek_to_and_unpack_pixeldata function in the p ...
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.