Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0838

Опубликовано: 31 мая 2011
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2011-0838: gimp security update (MODERATE)

[2:2.2.13-2.0.7.2]

  • fix various overflows (#537356, #666793, #689831, #703403, #703405, #703407,
    • unfuzz gimphelpmissing, icontheme patches

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

gimp

2.2.13-2.0.7.el5_6.2

gimp-devel

2.2.13-2.0.7.el5_6.2

gimp-libs

2.2.13-2.0.7.el5_6.2

Oracle Linux x86_64

gimp

2.2.13-2.0.7.el5_6.2

gimp-devel

2.2.13-2.0.7.el5_6.2

gimp-libs

2.2.13-2.0.7.el5_6.2

Oracle Linux i386

gimp

2.2.13-2.0.7.el5_6.2

gimp-devel

2.2.13-2.0.7.el5_6.2

gimp-libs

2.2.13-2.0.7.el5_6.2

Связанные уязвимости

oracle-oval
около 14 лет назад

ELSA-2011-0839: gimp security update (MODERATE)

ubuntu
больше 14 лет назад

Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.

redhat
больше 14 лет назад

Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.

nvd
больше 14 лет назад

Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.

debian
больше 14 лет назад

Stack-based buffer overflow in the loadit function in plug-ins/common/ ...