Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0839

Опубликовано: 01 июн. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-0839: gimp security update (MODERATE)

[2:2.6.9-4.1]

  • fix various overflows (#666793, #703403, #703405, #703407, #704512)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

gimp

2.6.9-4.el6_1.1

gimp-devel

2.6.9-4.el6_1.1

gimp-devel-tools

2.6.9-4.el6_1.1

gimp-help-browser

2.6.9-4.el6_1.1

gimp-libs

2.6.9-4.el6_1.1

Oracle Linux i686

gimp

2.6.9-4.el6_1.1

gimp-devel

2.6.9-4.el6_1.1

gimp-devel-tools

2.6.9-4.el6_1.1

gimp-help-browser

2.6.9-4.el6_1.1

gimp-libs

2.6.9-4.el6_1.1

Связанные уязвимости

oracle-oval
около 14 лет назад

ELSA-2011-0838: gimp security update (MODERATE)

ubuntu
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

redhat
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

nvd
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

debian
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb functi ...