lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050307083038.31106.qmail@www.securityfocus.com> Date: 7 Mar 2005 08:30:38 -0000 From: Hongzhen Zhou <felix__zhou@...mail.com> To: bugtraq@...urityfocus.com Subject: Re: GIMP gifload.exe GIF file (image width)*(image height)==0 DOS vulnerability In-Reply-To: <20050304163537.GA24606@....org> The bugzilla entry is http://bugzilla.gnome.org/show_bug.cgi?id=169113 The vendor has reponsed: ------- Additional Comment #2 From sven@...p.org 2005-03-03 12:51 ------- Added a sanity check in CVS HEAD. I don't consider this worth to be backported to 2.2, closing as FIXED. 2005-03-03 Sven Neumann <sven@...p.org> * plug-ins/common/gifload.c (ReadImage): added a sanity check for bogus frame dimensions. Fixes bug #169113.