lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1RMOGC-00080w-Qk@titan.mandriva.com>
Date: Fri, 04 Nov 2011 19:13:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2011:167 ] gimp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2011:167
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : gimp
 Date    : November 4, 2011
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been discovered and corrected in gimp:
 
 The LZW decompressor in the LWZReadByte function in giftoppm.c in
 the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw
 function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte
 function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier,
 the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4
 and earlier, and other products, does not properly handle code words
 that are absent from the decompression table when encountered, which
 allows remote attackers to trigger an infinite loop or a heap-based
 buffer overflow, and possibly execute arbitrary code, via a crafted
 compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895
 (CVE-2011-2896).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2010.1:
 6765f41707b43b717ddb8dd3bfa4cdbc  2010.1/i586/gimp-2.6.8-3.2mdv2010.2.i586.rpm
 4c1aab6b423ab88f2fa0bb507a7c60bf  2010.1/i586/gimp-python-2.6.8-3.2mdv2010.2.i586.rpm
 7fd3284b7bc8696ae8075f1a7349c732  2010.1/i586/libgimp2.0_0-2.6.8-3.2mdv2010.2.i586.rpm
 a61333781b8723af9f45dbb94ce9bbb9  2010.1/i586/libgimp2.0-devel-2.6.8-3.2mdv2010.2.i586.rpm 
 f4a4c0635712389d3a438818c3bbde7c  2010.1/SRPMS/gimp-2.6.8-3.2mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 d2ed9cb97e27c8ae7a718b904d442cd1  2010.1/x86_64/gimp-2.6.8-3.2mdv2010.2.x86_64.rpm
 a60fb4df9340ce11a17f8b3c0011c2ac  2010.1/x86_64/gimp-python-2.6.8-3.2mdv2010.2.x86_64.rpm
 55a40dfc4c289c48a0971c4fbb01d395  2010.1/x86_64/lib64gimp2.0_0-2.6.8-3.2mdv2010.2.x86_64.rpm
 dd6d1abb065aa27644b369061f666b0c  2010.1/x86_64/lib64gimp2.0-devel-2.6.8-3.2mdv2010.2.x86_64.rpm 
 f4a4c0635712389d3a438818c3bbde7c  2010.1/SRPMS/gimp-2.6.8-3.2mdv2010.2.src.rpm

 Mandriva Linux 2011:
 40025c9fcafb3d02bd37c92b940c353d  2011/i586/gimp-2.6.11-7.1-mdv2011.0.i586.rpm
 5a3226c6ecdbbae83b90ed9e28c6941a  2011/i586/gimp-python-2.6.11-7.1-mdv2011.0.i586.rpm
 9f156b65a74d0b74538f50b441cc37c4  2011/i586/libgimp2.0_0-2.6.11-7.1-mdv2011.0.i586.rpm
 af0d3a7478773243aa76d99f148b5186  2011/i586/libgimp2.0-devel-2.6.11-7.1-mdv2011.0.i586.rpm 
 4b4024953d52232e1cf0f308dc3a16dc  2011/SRPMS/gimp-2.6.11-7.1.src.rpm

 Mandriva Linux 2011/X86_64:
 f8f0140aebd1666c5d10b09f57de20cc  2011/x86_64/gimp-2.6.11-7.1-mdv2011.0.x86_64.rpm
 d27e9d2ef098ad86d3f68adf1c5f49ca  2011/x86_64/gimp-python-2.6.11-7.1-mdv2011.0.x86_64.rpm
 da1fa7693e5cd7dd8d9807912a61161a  2011/x86_64/lib64gimp2.0_0-2.6.11-7.1-mdv2011.0.x86_64.rpm
 453e8a82d6e7425a7a5e2758a5e6879d  2011/x86_64/lib64gimp2.0-devel-2.6.11-7.1-mdv2011.0.x86_64.rpm 
 4b4024953d52232e1cf0f308dc3a16dc  2011/SRPMS/gimp-2.6.11-7.1.src.rpm

 Mandriva Enterprise Server 5:
 5ca4859d1aab6879d30e6b2188f38d4a  mes5/i586/gimp-2.4.7-1.4mdvmes5.2.i586.rpm
 b6baebc7a47430b09816c43fee81370f  mes5/i586/gimp-python-2.4.7-1.4mdvmes5.2.i586.rpm
 b22ac83c1f8d96d5919aaabe1af9aada  mes5/i586/libgimp2.0_0-2.4.7-1.4mdvmes5.2.i586.rpm
 73b245e8d872bfabaa20787c454e175b  mes5/i586/libgimp2.0-devel-2.4.7-1.4mdvmes5.2.i586.rpm 
 2bc33101108e4bcddd0ccdf6a927958d  mes5/SRPMS/gimp-2.4.7-1.4mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 b5083b87e10faef50207e0774dbd4d1c  mes5/x86_64/gimp-2.4.7-1.4mdvmes5.2.x86_64.rpm
 efaa99214382712e2656780b06ef63a0  mes5/x86_64/gimp-python-2.4.7-1.4mdvmes5.2.x86_64.rpm
 008a36ea72e6578a25afd25769893db1  mes5/x86_64/lib64gimp2.0_0-2.4.7-1.4mdvmes5.2.x86_64.rpm
 b30995cb00d18e05a7e4221d0918af15  mes5/x86_64/lib64gimp2.0-devel-2.4.7-1.4mdvmes5.2.x86_64.rpm 
 2bc33101108e4bcddd0ccdf6a927958d  mes5/SRPMS/gimp-2.4.7-1.4mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFOs/4bmqjQ0CJFipgRAqWWAKCp7TdpAx/vms4vKBT9TyL4+/VC/wCgqIdr
NtjcO/GtUEHG2dDM3IU0j7Q=
=kSjd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ