lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1T3qlI-0006pL-Pk@titan.mandriva.com>
Date: Tue, 21 Aug 2012 17:53:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2012:142 ] gimp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:142
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : gimp
 Date    : August 21, 2012
 Affected: 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in gimp:
 
 A heap-based buffer overflow flaw, leading to invalid free, was
 found in the way KISS CEL file format plug-in of Gimp, the GNU Image
 Manipulation Program, performed loading of certain palette files. A
 remote attacker could provide a specially-crafted KISS palette file
 that, when opened in Gimp would cause the CEL plug-in to crash or,
 potentially, execute arbitrary code with the privileges of the user
 running the gimp executable (CVE-2012-3403).
 
 Integer overflow, leading to heap-based buffer overflow flaw was
 found in the GIMP&#039;s GIF (Graphics Interchange Format) image file
 plug-in. An attacker could create a specially-crafted GIF image
 file that, when opened, could cause the GIF plug-in to crash or,
 potentially, execute arbitrary code with the privileges of the user
 running the GIMP (CVE-2012-3481).
 
 The updated gimp packages have been upgraded to the 2.6.12 version
 and patched to correct these issues.
 
 Additionally for Mandriva Enterprise server 5 the gegl packages
 was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9,
 the enscript packages was added because of a build dependency, the
 gutenprint and mtink packages was rebuilt against the gimp 2.6.12
 libraries.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3403
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2011:
 6df85e0bd146aad5111cb93b13aa3d3c  2011/i586/gimp-2.6.12-0.1-mdv2011.0.i586.rpm
 c33ee12112d91e840acff735814c2332  2011/i586/gimp-python-2.6.12-0.1-mdv2011.0.i586.rpm
 b3cee341cd0391530f2234e25c3f3829  2011/i586/libgimp2.0_0-2.6.12-0.1-mdv2011.0.i586.rpm
 b9ae9ef5a24742e1230ef2b21cdaf9fe  2011/i586/libgimp2.0-devel-2.6.12-0.1-mdv2011.0.i586.rpm 
 1b6b4193b5d548d4e15715266bf47560  2011/SRPMS/gimp-2.6.12-0.1.src.rpm

 Mandriva Linux 2011/X86_64:
 9f683f9345ffead8bdb51be9db90146e  2011/x86_64/gimp-2.6.12-0.1-mdv2011.0.x86_64.rpm
 a8de76aab2e7ce6338fd9f967b998e9c  2011/x86_64/gimp-python-2.6.12-0.1-mdv2011.0.x86_64.rpm
 52543a7c6db50902d3ca73b10075ffb7  2011/x86_64/lib64gimp2.0_0-2.6.12-0.1-mdv2011.0.x86_64.rpm
 6ca3008f8cb920bfa3bae50d6fd6a232  2011/x86_64/lib64gimp2.0-devel-2.6.12-0.1-mdv2011.0.x86_64.rpm 
 1b6b4193b5d548d4e15715266bf47560  2011/SRPMS/gimp-2.6.12-0.1.src.rpm

 Mandriva Enterprise Server 5:
 adfd583395e293e65eb9bdc01411b66a  mes5/i586/enscript-1.6.4-8.2mdvmes5.2.i586.rpm
 d66cc2ba6f8243e00eb066d1c3358145  mes5/i586/gegl-0.0.22-0.1mdvmes5.2.i586.rpm
 d890ec13a8981fe618bf6ba7f6a662e5  mes5/i586/gimp-2.6.12-0.1mdvmes5.2.i586.rpm
 d89b715a1b588006d8876c18da78d3c4  mes5/i586/gimp-python-2.6.12-0.1mdvmes5.2.i586.rpm
 4238c650ca3f88169008c15813fffc97  mes5/i586/gutenprint-common-5.2.3-0.3mdvmes5.2.i586.rpm
 90cf02d5e29adb704ab063d50c0c6ec2  mes5/i586/gutenprint-cups-5.2.3-0.3mdvmes5.2.i586.rpm
 7e1bdf5b099770184c5206a5ea1a4169  mes5/i586/gutenprint-escputil-5.2.3-0.3mdvmes5.2.i586.rpm
 91c4d10340291be5af1d161d75510bdb  mes5/i586/gutenprint-foomatic-5.2.3-0.3mdvmes5.2.i586.rpm
 20fcd1e4e30c918b3fae7b9bf894e983  mes5/i586/gutenprint-gimp2-5.2.3-0.3mdvmes5.2.i586.rpm
 bc7aebfd12c6810a6dbf78e555ae27c9  mes5/i586/gutenprint-ijs-5.2.3-0.3mdvmes5.2.i586.rpm
 95bb0625b0bb3cb309566cf7feffc5ed  mes5/i586/libgegl0-0.0.22-0.1mdvmes5.2.i586.rpm
 eac4476ae3c38d6779fe70c30661e132  mes5/i586/libgegl-devel-0.0.22-0.1mdvmes5.2.i586.rpm
 d31b196dd6a62bf611285bef72f8b8ed  mes5/i586/libgimp2.0_0-2.6.12-0.1mdvmes5.2.i586.rpm
 016ae0eaa31501c90bb91d7e47cc807b  mes5/i586/libgimp2.0-devel-2.6.12-0.1mdvmes5.2.i586.rpm
 453bb3526f6fcf2a8538d08564b8a904  mes5/i586/libgutenprint2-5.2.3-0.3mdvmes5.2.i586.rpm
 326394d81a3eabf6d41d296a6b7b8d58  mes5/i586/libgutenprint2-devel-5.2.3-0.3mdvmes5.2.i586.rpm
 114e245beba24c9f7ff3d024853950e9  mes5/i586/libgutenprintui2_1-5.2.3-0.3mdvmes5.2.i586.rpm
 4a273b1c580b0e23c1f47cf62f3e0535  mes5/i586/libgutenprintui2_1-devel-5.2.3-0.3mdvmes5.2.i586.rpm
 5c38d85ad6d379de351906089caa9881  mes5/i586/mtink-1.0.14-14.2mdvmes5.2.i586.rpm 
 a993266194594b6b7951c05ed4790d9d  mes5/SRPMS/enscript-1.6.4-8.2mdvmes5.2.src.rpm
 9078b3e6d4fdd8755b533599c91ad1c0  mes5/SRPMS/gegl-0.0.22-0.1mdvmes5.2.src.rpm
 adaa780385959b892bc7cc2c1a3e6f7f  mes5/SRPMS/gimp-2.6.12-0.1mdvmes5.2.src.rpm
 324a98ab9ac0c772bd8c52b57ea14a2d  mes5/SRPMS/gutenprint-5.2.3-0.3mdvmes5.2.src.rpm
 97b94cadb79f40ac930f71443e0b9e29  mes5/SRPMS/mtink-1.0.14-14.2mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 ce1f98f921ac74975d6b609032fbb9eb  mes5/x86_64/enscript-1.6.4-8.2mdvmes5.2.x86_64.rpm
 7bb75619775c9fcb79969301d9b83646  mes5/x86_64/gegl-0.0.22-0.1mdvmes5.2.x86_64.rpm
 bc79556d1d5abc375652b40ce711ac04  mes5/x86_64/gimp-2.6.12-0.1mdvmes5.2.x86_64.rpm
 0bca1d205b8f692896fa6e68340a4444  mes5/x86_64/gimp-python-2.6.12-0.1mdvmes5.2.x86_64.rpm
 1264a7e67c082297d69d04dd43895cd8  mes5/x86_64/gutenprint-common-5.2.3-0.3mdvmes5.2.x86_64.rpm
 53bda658df6540665264ecc1ed9ff6da  mes5/x86_64/gutenprint-cups-5.2.3-0.3mdvmes5.2.x86_64.rpm
 295ac9156ffee42a512713b6aec8da36  mes5/x86_64/gutenprint-escputil-5.2.3-0.3mdvmes5.2.x86_64.rpm
 633e8ab8d476e440d64baa4b47012563  mes5/x86_64/gutenprint-foomatic-5.2.3-0.3mdvmes5.2.x86_64.rpm
 d405f95ade321b610f1c44bbf805f5b1  mes5/x86_64/gutenprint-gimp2-5.2.3-0.3mdvmes5.2.x86_64.rpm
 8d2ccdf35f159b69c44fd84c5f5c00b1  mes5/x86_64/gutenprint-ijs-5.2.3-0.3mdvmes5.2.x86_64.rpm
 6f8164ef693858736f2aec38f31cb9c8  mes5/x86_64/lib64gegl0-0.0.22-0.1mdvmes5.2.x86_64.rpm
 01f465095a4f2a0e8533008d45dbc08d  mes5/x86_64/lib64gegl-devel-0.0.22-0.1mdvmes5.2.x86_64.rpm
 72e57d27a953c8e09fc9748cb18f9a86  mes5/x86_64/lib64gimp2.0_0-2.6.12-0.1mdvmes5.2.x86_64.rpm
 88bfb7f493111df29efa7e1b22ca72fb  mes5/x86_64/lib64gimp2.0-devel-2.6.12-0.1mdvmes5.2.x86_64.rpm
 07d38077acd65da67c9ebb95b828a20b  mes5/x86_64/lib64gutenprint2-5.2.3-0.3mdvmes5.2.x86_64.rpm
 bfb316021e3c3896ef6c3daab6684008  mes5/x86_64/lib64gutenprint2-devel-5.2.3-0.3mdvmes5.2.x86_64.rpm
 55a465cb018c4dc97ede038dabc3d1ff  mes5/x86_64/lib64gutenprintui2_1-5.2.3-0.3mdvmes5.2.x86_64.rpm
 e2217d76b94bb47e952957bcffbd3227  mes5/x86_64/lib64gutenprintui2_1-devel-5.2.3-0.3mdvmes5.2.x86_64.rpm
 420aff1280ab464d40aea0b5b75d44af  mes5/x86_64/mtink-1.0.14-14.2mdvmes5.2.x86_64.rpm 
 a993266194594b6b7951c05ed4790d9d  mes5/SRPMS/enscript-1.6.4-8.2mdvmes5.2.src.rpm
 9078b3e6d4fdd8755b533599c91ad1c0  mes5/SRPMS/gegl-0.0.22-0.1mdvmes5.2.src.rpm
 adaa780385959b892bc7cc2c1a3e6f7f  mes5/SRPMS/gimp-2.6.12-0.1mdvmes5.2.src.rpm
 324a98ab9ac0c772bd8c52b57ea14a2d  mes5/SRPMS/gutenprint-5.2.3-0.3mdvmes5.2.src.rpm
 97b94cadb79f40ac930f71443e0b9e29  mes5/SRPMS/mtink-1.0.14-14.2mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQM4KJmqjQ0CJFipgRAib9AJ99hkTs6tnjVSPs4vhVan9JoFakZQCeJgZu
EYy4NCsp0eQx4uP2I2zoQ/4=
=1VeY
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ