[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1IOHzf-0003Ix-BS@artemis.annvix.ca>
Date: Thu, 23 Aug 2007 13:05:23 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:170 ] - Updated gimp packages fix
input data validation issues in several plugins
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:170
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gimp
Date : August 23, 2007
Affected: 2007.0, 2007.1, Corporate 3.0
_______________________________________________________________________
Problem Description:
Multiple integer overflows in the image loader plug-ins in GIMP before
2.2.16 allow user-assisted remote attackers to execute arbitrary code
via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP,
(5) Sun RAS, (6) XBM, and (7) XWD files. (CVE-2006-4519)
Integer overflow in the seek_to_and_unpack_pixeldata function in
the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute
arbitrary code via a crafted PSD file that contains a large (1)
width or (2) height value. (CVE-2007-2949)
Victor Stinner has discovered several flaws in file plug-ins using
his fuzzyfier tool fusil. Several modified image files cause the
plug-ins to crash or consume excessive amounts of memory due to
insufficient input validation. Affected plug-ins: bmp, pcx, psd, psp
(*.tub). (CVE-2007-3741)
Updated packages have been patched to prevent these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3741
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
bf9edb14123c54a69c8b767e4ff9b59b 2007.0/i586/gimp-2.3.10-6.4mdv2007.0.i586.rpm
25c09088a30f1ac4a619671f971abd65 2007.0/i586/gimp-python-2.3.10-6.4mdv2007.0.i586.rpm
b406215f9a2fd22d48bd28cd2b7aa5c1 2007.0/i586/libgimp2.0-devel-2.3.10-6.4mdv2007.0.i586.rpm
493176b6d9268753888d5ed88fe82d73 2007.0/i586/libgimp2.0_0-2.3.10-6.4mdv2007.0.i586.rpm
6ff93a240bbed2cb1f2a7d43db465c5b 2007.0/SRPMS/gimp-2.3.10-6.4mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
3b0a82327d1c57c9d92edf2810502cc2 2007.0/x86_64/gimp-2.3.10-6.4mdv2007.0.x86_64.rpm
aa6969a3c734d5233ea1bf918068b655 2007.0/x86_64/gimp-python-2.3.10-6.4mdv2007.0.x86_64.rpm
28086552988cf08d50a2196a5683a893 2007.0/x86_64/lib64gimp2.0-devel-2.3.10-6.4mdv2007.0.x86_64.rpm
f85032c7fe1e839c7dae7f0f4f71b19d 2007.0/x86_64/lib64gimp2.0_0-2.3.10-6.4mdv2007.0.x86_64.rpm
6ff93a240bbed2cb1f2a7d43db465c5b 2007.0/SRPMS/gimp-2.3.10-6.4mdv2007.0.src.rpm
Mandriva Linux 2007.1:
8b2d18fbd2ec2d1d75467c875b51194a 2007.1/i586/gimp-2.3.14-3.3mdv2007.1.i586.rpm
eafdff0cbdfa2c5987083d66aab6acf7 2007.1/i586/gimp-python-2.3.14-3.3mdv2007.1.i586.rpm
0547d89384937df347d4bc0141c4ad58 2007.1/i586/libgimp2.0-devel-2.3.14-3.3mdv2007.1.i586.rpm
efde967b2b2f0600b6f6637c0d234a01 2007.1/i586/libgimp2.0_0-2.3.14-3.3mdv2007.1.i586.rpm
23426e0e7ef3735cb4392aab2631122b 2007.1/SRPMS/gimp-2.3.14-3.3mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
4828d4abf93c14331f7f17be448c2ab8 2007.1/x86_64/gimp-2.3.14-3.3mdv2007.1.x86_64.rpm
07ec9f3807b3732767c56882c5700af7 2007.1/x86_64/gimp-python-2.3.14-3.3mdv2007.1.x86_64.rpm
275cdb72761ed809e21c495bef4aebe7 2007.1/x86_64/lib64gimp2.0-devel-2.3.14-3.3mdv2007.1.x86_64.rpm
bc21d6fe79269a20a4e8cf581ec15e73 2007.1/x86_64/lib64gimp2.0_0-2.3.14-3.3mdv2007.1.x86_64.rpm
23426e0e7ef3735cb4392aab2631122b 2007.1/SRPMS/gimp-2.3.14-3.3mdv2007.1.src.rpm
Corporate 3.0:
0dcdab9693c953ac71ffd48f3df99502 corporate/3.0/i586/gimp-1.2.5-13.4.C30mdk.i586.rpm
c7911c3c8d3cbf6c7c0a996e24fd2f0b corporate/3.0/i586/gimp-doc-1.2.5-13.4.C30mdk.i586.rpm
106fef8a8de6f8c18acbdfee686acf37 corporate/3.0/i586/gimp-perl-1.2.5-13.4.C30mdk.i586.rpm
d1dfe6d9f1399bffcc6da9a775104312 corporate/3.0/i586/libgimp1.2-1.2.5-13.4.C30mdk.i586.rpm
1d000ff63592903fd2f761d838699fea corporate/3.0/i586/libgimp1.2_1-1.2.5-13.4.C30mdk.i586.rpm
97b6a130d96da091eb26da1ac54ebcd4 corporate/3.0/i586/libgimp1.2_1-devel-1.2.5-13.4.C30mdk.i586.rpm
df25d5dc833ca512a0d31f839bdf7474 corporate/3.0/SRPMS/gimp-1.2.5-13.4.C30mdk.src.rpm
Corporate 3.0/X86_64:
7d6a3c0448b39a0b3194a73dbf9e5b19 corporate/3.0/x86_64/gimp-1.2.5-13.4.C30mdk.x86_64.rpm
4e243e82b04fdddf71845d04c75595cf corporate/3.0/x86_64/gimp-doc-1.2.5-13.4.C30mdk.x86_64.rpm
ac826ac35fe04e0bc591cb4612cbe30d corporate/3.0/x86_64/gimp-perl-1.2.5-13.4.C30mdk.x86_64.rpm
c9d1fb6e82830ce6502ec1cc56a99b43 corporate/3.0/x86_64/lib64gimp1.2-1.2.5-13.4.C30mdk.x86_64.rpm
3ab4ea172a56d2e4d85025e65c8fdd91 corporate/3.0/x86_64/lib64gimp1.2_1-1.2.5-13.4.C30mdk.x86_64.rpm
bb3d1d4b0bd1519bc452e08bae9b23a5 corporate/3.0/x86_64/lib64gimp1.2_1-devel-1.2.5-13.4.C30mdk.x86_64.rpm
df25d5dc833ca512a0d31f839bdf7474 corporate/3.0/SRPMS/gimp-1.2.5-13.4.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGzdBSmqjQ0CJFipgRAov9AJ97s+YuHubKQ2Mu+3MqR0iNPkyE2QCfZ5jA
qBuvkLdx9WClGwVKEg80Vuw=
=gKiG
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists