Pardus alert 2011-52 (gimp)
From: | Meltem Parmaksız <meltem@pardus.org.tr> | |
To: | pardus-security@pardus.org.tr | |
Subject: | [Pardus-security] [PLSA 2011-52] Gimp: Multiple Vulnerabilities | |
Date: | Mon, 28 Feb 2011 13:21:40 +0200 | |
Message-ID: | <201102281321.40697.meltem@pardus.org.tr> |
------------------------------------------------------------------------ Pardus Linux Security Advisory 2011-52 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2011-02-28 Severity: 3 Type: Remote ------------------------------------------------------------------------ Summary ======= Multiple vulnerabilities have been fixed in gimp. Description =========== CVE-2010-4540 gimp LIGHTING EFFECTS > LIGHT plugin stack buffer overflow CVE-2010-4541 gimp SPHERE DESIGNER plugin stack buffer overflow CVE-2010-4542 gimp GFIG plugin stack buffer overflow CVE-2010-4543 gimp heap overflow read_channel_data() in file-psp.c Affected packages: Pardus 2009: gimp, all before 2.6.10-52-15 Pardus 2011: gimp, all before 2.6.11-56-p11 Resolution ========== There are update(s) for gimp. You can update them via Package Manager or with a single command from console: Pardus 2009: pisi up gimp Pardus 2011: pisi up gimp References ========== * http://bugs.pardus.org.tr/show_bug.cgi?id=16147 * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... ------------------------------------------------------------------------ _______________________________________________ Pardus-Security mailing list Pardus-Security@pardus.org.tr http://liste.pardus.org.tr/mailman/listinfo/pardus-security