|
|
Subscribe / Log in / New account

Pardus alert 2011-52 (gimp)

From:  Meltem Parmaksız <meltem@pardus.org.tr>
To:  pardus-security@pardus.org.tr
Subject:  [Pardus-security] [PLSA 2011-52] Gimp: Multiple Vulnerabilities
Date:  Mon, 28 Feb 2011 13:21:40 +0200
Message-ID:  <201102281321.40697.meltem@pardus.org.tr>

------------------------------------------------------------------------ Pardus Linux Security Advisory 2011-52 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2011-02-28 Severity: 3 Type: Remote ------------------------------------------------------------------------ Summary ======= Multiple vulnerabilities have been fixed in gimp. Description =========== CVE-2010-4540 gimp LIGHTING EFFECTS > LIGHT plugin stack buffer overflow CVE-2010-4541 gimp SPHERE DESIGNER plugin stack buffer overflow CVE-2010-4542 gimp GFIG plugin stack buffer overflow CVE-2010-4543 gimp heap overflow read_channel_data() in file-psp.c Affected packages: Pardus 2009: gimp, all before 2.6.10-52-15 Pardus 2011: gimp, all before 2.6.11-56-p11 Resolution ========== There are update(s) for gimp. You can update them via Package Manager or with a single command from console: Pardus 2009: pisi up gimp Pardus 2011: pisi up gimp References ========== * http://bugs.pardus.org.tr/show_bug.cgi?id=16147 * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-... ------------------------------------------------------------------------ _______________________________________________ Pardus-Security mailing list Pardus-Security@pardus.org.tr http://liste.pardus.org.tr/mailman/listinfo/pardus-security


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds