|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0327 (gimp)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0327: gimp-2.6.11-7.3.mga1 (1/core)
Date:  Fri, 9 Nov 2012 00:29:52 +0100
Message-ID:  <20121108232952.GA17431@valstar.mageia.org>

MGASA-2012-0327 Date: November 9th, 2012 Affected releases: 1 Description: Updated gimp packages fix security vulnerabilities: Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server (CVE-2012-2763). fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string (CVE-2012-3236). Updated Packages: gimp-2.6.11-7.3.mga1 gimp-python-2.6.11-7.3.mga1 lib(64)gimp2.0_0-2.6.11-7.3.mga1 lib(64)gimp2.0-devel-2.6.11-7.3.mga1 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2763 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3236 http://lists.opensuse.org/opensuse-updates/2012-09/msg000... https://bugs.mageia.org/show_bug.cgi?id=7351 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds