Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in GIMP
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in GIMP
ID: MDVSA-2012:142
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0, Mandriva 2011
Datum: Di, 21. August 2012, 18:53
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481
Applikationen: GIMP

Originalnachricht

This is a multi-part message in MIME format...

------------=_1345564455-2945-334

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:142
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gimp
Date : August 21, 2012
Affected: 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in gimp:

A heap-based buffer overflow flaw, leading to invalid free, was
found in the way KISS CEL file format plug-in of Gimp, the GNU Image
Manipulation Program, performed loading of certain palette files. A
remote attacker could provide a specially-crafted KISS palette file
that, when opened in Gimp would cause the CEL plug-in to crash or,
potentially, execute arbitrary code with the privileges of the user
running the gimp executable (CVE-2012-3403).

Integer overflow, leading to heap-based buffer overflow flaw was
found in the GIMP's GIF (Graphics Interchange Format) image file
plug-in. An attacker could create a specially-crafted GIF image
file that, when opened, could cause the GIF plug-in to crash or,
potentially, execute arbitrary code with the privileges of the user
running the GIMP (CVE-2012-3481).

The updated gimp packages have been upgraded to the 2.6.12 version
and patched to correct these issues.

Additionally for Mandriva Enterprise server 5 the gegl packages
was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9,
the enscript packages was added because of a build dependency, the
gutenprint and mtink packages was rebuilt against the gimp 2.6.12
libraries.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2011:
6df85e0bd146aad5111cb93b13aa3d3c 2011/i586/gimp-2.6.12-0.1-mdv2011.0.i586.rpm
c33ee12112d91e840acff735814c2332
2011/i586/gimp-python-2.6.12-0.1-mdv2011.0.i586.rpm
b3cee341cd0391530f2234e25c3f3829
2011/i586/libgimp2.0_0-2.6.12-0.1-mdv2011.0.i586.rpm
b9ae9ef5a24742e1230ef2b21cdaf9fe
2011/i586/libgimp2.0-devel-2.6.12-0.1-mdv2011.0.i586.rpm
1b6b4193b5d548d4e15715266bf47560 2011/SRPMS/gimp-2.6.12-0.1.src.rpm

Mandriva Linux 2011/X86_64:
9f683f9345ffead8bdb51be9db90146e
2011/x86_64/gimp-2.6.12-0.1-mdv2011.0.x86_64.rpm
a8de76aab2e7ce6338fd9f967b998e9c
2011/x86_64/gimp-python-2.6.12-0.1-mdv2011.0.x86_64.rpm
52543a7c6db50902d3ca73b10075ffb7
2011/x86_64/lib64gimp2.0_0-2.6.12-0.1-mdv2011.0.x86_64.rpm
6ca3008f8cb920bfa3bae50d6fd6a232
2011/x86_64/lib64gimp2.0-devel-2.6.12-0.1-mdv2011.0.x86_64.rpm
1b6b4193b5d548d4e15715266bf47560 2011/SRPMS/gimp-2.6.12-0.1.src.rpm

Mandriva Enterprise Server 5:
adfd583395e293e65eb9bdc01411b66a
mes5/i586/enscript-1.6.4-8.2mdvmes5.2.i586.rpm
d66cc2ba6f8243e00eb066d1c3358145 mes5/i586/gegl-0.0.22-0.1mdvmes5.2.i586.rpm
d890ec13a8981fe618bf6ba7f6a662e5 mes5/i586/gimp-2.6.12-0.1mdvmes5.2.i586.rpm
d89b715a1b588006d8876c18da78d3c4
mes5/i586/gimp-python-2.6.12-0.1mdvmes5.2.i586.rpm
4238c650ca3f88169008c15813fffc97
mes5/i586/gutenprint-common-5.2.3-0.3mdvmes5.2.i586.rpm
90cf02d5e29adb704ab063d50c0c6ec2
mes5/i586/gutenprint-cups-5.2.3-0.3mdvmes5.2.i586.rpm
7e1bdf5b099770184c5206a5ea1a4169
mes5/i586/gutenprint-escputil-5.2.3-0.3mdvmes5.2.i586.rpm
91c4d10340291be5af1d161d75510bdb
mes5/i586/gutenprint-foomatic-5.2.3-0.3mdvmes5.2.i586.rpm
20fcd1e4e30c918b3fae7b9bf894e983
mes5/i586/gutenprint-gimp2-5.2.3-0.3mdvmes5.2.i586.rpm
bc7aebfd12c6810a6dbf78e555ae27c9
mes5/i586/gutenprint-ijs-5.2.3-0.3mdvmes5.2.i586.rpm
95bb0625b0bb3cb309566cf7feffc5ed
mes5/i586/libgegl0-0.0.22-0.1mdvmes5.2.i586.rpm
eac4476ae3c38d6779fe70c30661e132
mes5/i586/libgegl-devel-0.0.22-0.1mdvmes5.2.i586.rpm
d31b196dd6a62bf611285bef72f8b8ed
mes5/i586/libgimp2.0_0-2.6.12-0.1mdvmes5.2.i586.rpm
016ae0eaa31501c90bb91d7e47cc807b
mes5/i586/libgimp2.0-devel-2.6.12-0.1mdvmes5.2.i586.rpm
453bb3526f6fcf2a8538d08564b8a904
mes5/i586/libgutenprint2-5.2.3-0.3mdvmes5.2.i586.rpm
326394d81a3eabf6d41d296a6b7b8d58
mes5/i586/libgutenprint2-devel-5.2.3-0.3mdvmes5.2.i586.rpm
114e245beba24c9f7ff3d024853950e9
mes5/i586/libgutenprintui2_1-5.2.3-0.3mdvmes5.2.i586.rpm
4a273b1c580b0e23c1f47cf62f3e0535
mes5/i586/libgutenprintui2_1-devel-5.2.3-0.3mdvmes5.2.i586.rpm
5c38d85ad6d379de351906089caa9881
mes5/i586/mtink-1.0.14-14.2mdvmes5.2.i586.rpm
a993266194594b6b7951c05ed4790d9d
mes5/SRPMS/enscript-1.6.4-8.2mdvmes5.2.src.rpm
9078b3e6d4fdd8755b533599c91ad1c0 mes5/SRPMS/gegl-0.0.22-0.1mdvmes5.2.src.rpm
adaa780385959b892bc7cc2c1a3e6f7f mes5/SRPMS/gimp-2.6.12-0.1mdvmes5.2.src.rpm
324a98ab9ac0c772bd8c52b57ea14a2d
mes5/SRPMS/gutenprint-5.2.3-0.3mdvmes5.2.src.rpm
97b94cadb79f40ac930f71443e0b9e29
mes5/SRPMS/mtink-1.0.14-14.2mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
ce1f98f921ac74975d6b609032fbb9eb
mes5/x86_64/enscript-1.6.4-8.2mdvmes5.2.x86_64.rpm
7bb75619775c9fcb79969301d9b83646
mes5/x86_64/gegl-0.0.22-0.1mdvmes5.2.x86_64.rpm
bc79556d1d5abc375652b40ce711ac04
mes5/x86_64/gimp-2.6.12-0.1mdvmes5.2.x86_64.rpm
0bca1d205b8f692896fa6e68340a4444
mes5/x86_64/gimp-python-2.6.12-0.1mdvmes5.2.x86_64.rpm
1264a7e67c082297d69d04dd43895cd8
mes5/x86_64/gutenprint-common-5.2.3-0.3mdvmes5.2.x86_64.rpm
53bda658df6540665264ecc1ed9ff6da
mes5/x86_64/gutenprint-cups-5.2.3-0.3mdvmes5.2.x86_64.rpm
295ac9156ffee42a512713b6aec8da36
mes5/x86_64/gutenprint-escputil-5.2.3-0.3mdvmes5.2.x86_64.rpm
633e8ab8d476e440d64baa4b47012563
mes5/x86_64/gutenprint-foomatic-5.2.3-0.3mdvmes5.2.x86_64.rpm
d405f95ade321b610f1c44bbf805f5b1
mes5/x86_64/gutenprint-gimp2-5.2.3-0.3mdvmes5.2.x86_64.rpm
8d2ccdf35f159b69c44fd84c5f5c00b1
mes5/x86_64/gutenprint-ijs-5.2.3-0.3mdvmes5.2.x86_64.rpm
6f8164ef693858736f2aec38f31cb9c8
mes5/x86_64/lib64gegl0-0.0.22-0.1mdvmes5.2.x86_64.rpm
01f465095a4f2a0e8533008d45dbc08d
mes5/x86_64/lib64gegl-devel-0.0.22-0.1mdvmes5.2.x86_64.rpm
72e57d27a953c8e09fc9748cb18f9a86
mes5/x86_64/lib64gimp2.0_0-2.6.12-0.1mdvmes5.2.x86_64.rpm
88bfb7f493111df29efa7e1b22ca72fb
mes5/x86_64/lib64gimp2.0-devel-2.6.12-0.1mdvmes5.2.x86_64.rpm
07d38077acd65da67c9ebb95b828a20b
mes5/x86_64/lib64gutenprint2-5.2.3-0.3mdvmes5.2.x86_64.rpm
bfb316021e3c3896ef6c3daab6684008
mes5/x86_64/lib64gutenprint2-devel-5.2.3-0.3mdvmes5.2.x86_64.rpm
55a465cb018c4dc97ede038dabc3d1ff
mes5/x86_64/lib64gutenprintui2_1-5.2.3-0.3mdvmes5.2.x86_64.rpm
e2217d76b94bb47e952957bcffbd3227
mes5/x86_64/lib64gutenprintui2_1-devel-5.2.3-0.3mdvmes5.2.x86_64.rpm
420aff1280ab464d40aea0b5b75d44af
mes5/x86_64/mtink-1.0.14-14.2mdvmes5.2.x86_64.rpm
a993266194594b6b7951c05ed4790d9d
mes5/SRPMS/enscript-1.6.4-8.2mdvmes5.2.src.rpm
9078b3e6d4fdd8755b533599c91ad1c0 mes5/SRPMS/gegl-0.0.22-0.1mdvmes5.2.src.rpm
adaa780385959b892bc7cc2c1a3e6f7f mes5/SRPMS/gimp-2.6.12-0.1mdvmes5.2.src.rpm
324a98ab9ac0c772bd8c52b57ea14a2d
mes5/SRPMS/gutenprint-5.2.3-0.3mdvmes5.2.src.rpm
97b94cadb79f40ac930f71443e0b9e29
mes5/SRPMS/mtink-1.0.14-14.2mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQM4KJmqjQ0CJFipgRAib9AJ99hkTs6tnjVSPs4vhVan9JoFakZQCeJgZu
EYy4NCsp0eQx4uP2I2zoQ/4=
=1VeY
-----END PGP SIGNATURE-----


------------=_1345564455-2945-334
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1345564455-2945-334--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung