drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in gimp
| Name: |
Pufferüberlauf in gimp |
|
| ID: |
DSA-6049-1 |
|
| Distribution: |
Debian |
|
| Plattformen: |
Debian bookworm, Debian trixie |
|
| Datum: |
Di, 4. November 2025, 22:54 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2025-10934 |
|
| Applikationen: |
GIMP |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-6049-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 04, 2025 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : gimp CVE ID : CVE-2025-10934
A buffer overflow was discovered in GIMP, the GNU Image Manipulation Program, which could result in denial of service or potentially the execution of arbitrary code if malformed XWD images are opened.
For the oldstable distribution (bookworm), this problem has been fixed in version 2.10.34-1+deb12u5.
For the stable distribution (trixie), this problem has been fixed in version 3.0.4-3+deb13u2.
We recommend that you upgrade your gimp packages.
For the detailed security status of gimp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gimp
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmkKV5cACgkQEMKTtsN8 TjZfuxAAugTmTQBSjbfIjhb04TMR4tp2zabfXVXsz3dEIcpsPjXgUQooKH6oaQYL lA+TuU/36MNRcBVo+Shq3xg5TyEEgSmxxd9B/uFxV/dy7AW3OmqWZdNPwKbbhKVx Fib6mx8/gfViCCmL0J/FnRY9CvWazUmMFpAVsF3MAO+X1Yt/LWiNEEVsY5+ibI79 wKXNgqBCZqkO1UlwgeepekiDiV5AXr7hNa8OHeempTINhqvoGEfhvnCOFTUNiolZ OvVWpeWt4V0HjbLORUfsv04KNCg9xbv/RttBJ8XfB6RslUjck17zkADr9TIn3hE8 WB3ElOwRvEwZmLP1jNvmgiQnaHSWsa0OqQg83imHueEoXNY64kuDO3DHUpgr7A78 ev/40q/yhC7BDydSiXz5lw2kV18ugEpBGaKoXJGfmxFS2jAYB1Ah1C1Xuc0irbUZ NceNRO4KnA9BN3kh2EFHhWgnw3R7xID87MDOZVR4vZe1TpZjpx4A2HxM4TgrJ6Q2 dx2LmEDLiYg/10t0dkrJqjzSDzGu6qIAIGGU89xaXHKHXjKonhUvHKtqnXqe648j 0/Po246c+nrLTR5kluGQDH/s5vbZyBoIiXEDcXjBEJu6mMsKccfmMn3gf0i+UVm+ P5CBh1HB1MyiIwZ8mOlw5gJqlkFfm6/g83Jh82vJ4IScDoPQ9c8= =JdT4 -----END PGP SIGNATURE-----
|
|
|
|