Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 21 Nov 2012 12:19:35 -0500
From: Andrés Gómez Ramírez <andresgomezram7@...il.com>
To: oss-security@...ts.openwall.com, bugtraq@...urityfocus.com
Subject: CVE Request: Gimp memory corruption vulnerability

Hello, could a CVE be assigned to this issue?

Name: Gimp memory corruption vulnerability
Software: GIMP 2.8.2
Software link: http://www.gimp.org/ <http://plib.sourceforge.net/>
Vulnerability Type: Memory Corruption

Description:

GIMP 2.8.2 is vulnerable to memory corruption when reading XWD files, which
could lead even to arbitrary code execution.

Upstream fix:
http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1
(fixed in master and gimp-2-8)

References:
https://bugzilla.gnome.org/show_bug.cgi?id=687392

Thanks,

Andres Gomez.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ