Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 20 Nov 2023 12:05:36 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: GIMP 2.10.36 fixed multiple image format parser vulnerabilities

https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
reported:

> Four vulnerabilities were reported by the Zero Day Initiative in code for the following formats and fixed immediately:
> 
>     DDS: ZDI-CAN-22093
>     PSD: ZDI-CAN-22094
>     PSP: ZDI-CAN-22096 and ZDI-CAN-22097
> 
> Additionally dependencies have been updated in our binary packages, and with them, some vulnerabilities recently reported in these libraries were fixed.

These vulnerabilities also had advisories released by ZDI which gave
the corresponding CVE ids:

ZDI-CAN-22093: CVE-2023-44441
  GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
  https://www.zerodayinitiative.com/advisories/ZDI-23-1592/

ZDI-CAN-22094: CVE-2023-44442
  GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
  https://www.zerodayinitiative.com/advisories/ZDI-23-1594/

ZDI-CAN-22096: CVE-2023-44443
  GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability
  https://www.zerodayinitiative.com/advisories/ZDI-23-1593/

ZDI-CAN-22097: CVE-2023-44444
  GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability
  https://www.zerodayinitiative.com/advisories/ZDI-23-1591/

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.