|
Message-ID: <CAGVYHsXwhtonG6Qxf5EzyGkq3uycwei2j36VHUxecU7kT31zLQ@mail.gmail.com> Date: Wed, 21 Nov 2012 12:19:35 -0500 From: Andrés Gómez Ramírez <andresgomezram7@...il.com> To: oss-security@...ts.openwall.com, bugtraq@...urityfocus.com Subject: CVE Request: Gimp memory corruption vulnerability Hello, could a CVE be assigned to this issue? Name: Gimp memory corruption vulnerability Software: GIMP 2.8.2 Software link: http://www.gimp.org/ <http://plib.sourceforge.net/> Vulnerability Type: Memory Corruption Description: GIMP 2.8.2 is vulnerable to memory corruption when reading XWD files, which could lead even to arbitrary code execution. Upstream fix: http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 (fixed in master and gimp-2-8) References: https://bugzilla.gnome.org/show_bug.cgi?id=687392 Thanks, Andres Gomez.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.