|
Message-ID: <ca835ded-9dcd-4345-a096-ddd9ddcb05e9@oracle.com> Date: Mon, 20 Nov 2023 12:05:36 -0800 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: GIMP 2.10.36 fixed multiple image format parser vulnerabilities https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities reported: > Four vulnerabilities were reported by the Zero Day Initiative in code for the following formats and fixed immediately: > > DDS: ZDI-CAN-22093 > PSD: ZDI-CAN-22094 > PSP: ZDI-CAN-22096 and ZDI-CAN-22097 > > Additionally dependencies have been updated in our binary packages, and with them, some vulnerabilities recently reported in these libraries were fixed. These vulnerabilities also had advisories released by ZDI which gave the corresponding CVE ids: ZDI-CAN-22093: CVE-2023-44441 GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability https://www.zerodayinitiative.com/advisories/ZDI-23-1592/ ZDI-CAN-22094: CVE-2023-44442 GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability https://www.zerodayinitiative.com/advisories/ZDI-23-1594/ ZDI-CAN-22096: CVE-2023-44443 GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability https://www.zerodayinitiative.com/advisories/ZDI-23-1593/ ZDI-CAN-22097: CVE-2023-44444 GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability https://www.zerodayinitiative.com/advisories/ZDI-23-1591/ -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.