Mandriva issued this advisory on May 29: http://lists.mandriva.com/security-announce/2011-05/msg00029.php
Hi, thanks for reporting this bug. Assigned to the package maintainer. (Please set the status to 'assigned' if you are working on it)
Keywords: (none) => TriagedAssignee: bugsquad => shlomif
http://svnweb.mageia.org/packages?view=revision&revision=189705 Already in SVN http://svnweb.mageia.org/packages/updates/1/gimp/current/SOURCES/gimp-2.6.11-psp-overflow.patch?view=markup&pathrev=189705 and submitted to BS.
CC: (none) => n54
CC: (none) => dmorganecAssignee: shlomif => qa-bugs
Works for me on i586.
Tested complete the update srpm gimp-2.6.11-7.1.mga1.src.rpm on Mageia release 1 (Official) for x86_64 ,works for me too. Nothing to report.
CC: (none) => geiger.david68210
Validating Advisory: ======================== Updated gimp packages fix security vulnerabilities: Stack-based buffer overflow in the "LIGHTING EFFECTS > LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself (CVE-2010-4540). Stack-based buffer overflow in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Number of lights field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself (CVE-2010-4541). Stack-based buffer overflow in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself (CVE-2010-4542). Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image (CVE-2010-4543, CVE-2011-1782). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1782 http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2011:103 ======================== Updated packages in core/updates_testing: ======================== gimp-2.6.11-7.1.mga1 gimp-python-2.6.11-7.1.mga1 libgimp2.0-devel-2.6.11-7.1.mga1 libgimp2.0_0-2.6.11-7.1.mga1 from gimp-2.6.11-7.1.mga1.src.rpm ======================== Could sysadmin please push from core/updates_testing to core/updates Thank you!
Keywords: Triaged => validated_updateCC: (none) => sysadmin-bugsHardware: i586 => All
update pushed.
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED