ALT-PU-2018-1717-1
Closed vulnerabilities
Modified: 2021-03-23
BDU:2018-01589
Уязвимость функции load_image графического редактора GIMP, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить целостность и конфиденциальность данных
Modified: 2021-03-23
BDU:2018-01590
Уязвимость функции fli_read_brun графического редактора GIMP, связанная с выходом за границы буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-03-23
BDU:2018-01591
Уязвимость функции ReadImage графического редактора GIMP, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить целостность и конфиденциальность данных
Modified: 2021-04-01
BDU:2018-01592
Уязвимость функции read_creator_block графического редактора GIMP, связанная с чтением за границами буфера динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить целостность и конфиденциальность данных
Modified: 2021-03-23
BDU:2018-01593
Уязвимость функции xcf_load_stream графического редактора GIMP, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить целостность и конфиденциальность данных
Modified: 2021-03-23
BDU:2018-01594
Уязвимость функции read_channel_data (plug-ins/common/file-psp.c) графического редактора GIMP, связанная с выходом за границы буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-11
CVE-2012-3236
fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
- http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html
- http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html
- http://www.exploit-db.com/exploits/19482
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:082
- http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html
- http://www.securityfocus.com/bid/54246
- http://www.ubuntu.com/usn/USN-1559-1
- https://bugzilla.gnome.org/show_bug.cgi?id=676804
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76658
- http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html
- http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html
- http://www.exploit-db.com/exploits/19482
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:082
- http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html
- http://www.securityfocus.com/bid/54246
- http://www.ubuntu.com/usn/USN-1559-1
- https://bugzilla.gnome.org/show_bug.cgi?id=676804
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76658
Modified: 2025-04-20
CVE-2017-17784
In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data.
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- http://www.securityfocus.com/bid/102899
- https://bugzilla.gnome.org/show_bug.cgi?id=790784
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- http://www.securityfocus.com/bid/102899
- https://bugzilla.gnome.org/show_bug.cgi?id=790784
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
Modified: 2025-04-20
CVE-2017-17785
In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c.
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://bugzilla.gnome.org/show_bug.cgi?id=739133
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://bugzilla.gnome.org/show_bug.cgi?id=739133
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
Modified: 2025-04-20
CVE-2017-17786
In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image.
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- http://www.securityfocus.com/bid/102765
- https://bugzilla.gnome.org/show_bug.cgi?id=739134
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- http://www.securityfocus.com/bid/102765
- https://bugzilla.gnome.org/show_bug.cgi?id=739134
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
Modified: 2025-04-20
CVE-2017-17787
In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://bugzilla.gnome.org/show_bug.cgi?id=790853
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://bugzilla.gnome.org/show_bug.cgi?id=790853
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
Modified: 2025-04-20
CVE-2017-17788
In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string.
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://bugzilla.gnome.org/show_bug.cgi?id=790783
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://bugzilla.gnome.org/show_bug.cgi?id=790783
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
Modified: 2025-04-20
CVE-2017-17789
In GIMP 2.8.22, there is a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c.
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- http://www.securityfocus.com/bid/102898
- https://bugzilla.gnome.org/show_bug.cgi?id=790849
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- http://www.securityfocus.com/bid/102898
- https://bugzilla.gnome.org/show_bug.cgi?id=790849
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
- https://usn.ubuntu.com/3539-1/
- https://www.debian.org/security/2017/dsa-4077