Package: gimp
Severity: grave
Version: 2.6.7-1
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gimp.

CVE-2009-3909[0]:
| Secunia Research has discovered a vulnerability in Gimp, which can be
| exploited by malicious people to potentially compromise a user's
| system.
|
| The vulnerability is caused by an integer overflow error within the
| "read_channel_data()" function in plug-ins/file-psd/psd-load.c. This
| can be exploited to cause a heap-based buffer overflow by e.g.
| tricking a user into opening a specially crafted PSD file.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
Don't forget to also help prepare stable and oldstable uploads to address this 
issue.

Patches:
http://git.gnome.org/cgit/gimp/commit/?id=9cc8d78ff33b7a36852b74e64b427489cad44d0e
http://git.gnome.org/cgit/gimp/commit/?id=0e440cb6d4d6ee029667363d244aff61b154c33c

For further information see:

[0] http://secunia.com/secunia_research/2009-43/
    http://security-tracker.debian.org/tracker/CVE-2009-3909

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to