Bugzilla – Bug 1217160
VUL-0: CVE-2023-44441: gimp: GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Last modified: 2024-06-11 14:43:42 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DDS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. References: https://www.zerodayinitiative.com/advisories/ZDI-23-1592/ http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44441
Tracking as affected: - SUSE:SLE-15-SP4:Update/gimp Upstream fixes: https://gitlab.gnome.org/GNOME/gimp/-/commit/6ad54ca3a30fb1a155f902ddd1b44c389cb0f382 https://gitlab.gnome.org/GNOME/gimp/-/commit/8faad92ee9f265a273bfc67d03d51d3159fb8396 https://gitlab.gnome.org/GNOME/gimp/-/commit/83d13c600454b8afd271e0201baf902bdb4c148b https://gitlab.gnome.org/GNOME/gimp/-/commit/8cd97b90ddb03123a127ae3ec09580d7f3a61560 May also need other commits, please double check.
Rahul, can you help on this set of CVE please? Thanks.
SUSE-SU-2023:4692-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1217160, 1217161, 1217162, 1217163 CVE References: CVE-2023-44441, CVE-2023-44442, CVE-2023-44443, CVE-2023-44444 Sources used: openSUSE Leap 15.4 (src): gimp-2.10.30-150400.3.11.1 openSUSE Leap 15.5 (src): gimp-2.10.30-150400.3.11.1 SUSE Package Hub 15 15-SP4 (src): gimp-2.10.30-150400.3.11.1 SUSE Package Hub 15 15-SP5 (src): gimp-2.10.30-150400.3.11.1 SUSE Linux Enterprise Workstation Extension 15 SP4 (src): gimp-2.10.30-150400.3.11.1 SUSE Linux Enterprise Workstation Extension 15 SP5 (src): gimp-2.10.30-150400.3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.