Bugzilla – Bug 1217162
VUL-0: CVE-2023-44443: gimp: GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability
Last modified: 2024-05-30 18:42:08 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. References: https://www.zerodayinitiative.com/advisories/ZDI-23-1593/ http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44443
Tracking as affected: - SUSE:SLE-15-SP4:Update/gimp Upstream fix: https://gitlab.gnome.org/GNOME/gimp/-/commit/96f536a33590bb9811da5b5639e1d6c25aaf2e01
SUSE-SU-2023:4692-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1217160, 1217161, 1217162, 1217163 CVE References: CVE-2023-44441, CVE-2023-44442, CVE-2023-44443, CVE-2023-44444 Sources used: openSUSE Leap 15.4 (src): gimp-2.10.30-150400.3.11.1 openSUSE Leap 15.5 (src): gimp-2.10.30-150400.3.11.1 SUSE Package Hub 15 15-SP4 (src): gimp-2.10.30-150400.3.11.1 SUSE Package Hub 15 15-SP5 (src): gimp-2.10.30-150400.3.11.1 SUSE Linux Enterprise Workstation Extension 15 SP4 (src): gimp-2.10.30-150400.3.11.1 SUSE Linux Enterprise Workstation Extension 15 SP5 (src): gimp-2.10.30-150400.3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.