Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 917406 (CVE-2023-44441, CVE-2023-44442, CVE-2023-44443, CVE-2023-44444, ZDI-23-1591, ZDI-CAN-22093, ZDI-CAN-22094, ZDI-CAN-22096, ZDI-CAN-22097) - <media-gfx/gimp-2.10.36: multiple vulnerabilities
Summary: <media-gfx/gimp-2.10.36: multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2023-44441, CVE-2023-44442, CVE-2023-44443, CVE-2023-44444, ZDI-23-1591, ZDI-CAN-22093, ZDI-CAN-22094, ZDI-CAN-22096, ZDI-CAN-22097
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://www.gimp.org/news/2023/11/07/...
Whiteboard: A2 [stable]
Keywords:
Depends on: 917468
Blocks:
  Show dependency tree
 
Reported: 2023-11-16 07:00 UTC by Jarkko Suominen
Modified: 2023-11-24 18:15 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jarkko Suominen 2023-11-16 07:00:40 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

https ://www.zerodayinitiative.com/advisories/ZDI-23-1591/

Release 2.10.36 contains a fix:
https ://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
Comment 1 Jarkko Suominen 2023-11-16 07:18:35 UTC
<media-gfx/gimp-2.10.36 multiple vulnerabilities:

https ://www.zerodayinitiative.com/advisories/ZDI-CAN-22093/
GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DDS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

https ://www.zerodayinitiative.com/advisories/ZDI-CAN-22094/
GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process.

https ://www.zerodayinitiative.com/advisories/ZDI-CAN-22096/
GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process.

https ://www.zerodayinitiative.com/advisories/ZDI-CAN-22097/
GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.


All of these vulnerabilities have been fixed in 2.10.36:
https ://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-17 03:07:02 UTC
Sergey, shall we fast-stable?
Comment 3 Sergey Torokhov 2023-11-17 05:59:04 UTC
(In reply to John Helmert III from comment #2)
> Sergey, shall we fast-stable?

Yes, I have no objection. I created stabilization request.
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-24 18:15:11 UTC
According to https://www.openwall.com/lists/oss-security/2023/11/20/3, the ZDI-CVE association is:

ZDI-CAN-22093: CVE-2023-44441
 GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
 https://www.zerodayinitiative.com/advisories/ZDI-23-1592/

ZDI-CAN-22094: CVE-2023-44442
 GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
 https://www.zerodayinitiative.com/advisories/ZDI-23-1594/

ZDI-CAN-22096: CVE-2023-44443
 GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability
 https://www.zerodayinitiative.com/advisories/ZDI-23-1593/

ZDI-CAN-22097: CVE-2023-44444
 GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability
 https://www.zerodayinitiative.com/advisories/ZDI-23-1591/