gimp (2.8.10-0ubuntu1.2) trusty-security; urgency=medium

  * SECURITY UPDATE: Heap-buffer over-read in load_image file-gbr.c
    - debian/patches/CVE-2017-17784.patch: fix in plug-ins/common/file-gbr.c.
    - CVE-2017-17784
  * SECURITY UPDATE: Heap-based buffer overflow in fli_read_brun function
    - debian/patches/CVE-2017-17785.patch: fix in plug-ins/file-fli/fli.c.
    - CVE-2017-17785
  * SECURITY UPDATE: Out of bounds read
    - debian/patches/CVE-2017-17786.patch: fix in plug-ins/common/file-tga.c.
    - CVE-2017-17786
  * SECURITY UPDATE: Heap-based buffer over-read in read_creator_block
    - debian/patches/CVE-2017-17787.patch: fix in plug-ins/common/file-psp.c.
    - CVE-2017-17787
  * SECURITY UPDATE: Stack-based buffer over-read in xcf_load_stream
    - debian/patches/CVE-2017-17788.patch: fix in app/xcf/xcf.c.
    - CVE-2017-17788
  * SECURITY UPDATE: Heap-based buffer overflow in read_channel_data
    - debian/patches/CVE-2017-17789.patch: fix in plug-ins/common/file-psp.c.
    - CVE-2017-17789

Date: 2018-01-18 17:48:13.233910+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/gimp/2.8.10-0ubuntu1.2
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to