CVE-2009-3909

Publication date 18 November 2009

Last updated 24 July 2024


Ubuntu priority

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

Status

Package Ubuntu Release Status
gimp 9.10 karmic
Fixed 2.6.7-1ubuntu1.1
9.04 jaunty
Fixed 2.6.6-0ubuntu1.1
8.10 intrepid
Fixed 2.6.1-1ubuntu3.1
8.04 LTS hardy
Not affected
6.06 LTS dapper Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gimp

References

Related Ubuntu Security Notices (USN)

    • USN-880-1
    • GIMP vulnerabilities
    • 7 January 2010

Other references