| Name | CVE-2007-2949 |
| Description | Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-1335-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| gimp (PTS) | bullseye | 2.10.22-4+deb11u2 | fixed |
| bullseye (security) | 2.10.22-4+deb11u3 | fixed | |
| bookworm | 2.10.34-1+deb12u3 | fixed | |
| bookworm (security) | 2.10.34-1+deb12u4 | fixed | |
| trixie | 3.0.4-3 | fixed | |
| trixie (security) | 3.0.4-3+deb13u1 | fixed | |
| forky | 3.0.4-6.1 | fixed | |
| sid | 3.0.4-6.2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| gimp | source | sarge | 2.2.6-1sarge4 | DSA-1335-1 | ||
| gimp | source | etch | 2.2.13-1etch4 | DSA-1335-1 | ||
| gimp | source | (unstable) | 2.2.16-1 | medium | ||
| ingimp | source | (unstable) | 2.2.16.20070710-1 |
http://secunia.com/secunia_research/2007-63/advisory