<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">gimp-2.8.18-1.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10294</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">gimp-2.8.18-1.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the gimp-2.8.18-1.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10294</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10294</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4540/</URL>
      <Description>SUSE CVE CVE-2010-4540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4541/</URL>
      <Description>SUSE CVE CVE-2010-4541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4542/</URL>
      <Description>SUSE CVE CVE-2010-4542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4543/</URL>
      <Description>SUSE CVE CVE-2010-4543 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2896/</URL>
      <Description>SUSE CVE CVE-2011-2896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3236/</URL>
      <Description>SUSE CVE CVE-2012-3236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5576/</URL>
      <Description>SUSE CVE CVE-2012-5576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4994/</URL>
      <Description>SUSE CVE CVE-2016-4994 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gimp-2.8.18-1.4">
      <FullProductName ProductID="gimp-2.8.18-1.4">gimp-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-devel-2.8.18-1.4">
      <FullProductName ProductID="gimp-devel-2.8.18-1.4">gimp-devel-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-help-browser-2.8.18-1.4">
      <FullProductName ProductID="gimp-help-browser-2.8.18-1.4">gimp-help-browser-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-lang-2.8.18-1.4">
      <FullProductName ProductID="gimp-lang-2.8.18-1.4">gimp-lang-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-plugin-aa-2.8.18-1.4">
      <FullProductName ProductID="gimp-plugin-aa-2.8.18-1.4">gimp-plugin-aa-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gimp-plugins-python-2.8.18-1.4">
      <FullProductName ProductID="gimp-plugins-python-2.8.18-1.4">gimp-plugins-python-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgimp-2_0-0-2.8.18-1.4">
      <FullProductName ProductID="libgimp-2_0-0-2.8.18-1.4">libgimp-2_0-0-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgimp-2_0-0-32bit-2.8.18-1.4">
      <FullProductName ProductID="libgimp-2_0-0-32bit-2.8.18-1.4">libgimp-2_0-0-32bit-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgimpui-2_0-0-2.8.18-1.4">
      <FullProductName ProductID="libgimpui-2_0-0-2.8.18-1.4">libgimpui-2_0-0-2.8.18-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgimpui-2_0-0-32bit-2.8.18-1.4">
      <FullProductName ProductID="libgimpui-2_0-0-32bit-2.8.18-1.4">libgimpui-2_0-0-32bit-2.8.18-1.4</FullProductName>
    </Branch>
    <Relationship ProductReference="gimp-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gimp-2.8.18-1.4">gimp-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-devel-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gimp-devel-2.8.18-1.4">gimp-devel-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-help-browser-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4">gimp-help-browser-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-lang-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gimp-lang-2.8.18-1.4">gimp-lang-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-plugin-aa-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4">gimp-plugin-aa-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="gimp-plugins-python-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4">gimp-plugins-python-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgimp-2_0-0-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4">libgimp-2_0-0-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgimp-2_0-0-32bit-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4">libgimp-2_0-0-32bit-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgimpui-2_0-0-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4">libgimpui-2_0-0-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgimpui-2_0-0-32bit-2.8.18-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4">libgimpui-2_0-0-32bit-2.8.18-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS &gt; LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2010-4540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4540.html</URL>
        <Description>CVE-2010-4540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662043</URL>
        <Description>SUSE Bug 662043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.</Note>
    </Notes>
    <CVE>CVE-2010-4541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4541.html</URL>
        <Description>CVE-2010-4541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662043</URL>
        <Description>SUSE Bug 662043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2010-4542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4542.html</URL>
        <Description>CVE-2010-4542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662043</URL>
        <Description>SUSE Bug 662043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2010-4543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4543.html</URL>
        <Description>CVE-2010-4543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662043</URL>
        <Description>SUSE Bug 662043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/692877</URL>
        <Description>SUSE Bug 692877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.</Note>
    </Notes>
    <CVE>CVE-2011-2896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2896.html</URL>
        <Description>CVE-2011-2896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/601830</URL>
        <Description>SUSE Bug 601830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/671735</URL>
        <Description>SUSE Bug 671735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/680210</URL>
        <Description>SUSE Bug 680210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/680212</URL>
        <Description>SUSE Bug 680212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/700987</URL>
        <Description>SUSE Bug 700987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/711490</URL>
        <Description>SUSE Bug 711490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/711491</URL>
        <Description>SUSE Bug 711491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/715643</URL>
        <Description>SUSE Bug 715643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.</Note>
    </Notes>
    <CVE>CVE-2012-3236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3236.html</URL>
        <Description>CVE-2012-3236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763595</URL>
        <Description>SUSE Bug 763595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/768376</URL>
        <Description>SUSE Bug 768376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/769565</URL>
        <Description>SUSE Bug 769565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.</Note>
    </Notes>
    <CVE>CVE-2012-5576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5576.html</URL>
        <Description>CVE-2012-5576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/791372</URL>
        <Description>SUSE Bug 791372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file.</Note>
    </Notes>
    <CVE>CVE-2016-4994</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gimp-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-devel-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-help-browser-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-lang-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugin-aa-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:gimp-plugins-python-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimp-2_0-0-32bit-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-2.8.18-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:libgimpui-2_0-0-32bit-2.8.18-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4994.html</URL>
        <Description>CVE-2016-4994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986021</URL>
        <Description>SUSE Bug 986021</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
