Xenial/16.04: GIMP needs a security update - unfixed issues (CVE-2017: 17784-17789).

Bug #1773561 reported by daniel CURTIS on 2018-05-26
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
gimp (Ubuntu)
Undecided
Unassigned
Xenial
Undecided
Unassigned
Artful
Undecided
Unassigned

Bug Description

Hello.

GIMP package ('Universe/Security' section), available in "Xenial"/16.04 LTS Release, contains unfixed security issues and is vulnerable to, for example, heap-buffer over-read, out of bounds read and stack-based buffer over-read etc. The whole thing is pretty strange, because Ubuntu Releases released before and after "Xenial", contains updated GIMP package!

Anyway, it looks this way: in "Trusty" the available version is: '2.8.10-0ubuntu1.2' (please see [1]). "Bionic" has '2.8.20-1.1' version (please see [2]). Both Releases contains fixes for mentioned security issues: CVE-2017-* etc. However, GIMP version in "Xenial" is '2.8.16-1ubuntu1.1' and does not contain any security updates from 2017. (The last one is from Thu, 30 Jun 2016.; please see [3]).

Security updates with fixes for mentioned CVE's (please compare changes in 1. and 2. with 3.) were released on Thu., 18 Jan 2018 - for "Trusty" and Tue., 26 Dec 2017 - for "Bionic". In "Xenial", the last security update is from Thu., 30 Jun 2016 (fix for CVE-2016-4994) and there is no further updates!

Here is a CVE list of security issues not fixed in "Xenial", but in "Trusty" and "Bionic" etc.:

1/ CVE-2017-17784: Heap-buffer over-read in load_image file-gbr.c
2/ CVE-2017-17785: Heap-based buffer overflow in fli_read_brun function
3/ CVE-2017-17786: Out of bounds read
4/ CVE-2017-17787: Heap-based buffer over-read in read_creator_block
5/ CVE-2017-17788: Stack-based buffer over-read in xcf_load_stream
6/ CVE-2017-17789: Heap-based buffer overflow in read_channel_data

And the most important thing: if User had installed GIMP package in "Xenial" Release, he is affected - since one year, at least - because of a vulnerable version. Security issues, mentioned above, are from 2017. So, maybe it's a good opportunity to update GIMP to v2.10.2 version, released on 20., May 2018? (Version 2.8.X is very outdated).

I wanted to send an email to Mr Marc Deslauriers, because he made the last security update for GIMP in "Xenial" (fix for CVE-2016-4994). But I decided to report a bug on Launchpad. I hope that it's an acceptable way. If not, I'm sorry.

By the way: similar problems with unfixed security issues, can be found e.g. in Audacious and Parole packages. But that's a different story, completely different story...

Thanks, best regards.
______________________
1. http://changelogs.ubuntu.com/changelogs/pool/main/g/gimp/gimp_2.8.10-0ubuntu1.2/changelog
2. http://changelogs.ubuntu.com/changelogs/pool/universe/g/gimp/gimp_2.8.20-2/changelog
3. http://changelogs.ubuntu.com/changelogs/pool/universe/g/gimp/gimp_2.8.16-1ubuntu1.1/changelog

daniel CURTIS (anoda) wrote :

I don't know why 'fglrx-installer' was chosen as an affected package. During creating a report I've chosen 'gimp' package.

Changed in fglrx-installer (Ubuntu):
status: New → Confirmed
affects: fglrx-installer (Ubuntu) → gimp (Ubuntu)
daniel CURTIS (anoda) on 2018-05-26
description: updated
daniel CURTIS (anoda) on 2018-05-29
description: updated
summary: - Xenial/16.04: GIMP needs a security update - unfixed issues
- (CVE-2017-*).
+ Xenial/16.04: GIMP needs a security update - unfixed issues (CVE-2017:
+ 17784-17789).
daniel CURTIS (anoda) on 2018-06-10
information type: Public → Public Security
daniel CURTIS (anoda) on 2018-09-08
Changed in gimp (Ubuntu):
status: Confirmed → Incomplete
Changed in gimp (Ubuntu Xenial):
status: New → Confirmed
daniel CURTIS (anoda) on 2019-02-14
Changed in gimp (Ubuntu Xenial):
status: Confirmed → New
information type: Public Security → Private Security
information type: Private Security → Public Security
To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers