openSUSE Security Update: mono: libgdiplus image processing integer overflow vulnerabilities ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0665-1 Rating: important References: #630756 Cross-References: CVE-2010-1526 Affected Products: openSUSE 11.3 openSUSE 11.2 openSUSE 11.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes three integer overflows found by Secunia Research member Stefan Cornelius that could possibly be exploited to execute arbitrary code: - "gdip_load_tiff_image()" by processing specially crafted TIFF images - "gdip_load_jpeg_image_internal()" by processing specially crafted JPEG images - "gdip_read_bmp_image()"by processing specially crafted BMP image (CVE-2010-1526) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch libgdiplus0-2998 - openSUSE 11.2: zypper in -t patch libgdiplus0-2998 - openSUSE 11.1: zypper in -t patch libgdiplus0-2998 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 x86_64): libgdiplus0-2.6.4-2.1.1 - openSUSE 11.2 (i586 x86_64): libgdiplus0-2.4.2-2.4.1 - openSUSE 11.1 (i586 ppc x86_64): libgdiplus0-2.0-11.33.1 References: http://support.novell.com/security/cve/CVE-2010-1526.html https://bugzilla.novell.com/630756