Mailinglist Archive: opensuse-updates (59 mails)
< Previous | Next > |
openSUSE-SU-2010:0665-1 (important): mono: libgdiplus image processing integer overflow vulnerabilities
- From: opensuse-security@xxxxxxxxxxxx
- Date: Thu, 23 Sep 2010 20:08:23 +0200 (CEST)
- Message-id: <20100923180825.0FAF7BE38@xxxxxxxxxxxxxx>
openSUSE Security Update: mono: libgdiplus image processing integer overflow
vulnerabilities
______________________________________________________________________________
Announcement ID: openSUSE-SU-2010:0665-1
Rating: important
References: #630756
Cross-References: CVE-2010-1526
Affected Products:
openSUSE 11.3
openSUSE 11.2
openSUSE 11.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update fixes three integer overflows found by Secunia
Research member Stefan Cornelius that could possibly be
exploited to execute arbitrary code:
- "gdip_load_tiff_image()" by processing specially crafted
TIFF images
- "gdip_load_jpeg_image_internal()" by processing specially
crafted JPEG images
- "gdip_read_bmp_image()"by processing specially crafted
BMP image (CVE-2010-1526)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch libgdiplus0-2998
- openSUSE 11.2:
zypper in -t patch libgdiplus0-2998
- openSUSE 11.1:
zypper in -t patch libgdiplus0-2998
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64):
libgdiplus0-2.6.4-2.1.1
- openSUSE 11.2 (i586 x86_64):
libgdiplus0-2.4.2-2.4.1
- openSUSE 11.1 (i586 ppc x86_64):
libgdiplus0-2.0-11.33.1
References:
http://support.novell.com/security/cve/CVE-2010-1526.html
https://bugzilla.novell.com/630756
vulnerabilities
______________________________________________________________________________
Announcement ID: openSUSE-SU-2010:0665-1
Rating: important
References: #630756
Cross-References: CVE-2010-1526
Affected Products:
openSUSE 11.3
openSUSE 11.2
openSUSE 11.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update fixes three integer overflows found by Secunia
Research member Stefan Cornelius that could possibly be
exploited to execute arbitrary code:
- "gdip_load_tiff_image()" by processing specially crafted
TIFF images
- "gdip_load_jpeg_image_internal()" by processing specially
crafted JPEG images
- "gdip_read_bmp_image()"by processing specially crafted
BMP image (CVE-2010-1526)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch libgdiplus0-2998
- openSUSE 11.2:
zypper in -t patch libgdiplus0-2998
- openSUSE 11.1:
zypper in -t patch libgdiplus0-2998
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.3 (i586 x86_64):
libgdiplus0-2.6.4-2.1.1
- openSUSE 11.2 (i586 x86_64):
libgdiplus0-2.4.2-2.4.1
- openSUSE 11.1 (i586 ppc x86_64):
libgdiplus0-2.0-11.33.1
References:
http://support.novell.com/security/cve/CVE-2010-1526.html
https://bugzilla.novell.com/630756
< Previous | Next > |