Mailinglist Archive: opensuse-updates (59 mails)

< Previous Next >
openSUSE-SU-2010:0665-1 (important): mono: libgdiplus image processing integer overflow vulnerabilities
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Thu, 23 Sep 2010 20:08:23 +0200 (CEST)
  • Message-id: <20100923180825.0FAF7BE38@xxxxxxxxxxxxxx>
openSUSE Security Update: mono: libgdiplus image processing integer overflow
vulnerabilities
______________________________________________________________________________

Announcement ID: openSUSE-SU-2010:0665-1
Rating: important
References: #630756
Cross-References: CVE-2010-1526
Affected Products:
openSUSE 11.3
openSUSE 11.2
openSUSE 11.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update fixes three integer overflows found by Secunia
Research member Stefan Cornelius that could possibly be
exploited to execute arbitrary code:
- "gdip_load_tiff_image()" by processing specially crafted
TIFF images
- "gdip_load_jpeg_image_internal()" by processing specially
crafted JPEG images
- "gdip_read_bmp_image()"by processing specially crafted
BMP image (CVE-2010-1526)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch libgdiplus0-2998

- openSUSE 11.2:

zypper in -t patch libgdiplus0-2998

- openSUSE 11.1:

zypper in -t patch libgdiplus0-2998

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.3 (i586 x86_64):

libgdiplus0-2.6.4-2.1.1

- openSUSE 11.2 (i586 x86_64):

libgdiplus0-2.4.2-2.4.1

- openSUSE 11.1 (i586 ppc x86_64):

libgdiplus0-2.0-11.33.1


References:

http://support.novell.com/security/cve/CVE-2010-1526.html
https://bugzilla.novell.com/630756


< Previous Next >
This Thread
  • No further messages