<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>24399</bug_id>
          
          <creation_ts>2010-10-23 21:02:06 +0400</creation_ts>
          <short_desc>CVE-2010-1526: Mono libgdiplus Image Processing Integer Overflow Vulnerabilities</short_desc>
          <delta_ts>2011-03-14 14:17:35 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>libgdiplus</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://secunia.com/advisories/40792</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Anton Farygin">rider</assigned_to>
          <cc>protvin</cc>
    
    <cc>rider</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>114186</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-10-23 21:02:06 +0400</bug_when>
    <thetext>1) An integer overflow error within the &quot;gdip_load_tiff_image()&quot; function in src/tiffcodec.c can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted TIFF images in an application using the library.

2) An integer overflow error within the &quot;gdip_load_jpeg_image_internal()&quot; function in src/jpegcodec.c can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted JPEG images in an application using the library.

3) An integer overflow error within the &quot;gdip_read_bmp_image()&quot; function in src/bmpcodec.c can be exploited to cause a heap-based buffer overflow by e.g. processing specially crafted BMP images in an application using the library.

The vulnerabilities are confirmed in version 2.6.7. Other versions may also be affected.

Fixed in git: http://github.com/mono/libgdiplus/commit/6779fbf994d5270720ccb1687ba8b004e20a1821</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>119223</commentid>
    <comment_count>1</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2011-03-14 14:17:35 +0300</bug_when>
    <thetext>libgdiplus-2.6.7-alt2 -&gt; sisyphus:

* Mon Mar 14 2011 Alexey Shabalin &lt;shaba@altlinux&gt; 2.6.7-alt2
- snapshot of 2.6 branch (20101015)
- fixed CVE-2010-1526 (ALT #24399)</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>