SuSE: Weekly Summary 2010:018
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2010:018
Date: Wed, 06 Oct 2010 15:00:00 +0000
Cross-References: CVE-2010-0405, CVE-2010-1526, CVE-2010-1781
CVE-2010-1782, CVE-2010-1784, CVE-2010-1785
CVE-2010-1786, CVE-2010-1787, CVE-2010-1788
CVE-2010-1790, CVE-2010-1792, CVE-2010-1793
CVE-2010-1860, CVE-2010-1862, CVE-2010-1864
CVE-2010-1914, CVE-2010-1915, CVE-2010-1917
CVE-2010-2093, CVE-2010-2094, CVE-2010-2097
CVE-2010-2100, CVE-2010-2101, CVE-2010-2190
CVE-2010-2191, CVE-2010-2225, CVE-2010-2484
CVE-2010-2531, CVE-2010-2575, CVE-2010-2648
CVE-2010-3062, CVE-2010-3063, CVE-2010-3064
CVE-2010-3065, CVE-2010-3069
Content of this advisory:
1) Solved Security Vulnerabilities:
- samba
- libgdiplus0
- libwebkit
- bzip2
- php5
- okular
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- samba
A buffer overflow in the sid_parse() function of samba could
potentially be exploited by remote attackers to execute arbitrary
code (CVE-2010-3069).
Affected Products: SLES9, SLE10-SP3, SLE11, SLE11-SP1, openSUSE 11.1, 11.2, 11.3
- libgdiplus0
Specially crafted tiff, jpeg and bmp images could cause integer overflows in
ligdiplus0 (CVE-2010-1526).
- libwebkit
The browser engine libwebkit was updated to version 1.2.4 to fix
several security bugs.
(CVE-2010-1781, CVE-2010-1782, CVE-2010-1784, CVE-2010-1785
CVE-2010-1786, CVE-2010-1787, CVE-2010-1788, CVE-2010-1790
CVE-2010-1792, CVE-2010-1793, CVE-2010-2648)
Affected Products: openSUSE 11.3
- bzip2
Specially crafted bz2 archives could cause a denial of service or
potentially even cause execution of arbitrary code in applications
that try to unpack such archives (CVE-2010-0405).
Affected Products: SLES9, SLE10-SP3, SLE11, SLE11-SP1, openSUSE 11.1, 11.2, 11.3
- php5
PHP was updated to version 5.2.14 to fix several security issues
(CVE-2010-1860, CVE-2010-1862, CVE-2010-1864, CVE-2010-1914,
CVE-2010-1915, CVE-2010-1917, CVE-2010-2093, CVE-2010-2094,
CVE-2010-2097, CVE-2010-2100, CVE-2010-2101, CVE-2010-2190,
CVE-2010-2191, CVE-2010-2225, CVE-2010-2484, CVE-2010-2531,
CVE-2010-3062, CVE-2010-3063, CVE-2010-3064, CVE-2010-3065).
Affected Products: openSUSE 11.1
- okular
Specially crafted PDF files could cause a heap overflow in okular
(CVE-2010-2575).
Affected Products: SLE11, SLE11-SP1, openSUSE 11.1, 11.2, 11.3
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References