From 925b0719f12abe78b5091f91cc58bf3b4b8675e0 Mon Sep 17 00:00:00 2001 From: Markus Brueffer Date: Mon, 23 Oct 2006 11:15:11 +0000 Subject: [PATCH] Document an integer overflow vulnerability in Qt and kdelibs, based on an entry by sat Approved by: portmgr (erwin) --- security/vuxml/vuln.xml | 39 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 108cf2b21b7e..28658662e2c7 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,45 @@ Note: Please add new entries to the beginning of this file. --> + + kdelibs -- integer overflow in khtml + + + kdelibs + kdelibs-nocups + 3.5.4_4 + + + qt + qt-copy + 3.3.6_3 + + + + +

Red Hat reports:

+
+

An integer overflow flaw was found in the way Qt handled pixmap + images. The KDE khtml library uses Qt in such a way that untrusted + parameters could be passed to Qt, triggering the overflow. + An attacker could for example create a malicious web page that when + viewed by a victim in the Konqueror browser would cause Konqueror + to crash or possibly execute arbitrary code with the privileges of + the victim.

+
+ +
+ + CVE-2006-4811 + http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742 + http://rhn.redhat.com/errata/RHSA-2006-0720.html + + + 2006-10-14 + 2006-10-22 + +
+ opera -- URL parsing heap overflow vulnerability