A heap-based buffer overflow flaw was found in the way CSS parser DOM implementation of KDE libraries performed parsing of a location of the source for a particular font face. A remote attacker could provide a specially-crafted web page that, when opened in an application linked against KDE libraries (such as konqueror), would lead to that application crash or, potentially, arbitrary code execution with the privileges of the user running the application. Upstream patch: [1] http://quickgit.kde.org/index.php?p=kdelibs.git&a=commitdiff&h=a872c8a969a8bd3706253d6ba24088e4f07f3352 References: [2] http://www.openwall.com/lists/oss-security/2012/10/10/11 [3] http://www.openwall.com/lists/oss-security/2012/10/11/11
This issue did NOT affect the version of the kdelibs package, as shipped with Red Hat Enterprise Linux 5 as it did not provide a functionality for parsing location of the font face source yet. -- This issue affects the version of the kdelibs package, as shipped with Red Hat Enterprise Linux 6. -- This issue did NOT affect the versions of the kdelibs package, as shipped with Fedora release of 16 and 17 (as they are already updated with aforementioned upstream patch).
Created attachment 627302 [details] Patch that should fix this bug
This is now public: http://seclists.org/oss-sec/2012/q4/171
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1416 https://rhn.redhat.com/errata/RHSA-2012-1416.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1418 https://rhn.redhat.com/errata/RHSA-2012-1418.html