An use-after-free flaw was found in the way DOM implementation of KDE libraries performed widget rendering for context menus for a given iframe when the iframe was simultaneously being updated by the parent via JavaScript. A remote attacker could provide a specially-crafted web page that, when opened in an application linked against KDE libraries (such as konqueror), would lead to that application crash or, potentially, arbitrary code execution (depending on the state of the process at the moment the no-longer existing process was accessed) with the privileges of the user running the application. References: [1] http://www.openwall.com/lists/oss-security/2012/10/10/11 [2] http://www.openwall.com/lists/oss-security/2012/10/11/11
This issue did NOT affect the version of the kdelibs package, as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the versions of the kdelibs package, as shipped with Fedora release of 16 and 17.
Statement: Not vulnerable. This issue did not affect the versions of kdelibs as shipped with Red Hat Enterprise Linux 5 and 6.
Relevant upstream patch: [3] http://quickgit.kde.org/index.php?p=kdelibs.git&a=commitdiff&h=4f2eb356f1c23444fff2cfe0a7ae10efe303d6d8
This is now public: http://seclists.org/oss-sec/2012/q4/171
Created kdelibs tracking bugs for this issue Affects: fedora-all [bug 871541]
kdelibs-4.8.5-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
kdelibs-4.9.2-11.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.