Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 10 Oct 2012 23:12:25 +0100
From: Tim Brown <timb@...-dimension.org.uk>
To: oss-security@...ts.openwall.com
Cc: security@....org
Subject: Pre-advisory for Konqueror 4.7.3 (other versions may be affected)

Taken from NDSA20121010:

--8<--------
This advisory comes in 4 related parts:

1) The Konqueror web browser is vulnerable to type confusion
leading to memory disclosure.  The root cause of this is the
same as CVE-2010-0046 reported by Chris Rohlf which affected
WebKit.

2) The Konqueror web browser is vulnerable to an out of bounds
memory access when accessing the canvas.  In this case the
vulnerability was identified whilst playing with bug #43813 from
Google's Chrome repository.

3) The Konqueror web browser is vulnerable to a NULL pointer
dereference leading to a crash.

4) The Konqueror web browser is vulnerable to a "use-after-free"
class flaw when the context menu is used whilst the document
DOM that is being changed from within Javascript.

These flaws were identified during an analysis of previously
reported vulnerabilities that affected Google's Chrome web
browser.  It is believed that only vulnerability 1 is/was common
to the two code bases.

--8<--------

I'm pre-advising on these flaws since I've not heard anything from the KDE 
project in about 8 months regarding 3 and 4 and we are aware that 1 and 2 have 
been fixed.  I'll give it 7 days and then drop technical details.  Vendors with 
an interest can contact me off list.

Tim
-- 
Tim Brown
<mailto:timb@...-dimension.org.uk>
<http://www.nth-dimension.org.uk/>

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ