|
Message-ID: <5076FD82.3060000@redhat.com> Date: Thu, 11 Oct 2012 11:10:26 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Tim Brown <timb@...-dimension.org.uk>, security@....org Subject: Re: Pre-advisory for Konqueror 4.7.3 (other versions may be affected) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/10/2012 07:52 PM, Kurt Seifried wrote: > On 10/10/2012 04:12 PM, Tim Brown wrote: >> Taken from NDSA20121010: --8<-------- This advisory comes in 4 >> related parts: > >> 1) The Konqueror web browser is vulnerable to type confusion >> leading to memory disclosure. The root cause of this is the >> same as CVE-2010-0046 reported by Chris Rohlf which affected >> WebKit. Please use CVE-2012-4512 for this issue. >> 2) The Konqueror web browser is vulnerable to an out of bounds >> memory access when accessing the canvas. In this case the >> vulnerability was identified whilst playing with bug #43813 from >> Google's Chrome repository. Please use CVE-2012-4513 for this issue. >> 3) The Konqueror web browser is vulnerable to a NULL pointer >> dereference leading to a crash. > >> 4) The Konqueror web browser is vulnerable to a "use-after-free" >> class flaw when the context menu is used whilst the document >> DOM that is being changed from within Javascript. Please use CVE-2012-4514 for this issue. >> These flaws were identified during an analysis of previously >> reported vulnerabilities that affected Google's Chrome web >> browser. It is believed that only vulnerability 1 is/was common >> to the two code bases. Please use CVE-2012-4515 for this issue. >> --8<-------- > >> I'm pre-advising on these flaws since I've not heard anything >> from the KDE project in about 8 months regarding 3 and 4 and we >> are aware that 1 and 2 have been fixed. I'll give it 7 days and >> then drop technical details. Vendors with an interest can >> contact me off list. > >> Tim - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBAgAGBQJQdv2CAAoJEBYNRVNeJnmTZY4P/i8FhSTjseaK+VYdt4Z3Uow+ fp6N58S5P16shvY0VOJ9NSYRjAhy212lG6iSzyXHPs+ya+88SwRif6bomjdX63Xy IUauSghyhfFh6+Y5tx9mdgSZO5znBIAK93UVEmYam591QFa5FK/8PpWKZ38A4baX HCnA6/XOr+ilyUbaj0E3d70HiNbSdARBNsvYrWLJ93/d2+uCCW15PIbuyG1b1nHD beMdrse++dfUw/sQiVGgUK7aUeH006YnIObd7j7bkkdU5muLLk8ixvnlI73mDVU2 +18giz58AkUq22wXpP8pwa+KVEpZAbNugFNR/p0xZT1Jk4N3lizBU6e0+K4CkuXV 1memByFQH2cLzyNRcdJOcI8QcZXvoXJG4Yy8rJMxq0M64/PnZf3eyTPycT/nvfa9 jQsUILti6wxh/d0SWFo5O/gDrrrHTeRLGPv0/VVCwtASN8e6y6h453P1UNf2WEbl WMhOFGoFmKXzeo1a6D2k1rzLzY4PijHf5EStqozb+szrkBk/J0USujSFME9xbjrU goEvD128HmeCZ/RaNB5NW4ebJ7aHcg9NALm+8IKdO5BF/Y7kOVXnp7bLBypDpQH7 WgGwVBM4wdrDl9OYKJ+WiEpF+xtcczO7JTNWaj/JcI6oOkLI+p0x3eZ/q3UtylAf MrqDQcd7+y2gnmXmMzn8 =uAqx -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.