Summary: | <kde-base/okular-4.4.5-r2: Memory Corruption Vulnerability (CVE-2010-2575) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.kde.org/info/security/advisory-20100825-1.txt | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() CVE-2010-2575 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2575): Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp in Okular in KDE SC 4.3.0 through 4.5.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image in a PDB file. Fixed in 4.5.1 Current stable 4.4.5 is still vulnerable The patch is added in okular-4.4.5-r2, bumped straight to stable. As long as nothing explodes during the next hours, feel free to * remove 4.4.5-r1 from CVS * remove 4.4.5 pending STABILIZATION of 4.4.5-r2 on ppc (ppc please do!!!) ppc stable, @security: last arch (though the others were cheating :P) done, back to you Thanks, everyone. GLSA request filed. removing KDE, CC us back if you need us again This issue was resolved and addressed in GLSA 201311-20 at http://security.gentoo.org/glsa/glsa-201311-20.xml by GLSA coordinator Sergey Popov (pinkbyte). |