[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

kde4libs update for CVE-2009-0689 in stable



Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for kde4libs some time ago.

CVE-2009-0689[0]:
| Array index error in the (1) dtoa implementation in dtoa.c (aka
| pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in
| gdtoa/misc.c in libc, as used in multiple operating systems and
| products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5,
| Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon
| 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent
| attackers to cause a denial of service (application crash) and
| possibly execute arbitrary code via a large precision value in the
| format argument to a printf function, which triggers incorrect memory
| allocation and a heap-based buffer overflow during conversion to a
| floating-point number.

Unfortunately the vulnerability described above is not important enough
to get it fixed via regular security update in Debian stable.
It do not warrant a DSA.

However it would be nice if this could get fixed via a regular point
update[1].
Please contact the release team for this.

This is an automatically generated mail, in case you are already working
on an
upgrade this is of course pointless.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
    http://security-tracker.debian.org/tracker/CVE-2009-0689
[1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Attachment: signature.asc
Description: OpenPGP digital signature


Reply to: