Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for kde4libs some time ago.
CVE-2009-0689[0]: | Array index error in the (1) dtoa implementation in dtoa.c (aka | pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in | gdtoa/misc.c in libc, as used in multiple operating systems and | products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, | Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon | 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent | attackers to cause a denial of service (application crash) and | possibly execute arbitrary code via a large precision value in the | format argument to a printf function, which triggers incorrect memory | allocation and a heap-based buffer overflow during conversion to a | floating-point number. Unfortunately the vulnerability described above is not important enough to get it fixed via regular security update in Debian stable. It do not warrant a DSA. However it would be nice if this could get fixed via a regular point update[1]. Please contact the release team for this. This is an automatically generated mail, in case you are already working on an upgrade this is of course pointless. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689 http://security-tracker.debian.org/tracker/CVE-2009-0689 [1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable
signature.asc
Description: OpenPGP digital signature