Package: kdelibs4 Severity: grave Tags: security Justification: user security hole
Invalid range checking in PCX header parsing possibly permits execution of arbitrary code. Please see http://bugs.kde.org/show_bug.cgi?id=102328 for a full description, a crafted test image and a patch from Waldo Bastian (so there's probably a pending KDE security advisory). Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]