
Cloud Vulnerability DB
A community-led vulnerabilities database
KDE KImageFormats versions 5.70.0 through 5.81.0 contained a stack-based buffer overflow vulnerability in the XCFImageFormat::loadTileRLE function. The vulnerability was discovered and reported through the OSS-Fuzz program on April 28, 2021, and was subsequently fixed in a later release (OSS-Fuzz Report).
The vulnerability was identified as a stack-based buffer overflow WRITE condition occurring in the XCFImageFormat::loadTileRLE function. The issue manifested in the call stack through XCFImageFormat::loadLevel and XCFImageFormat::loadHierarchy functions. The vulnerability was introduced in commit c60e77c048d32ccf743cec695743b77b2b25dc87 and was fixed in commit 297ed9a2fe339bfe36916b9fce628c3242e5be0f. The severity of this vulnerability was rated as HIGH according to the OSS-Fuzz assessment (OSS-Fuzz Vulns).
A stack-based buffer overflow vulnerability could potentially allow attackers to execute arbitrary code or cause a denial of service condition through specially crafted XCF image files (OSS-Fuzz Vulns).
The vulnerability was fixed in a commit (297ed9a2fe339bfe36916b9fce628c3242e5be0f) to the KDE KImageFormats repository. Users should upgrade to a version that includes this fix (KDE Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."