Mandriva Linux Security Advisory 2010-182 - Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari before 4.0 allows remote attackers to execute arbitrary code or cause a denial of service via an SVG animation element, related to SVG set objects, SVG marker elements, the targetElement attribute, and unspecified caches.
1e1905c05b4a90241682a5f0ea5c934a704fe74008aab6e69eac64d99ac3577a
Mandriva Linux Security Advisory 2009-331 - Multiple vulnerabilities have been found and corrected in kdegraphics.
dd69d74a69ac6db034c268274e7e69417c95439f26e716bdb4dd9730c9ddc623
Ubuntu Security Notice USN-823-1 - It was discovered that KDE-Graphics did not properly handle certain malformed SVG images. If a user were tricked into opening a specially crafted SVG image, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program.
9ad5ad4f06b6206c5337b67d4d4971f218779f9b4358f5487aa62eafcd991d98
Zero Day Initiative Advisory 09-034 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the garbage collection of JavaScript set elements in WebCore. When an SVG set object is appended to an SVG marker element that is dereferenced, calls to the targetElement attribute will fail to reference count the marker element. When the set element is appended to another object, subsequent calls to the targetElement attribute will result in a heap corruption which can be leveraged to execute arbitrary code under the context of the current user.
cf8604ce72d5c9bd4c727ff12fc63e69f99f8bff0eb3dc75009bbb2e8b48db76