Bug 509921 (CVE-2009-2294)
Summary: | CVE-2009-2294 dillo: PNG-related integer overflow | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED CANTFIX | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | andreas.bierfert |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2294 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-12-20 22:32:28 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Vincent Danen
2009-07-06 21:12:48 UTC
Upstream patches to correct the issue: http://hg.dillo.org/dillo/rev/81c2d1c2e0f0 http://hg.dillo.org/dillo/rev/f77f7973534e http://hg.dillo.org/dillo/rev/35b44dd22e08 http://hg.dillo.org/dillo/rev/ca1015d98f7a http://hg.dillo.org/dillo/rev/481a979a9d1f http://hg.dillo.org/dillo/rev/ace4f2a5a8be It looks as though dillo 0.8.6 doesn't do any image size checks, or at least not in the same way newer dillo does, and the above patches definitely do not apply clean. Is there a particular reason why we are still shipping dillo 0.8.6 when 2.1 is available? It doesn't look like dillo has really been touched in 2 years (last real update was Dec 6, 2007). I can't determine whether or not the dillo packages we ship in Fedora are affected by this problem. Andreas, is dillo still being maintained? Even now, if I use the menu item to launch dillo, it crashes on startup. The i18n version works, so there are definitely problems with this old version of dillo altogether. It is maintained. The problem with the newer dillo is that it requires fltk2 which for a lot of reasons is not in fedora right now (and probably will not be). However there are movements in dillo to change the usage of fltk2. Until then we are stuck with the old release. As to the crash I will try to look into the issues asap. Thanks, Andreas. I wasn't aware of the fltk2 issues. Unfortunately, I don't have a reproducer for the security issue noted, so I have nothing to verify that dillo is for sure affected (or not). Perhaps you can examine the patches and code and see if you can tell? Any followup on this? It's been a few months now. Thanks. I'm going to close this. It's been a year. Nothing exciting is happening with dillo in Fedora, so it looks unmaintained to me. As I cannot reproduce this crash, I have no way to know whether dillo 0.8.6 is affected or not. There doesn't seem to be much point in keeping this bug open as a result; if someone cares to investigate this further and finds that dillo is affected, feel free to re-open and work towards a resolution. |