-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, Apr 10, 2008 at 12:44:49AM +0200, Sylvain HITIER wrote:
> However this looks like a bug against libcairo2...
> I suggest that other "integer-overflow vulnerabilities in malloc() calls" be
> the cause of it.
> 
> As you've just NMU'ed a security fix for this lib, I suggest you have a look
> at my bug report: you're surely able to investigate deeper than I did!

I couldn't reproduce this using libcairo2 1.2.4-4.1+etch1 and iceweasel
2.0.0.13-0etch1.  The SVG you referenced loads just fine, apart from the
several seconds of CPU it chews up doing the render.

FWIW, the integer overflow fix applied to libcairo was in the form of a series
of overflow checks on memory allocations, which in general would return a null
in the event of an overflow.  The most likely regressions from the fix are
division by zero errors (SIGFPE) or null pointer dereferences (SIGSEGV); both
of these were noted when early versions of the fix were made by Ubuntu (and
fixes for all known regressions are in the Debian release.)

The stack trace you gave is consistent with a loss of connection to the X
server, possibly in response to invalid X command protocol interactions.
Whether X pixmap handling interactions can cause such a thing or not I don't
know enough about X to say.

Deferring to the iceweasel maintainers for the moment, unless we get some more
data.


- -- 
Devin  \ aqua(at)devin.com, IRC:Requiem; http://www.devin.com
Carraway \ 1024D/E9ABFCD2: 13E7 199E DD1E 65F0 8905 2E43 5395 CA0D E9AB FCD2
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH/cDAU5XKDemr/NIRAs3XAKDJyGPZQhSB3C5SqEMeVWU278/WuwCfS/U6
j/RDg2Hj+sJihtyBcM9hheA=
=HONR
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to