Your message dated Wed, 21 Apr 2010 17:16:10 +0200
with message-id <4bcf16ba....@phys.ethz.ch>
and subject line dillo has been removed
has caused the Debian Bug report #535788,
regarding dillo:  CVE-2009-2294 integer overflow vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
535788: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535788
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: dillo
version: 0.8.5-4
severity: serious
tags: security

hello,

it has been found that dillo is vulnerable to an integer overflow.  the
text of the problem is:

|Dillo, an open source graphical web browser, suffers from an integer
|overflow which may lead to a potentially exploitable heap overflow and
|result in arbitrary code execution.
|
|The vulnerability is triggered by HTML pages with embedded PNG images,
|the Png_datainfo_callback function does not properly validate the width
|and height of the image. Specific PNG images with large width and
|height can be crafted to trigger the vulnerability.

this is fixed in upstream version 2.2.1.  please coordinate with the
security team to prepare updates for the etch/lenny.

this is CVE-2009-2294 [0].  please make sure to include this number in
your changelog if you fix the issue.

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2294



--- End Message ---
--- Begin Message ---
thus the bug is not relevant anymore.
(it's not likely it's coming back since, the old dillo used to use gtk 1.x which was getting replaced with gtk 2, and nowadays dillo wants fltk a version that's not in debian)


--- End Message ---

Reply via email to