Control: severity -1 important

On Sun, 13 Apr 2025 16:24:12 +0200
Ben Hutchings <b...@decadent.org.uk> wrote:

> Source: dillo
> Version: 3.0.5-7
> Severity: serious
> Tags: security
> 
> Following the recent discussion on debian-devel, I'm concerned that
> this package is still in stable and testing.
> 
> There has been no new upstream version and absolutely minimal fixes in
> Debian for the last 10 years.  While for some classes of software this
> would be fine, a web browser is constantly working with untrusted
> input, and a web browser written in C and C++ is likely to have many
> exploitable security vulnerabilties.
> 
> I see no sign that it has already been fuzz tested by the previous
> upstream maintainer or the developers of the newer forks, so these
> vulnerabilities are more likely to be found by attackers than
> defenders.
> 
> I understand that Dillo does have the advantage of not implementing
> Javascript, but there is still plenty of complexity in the formats it
> does handle.  For comparison, see Vincent Sanders' accounts of fuzzing
> NetSurf, a similarly "light" browser project:
> <https://vincentsanders.blogspot.com/2016/08/down-rabbit-hole.html>,
> <https://vincentsanders.blogspot.com/2016/10/rabbit-of-caerbannog.html>.
> 
> Ben.

Removing dillo at this stage in the Trixie release process would result
in removal of the src:claws-mail package on account of the
claws-mail-dillo-viewer binary package depending upon it. Because
Trixie soft freeze has begun, dropping binary packages from a source
package is no longer appropriate, so dropping claw-mail-dillo-viewer is
not straightforward.

As of last year a new upstream maintainer for Dillo has stepped up and
has made new releases (See https://dillo-browser.github.io/). While
it's likely too late to get the latest release into trixie, there is
the potential to get it into trixie-backports post-release.

-- 
Plasma

Reply via email to