Hi Nico,
Many thanks for the additional digging into the code. I'm curently on
holiday, but will try to find some time to work on bits. Will try to at
least make an upload of 11.0.1 tomorrow.
On Tue, 2008-12-23 at 16:29 +0100, Nico Golde wrote:
> Hi,
> CCed upstream.
> Similar things are done at
Hi,
* Irene Vatton [2008-12-23 17:46]:
> Le mardi 23 décembre 2008 à 16:29 +0100, Nico Golde a écrit :
> > CCed upstream.
> >
> > I am not sure if it is enough to just fix this CVE id.
> > Browsing a bit in the code reveals quite a lot of additional
> > buffer overflows.
>
> The new release 11.
Le mardi 23 décembre 2008 à 16:29 +0100, Nico Golde a écrit :
> Hi,
> CCed upstream.
>
> I am not sure if it is enough to just fix this CVE id.
> Browsing a bit in the code reveals quite a lot of additional
> buffer overflows.
The new release 11.0.1 published today fixes several buffer overflows
Hi,
CCed upstream.
I am not sure if it is enough to just fix this CVE id.
Browsing a bit in the code reveals quite a lot of additional
buffer overflows.
From HTMLactions.c:
1264 void CheckUniqueName (Element el, Document doc, Attribute attr,
1265 AttributeType attrType)
126
Hi Steffen,
Thanks for the report. I had a quick look at the advisory, apparently both
attacks have the same origin, TtaWCToMBstring().
Will have a look at fixing it, CC'ing upstream, since I haven't seen
anything about the advisory over there.
Regis
On Tue, December 2, 2008 19:20, Steffen Joer
Package: amaya
Severity: grave
Tags: security
Justification: user security hole
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for amaya.
CVE-2008-5282[0]:
| Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1
| allow remote attackers to execute arbi
6 matches
Mail list logo