[prev in list] [next in list] [prev in thread] [next in thread]
List: kde-commits
Subject: Re: branches/KDE/4.3/kdelibs/kjs
From: Kevin Kofler <kevin.kofler () chello ! at>
Date: 2009-07-26 4:03:43
Message-ID: 200907260603.44562.kevin.kofler () chello ! at
[Download RAW message or body]
On Sunday 26 July 2009, Maksim Orlovich wrote:
> On Saturday 25 July 2009 23:35:57 you wrote:
> > SVN commit 1002473 by kkofler:
> >
> > Fix integer overflow in KJS JavaScript garbage collector (CVE-2009-1687).
> > Patch adapted from WebKit changeset 41854 by Geoffrey Garen. FIXME: This
> > will still crash (as in the WebKit commit), so you can still DoS the
> > browser, but at least the overflow is not exploitable anymore. Backport
> > revision 1002471 from trunk.
>
> I do not believe this overflow is possible in KJS --- see KJS_MEM_LIMIT.
Interesting... I know Than Ngo patched this in RHEL for KDE 3.5.4, so somehow
the folks at RH thought it exploitable at least in that old version. Though
maybe they are wrong. I don't work for RH, I'm just a volunteer for Fedora, so
I don't know the details.
Still, does the safety check break anything? I think it certainly can't hurt
to be cautious. Or will it degrade performance significantly?
Kevin Kofler
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic