Bug#354066: mozilla-firefox: HTML Parsing Denial of Service Vulnerability

2006-07-30 Thread Geoff Crompton
Alexander Sack wrote:
 AFAICT, this is fixed in sarge8 too.
 
 Can you confirm that the bug is gone for you too?
 
  - Alexander
 

Yep, confirmed it doesn't crash my browser anymore. Running
1.0.4-2sarge9. So feel free to close this bug.

Thanks!

-- 
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#354066: mozilla-firefox: HTML Parsing Denial of Service Vulnerability

2006-07-30 Thread Alexander Sack
close 354066 1.0.4-2sarge8
thanks

On Mon, Jul 31, 2006 at 11:17:31AM +1000, Geoff Crompton wrote:
 Alexander Sack wrote:
  AFAICT, this is fixed in sarge8 too.
  
  Can you confirm that the bug is gone for you too?
  
   - Alexander
  
 
 Yep, confirmed it doesn't crash my browser anymore. Running
 1.0.4-2sarge9. So feel free to close this bug.
 
 Thanks!
 

 - Alexander

-- 
 GPG messages preferred.   |  .''`.  ** Debian GNU/Linux **
 Alexander Sack| : :' :  The  universal
 [EMAIL PROTECTED]   | `. `'  Operating System
 http://www.asoftsite.org  |   `-http://www.debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#354066: mozilla-firefox: HTML Parsing Denial of Service Vulnerability

2006-07-24 Thread Alexander Sack
AFAICT, this is fixed in sarge8 too.

Can you confirm that the bug is gone for you too?

 - Alexander

-- 
 GPG messages preferred.   |  .''`.  ** Debian GNU/Linux **
 Alexander Sack| : :' :  The  universal
 [EMAIL PROTECTED]   | `. `'  Operating System
 http://www.asoftsite.org  |   `-http://www.debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#354066: mozilla-firefox: HTML Parsing Denial of Service Vulnerability

2006-02-22 Thread Geoff Crompton
Package: mozilla-firefox
Version: 1.0.4-2sarge5
Severity: important

No CVE yet, seen at http://www.securityfocus.com/bid/16741. Affects firefox
1.0 through to 1.5

The bid has a html snippet that triggers it, which I've not reproduced here. I
tried the snippet, and it immediately crashed my browser.

Lots of discussion at https://bugzilla.mozilla.org/show_bug.cgi?id=269095
Mind you, reading some of that makes it easy to understand why it is 
really hard to backport patches.



-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686-smp
Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1)

Versions of packages mozilla-firefox depends on:
ii  debianutils2.8.4 Miscellaneous utilities specific t
ii  fontconfig 2.3.1-2   generic font configuration library
ii  libatk1.0-01.8.0-4   The ATK accessibility toolkit
ii  libc6  2.3.2.ds1-22  GNU C Library: Shared libraries an
ii  libfontconfig1 2.3.1-2   generic font configuration library
ii  libfreetype6   2.1.7-2.4 FreeType 2 font engine, shared lib
ii  libgcc11:3.4.3-13GCC support library
ii  libglib2.0-0   2.6.4-1   The GLib library of C routines
ii  libgtk2.0-02.6.4-3.1 The GTK+ graphical user interface 
ii  libidl00.8.5-1   library for parsing CORBA IDL file
ii  libjpeg62  6b-10 The Independent JPEG Group's JPEG 
ii  libkrb53   1.3.6-2sarge2 MIT Kerberos runtime libraries
ii  libpango1.0-0  1.8.1-1   Layout and rendering of internatio
ii  libpng12-0 1.2.8rel-1PNG library - runtime
ii  libstdc++5 1:3.3.5-13The GNU Standard C++ Library v3
ii  libx11-6   4.3.0.dfsg.1-14sarge1 X Window System protocol client li
ii  libxext6   4.3.0.dfsg.1-14sarge1 X Window System miscellaneous exte
ii  libxft22.1.7-1   FreeType-based font drawing librar
ii  libxp6 4.3.0.dfsg.1-14sarge1 X Window System printing extension
ii  libxt6 4.3.0.dfsg.1-14sarge1 X Toolkit Intrinsics
ii  psmisc 21.5-1Utilities that use the proc filesy
ii  xlibs  4.3.0.dfsg.1-14sarge1 X Keyboard Extension (XKB) configu
ii  zlib1g 1:1.2.2-4.sarge.2 compression library - runtime

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#354066: mozilla-firefox: HTML Parsing Denial of Service Vulnerability

2006-02-22 Thread Eric Dorland
* Geoff Crompton ([EMAIL PROTECTED]) wrote:
 Package: mozilla-firefox
 Version: 1.0.4-2sarge5
 Severity: important
 
 No CVE yet, seen at http://www.securityfocus.com/bid/16741. Affects firefox
 1.0 through to 1.5
 
 The bid has a html snippet that triggers it, which I've not reproduced here. I
 tried the snippet, and it immediately crashed my browser.
 
 Lots of discussion at https://bugzilla.mozilla.org/show_bug.cgi?id=269095
 Mind you, reading some of that makes it easy to understand why it is 
 really hard to backport patches.

This has been fixed in firefox 1.5.0.1, and since it's only a DOS and
not exploitable, I don't think the security team will want to bother
with a DSA.

-- 
Eric Dorland [EMAIL PROTECTED]
ICQ: #61138586, Jabber: [EMAIL PROTECTED]
1024D/16D970C6 097C 4861 9934 27A0 8E1C  2B0A 61E9 8ECF 16D9 70C6

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS d- s++: a-- C+++ UL+++ P++ L++ E++ W++ N+ o K- w+ 
O? M++ V-- PS+ PE Y+ PGP++ t++ 5++ X+ R tv++ b+++ DI+ D+ 
G e h! r- y+ 
--END GEEK CODE BLOCK--


signature.asc
Description: Digital signature