Bugs :  K-Meleon Forum
You can talk about issues with k-meleon here. But please, for confirmed bugs, use the bug tracker to report and give feedback on bugs.  
K-Meleon Floating Point Numbers Memory Corruption Vulnerability
Posted by: l
Date: February 23, 2010 04:04PM

Hi, has this been fixed
K-Meleon Floating Point Numbers Memory Corruption Vulnerability
http://www.vupen.com/english/advisories/2009/3299

Options: ReplyQuote
Re: K-Meleon Floating Point Numbers Memory Corruption Vulnerability
Posted by: guenter
Date: February 24, 2010 01:07AM

Your link offers no Proof of Concept test page nor any detailed info what K-Meleon module is effected. So maybe enlighten me what module You mean. smiling smiley

I assume that affects a module in the GRE version of original 1.5.3?


Likely in dtoa implementation. This would not exactly be news - Date : 20.11.2009.

K-Meleon 1.5.3's original GRE has the same dtoa as KDE, Opera ... all BSD systems. This issue has been AFAIK fixed e.g. in Firefox 3.5.4 and also in other new Mozilla GRE.

If so:

A GRE update for 1.5.3 is at K-Meleon Extensions Central.

If You want to update Your current K-Meleon?

Else use

K-Meleon 1.5.4 RC that is based on a newer GRE.

if You are using Win98.

Else look at http://kmeleon.sourceforge.net/forum/read.php?1,103184 for K-Meleon 1.6a.



Edited 2 time(s). Last edit at 02/24/2010 06:09AM by guenter.

Options: ReplyQuote


K-Meleon forum is powered by Phorum.