Bugs :  K-Meleon Web Browser Forum
You can talk about issues with k-meleon here.  
K-Meleon Floating Point Numbers Memory Corruption Vulnerability
Posted by: l
Date: February 23, 2010 09:04AM

Hi, has this been fixed
K-Meleon Floating Point Numbers Memory Corruption Vulnerability
http://www.vupen.com/english/advisories/2009/3299

Options: ReplyQuote
Re: K-Meleon Floating Point Numbers Memory Corruption Vulnerability
Posted by: guenter
Date: February 23, 2010 06:07PM

Your link offers no Proof of Concept test page nor any detailed info what K-Meleon module is effected. So maybe enlighten me what module You mean. smiling smiley

I assume that affects a module in the GRE version of original 1.5.3?


Likely in dtoa implementation. This would not exactly be news - Date : 20.11.2009.

K-Meleon 1.5.3's original GRE has the same dtoa as KDE, Opera ... all BSD systems. This issue has been AFAIK fixed e.g. in Firefox 3.5.4 and also in other new Mozilla GRE.

If so:

A GRE update for 1.5.3 is at K-Meleon Extensions Central.

If You want to update Your current K-Meleon?

Else use

K-Meleon 1.5.4 RC that is based on a newer GRE.

if You are using Win98.

Else look at http://kmeleonbrowser.org/forum/read.php?1,103184 for K-Meleon 1.6a.



Edited 2 time(s). Last edit at 02/23/2010 11:09PM by guenter.

Options: ReplyQuote


K-Meleon forum is powered by Phorum.