Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 136043 - www-client/mozilla-firefox >1.0? Overflow vulnerability specific to Gentoo
Summary: www-client/mozilla-firefox >1.0? Overflow vulnerability specific to Gentoo
Status: RESOLVED UPSTREAM
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Mozilla Gentoo Team
URL: http://forums.gentoo.org/viewtopic-t-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-06-08 02:52 UTC by BakaOhKi
Modified: 2006-10-25 08:08 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description BakaOhKi 2006-06-08 02:52:56 UTC
Upon not receiving useful comments on the forum I think it is the best to submit this bug.

error: url overflow upon post event
reproduceable: yes
effected: mozilla suite, firefox and basically mozilla based browsers
description:

Mozilla has no limit on url length, meaning that an extremely long (>5k?) url can break the browser killing Xorg as well (!) leaving with a black screen - can be cured with Magic SysRq only. This can happen for example with the w3c's css validator which uses a post event to send raw data, but implementing a small page that posts data automatically with javascript takes only a minute or two. 

Except for Kazehakase I found this bug reproduceable with most Mozilla based browsers on Gentoo (both on my Amd64 installation and on my secondary x86 one!), but NOT on other distributions (checked: Fedora, Kanotix, Knoppix, Ubuntu).

I upgraded the 1. kernel, 2. the xserver, 3. the browser (happens with firefox-bin and firefox too) 4. the WM - everything I could imagine (to be honest I had to do a world update not so long ago and to my amusement this still happens); but the problem still persists.

how to reproduce:
1. launch w3c's css validator (http://jigsaw.w3.org/css-validator/)
2. paste an obscene amount of data (possibly css) into the big textarea
3. press "Check"
Comment 1 Stuart Longland (RETIRED) gentoo-dev 2006-09-25 06:36:05 UTC
Looking through that forum thread... it seems this is not specific to Gentoo, but rather is a matter that should be taken upstream.

See http://forums.gentoo.org/viewtopic-p-3490350.html#3490350 <-- it apparently happens on Debian Stable.

That said... when you say "obscene" amounts of data... how much is that exactly?  I've pasted some pretty big dumps into Firefox text boxes without any issues.
Comment 2 Jakub Moc (RETIRED) gentoo-dev 2006-10-25 08:08:09 UTC
Not Gentoo-specific. Report this upstream and past the URL here for us to track, thanks.