aboutsummaryrefslogtreecommitdiffstats
path: root/mail/ChangeLog
diff options
context:
space:
mode:
authorJeffrey Stedfast <fejj@ximian.com>2003-03-13 05:39:09 +0800
committerJeffrey Stedfast <fejj@src.gnome.org>2003-03-13 05:39:09 +0800
commit4b32de61d00bf5ae12d4179bede135fd2ded0f9c (patch)
tree92debe525bfb370732bd8d56328ca461203a2a3f /mail/ChangeLog
parent1f54deb5584629a657a69d62db0e07935322be05 (diff)
downloadgsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.tar
gsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.tar.gz
gsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.tar.bz2
gsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.tar.lz
gsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.tar.xz
gsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.tar.zst
gsoc2013-evolution-4b32de61d00bf5ae12d4179bede135fd2ded0f9c.zip
Security vulnerability fixes.
2003-03-12 Jeffrey Stedfast <fejj@ximian.com> Security vulnerability fixes. * mail-display.c (do_external_viewer): Make sure that we don't launch a bonobo control to view a mime-type that we handle internally, otherwise maliciously formed HTML mail using <object> tags could potentially launch a bonobo vontrol to view the mime part bypassing any checks that Evolution might do on the data normally. svn path=/trunk/; revision=20269
Diffstat (limited to 'mail/ChangeLog')
-rw-r--r--mail/ChangeLog7
1 files changed, 7 insertions, 0 deletions
diff --git a/mail/ChangeLog b/mail/ChangeLog
index 7b553f817e..a8be5524cc 100644
--- a/mail/ChangeLog
+++ b/mail/ChangeLog
@@ -2,6 +2,13 @@
Security vulnerability fixes.
+ * mail-display.c (do_external_viewer): Make sure that we don't
+ launch a bonobo control to view a mime-type that we handle
+ internally, otherwise maliciously formed HTML mail using <object>
+ tags could potentially launch a bonobo vontrol to view the mime
+ part bypassing any checks that Evolution might do on the data
+ normally.
+
* mail-format.c (handle_text_html, attachment_header)
(handle_image, handle_via_bonobo): Encode the result from
get_cid() so that malicious Content-Id strings cannot bypass the