w3m consumes all memory and crashes computer
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
w3m (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: w3m
I'm not sure what program is using it, but some background process is causing w3m to make dumps of all html files in my home directory (perhaps an indexer or something?)
Unfortunately, I have an unpacked copy of the firefox source in there, and it includes this file:
firefox-
...which looks like this:
#######
<html>
<body>
<table class="DataBg" border="0" cellpadding="0" cellspacing="1" >
<td align="center" class="DataHeader" width="2"
rowspan=
<td align="center" class="DataHeader" colspan="3"><div
class="
</tr>
</table>
</body>
</html>
#######
When w3m tries to open this file, it quickly exhausts all available memory and starts swapping massively, causing the machine to slow down so much sometimes a hard reboot is the only escape.
So this is really *two* bugs. The first one is that w3m can't open the file without dire consequences, and the second is that whatever is *using* w3m to index random files in my home directory is causing my entire computer to crash because of a certain file in there. I think this might count as a security vulnerability, because it's certainly a simple denial of service. The file just has to sit there.
Sorry I don't know what program is running w3m, maybe tracker-indexer? or maybe evolution-
So I think two things would need to be fixed:
1. w3m, obviously
2. Shouldn't there be some kind of resource limit on programs that are used to help do indexing? To stop this kind of thing happening in the future?
ProblemType: Bug
DistroRelease: Ubuntu 10.04
Package: w3m 0.5.2-2.1ubuntu1.1
ProcVersionSign
Uname: Linux 2.6.32-24-generic x86_64
NonfreeKernelMo
Architecture: amd64
Date: Wed Aug 18 09:58:28 2010
InstallationMedia: Ubuntu 10.04 LTS "Lucid Lynx" - Release amd64 (20100427.1)
ProcEnviron:
PATH=(cususername, user)
LANG=en_NZ.UTF-8
SHELL=/bin/bash
SourcePackage: w3m
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.