[webkit-dev] SVG Stabilization

Alexander Kellett lypanov at mac.com
Tue Feb 20 00:57:22 PST 2007


no idea how much my vote counts in this area anymore :)
but i fully agree with the ideas expressed in this mail

Alex

On 20 Feb 2007, at 03:13, Maciej Stachowiak wrote:
> Hi Everyone,
>
> As part of our stabilization effort, SVG has been raised as an area  
> of concern. Some of the newer SVG features have been sources of  
> crashes, some of which could potentially be security issues (the  
> ones that are buffer overruns).
>
> Specifically, here are some of the risks we see from SVG in our  
> current state:
>
> * Non-security hole crashes in normal SVG content on the web - may  
> affect user perception of quality, but SVG content is not yet very  
> common.
>
> * Security holes - potentially exploitable buffer overruns and  
> such. These are really bad, because anyone that shipped an engine  
> exposing these would be forced to issue high priority security  
> updates as they get discovered. SVG content being relatively rare  
> will not help
>
> * Sites developing a dependency on WebKit-specific SVG bugs - we  
> are not as worried about this, since there are a number of other  
> SVG implementations out there, and Gecko at least has more market  
> share.
>
>
> To address these concerns, a few of us came up with a plan which  
> I'd like to propose now for discussion. I would especially like to  
> hear from WebKit SVG hackers on this.
>
> 1) Disable newer/experimental features   (we'd probably guard these  
> with a single SVG_EXPERIMENTAL_FEATURES ifdef)
>   * SVGImage -- already disabled
>   * Animation -- not tested anywhere enough yet, and still  
> noticably unstable
>   * Filters -- still unstable, and can cause problems with buggy  
> graphics drivers which take down the whole machine
>   * Use -- untested/unstable
>   * foreignObject -- might have issues with html inside svg,  
> particularly for hit testing, etc
>
>
> 2) Additional testing
>   * Fuzz-test for custom parsers - the biggest security risk is  
> buffer overruns in some of the custom parsers, so we'd like to  
> develop a fuzz-testing tool for attributes that trigger these, and  
> fix resulting crashes.
>   * XSS testing - SVG has many elements that reference external  
> content, these should be tested for cross-site scripting risk.
>   * Additional ad-hoc testing - we will need community help with this
>   * Look into generating new results for pixel tests and keep them  
> passing, once experimental features are off on trunk.
>
> Thoughts?
>
>
> Regards,
> Maciej
>
> _______________________________________________
> webkit-dev mailing list
> webkit-dev at lists.webkit.org
> http://lists.webkit.org/mailman/listinfo/webkit-dev

---
Alexander Kellett
PGP - 0x6BFA8EF3, FPR: DA65 D6DE 56A9 D715 EFB6 A948 B2EF 6622 6BFA 8EF3





More information about the webkit-dev mailing list