Bug 1733532 Comment 3 Edit History

Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.

I contacted both Samsung SDS and Fasoo. Fasoo replied quickly and says that the two products are independent, so the correlation makes me wonder if they are maybe incompatible.

Regarding the crash itself, it occurs while jumping from `mozilla::freestanding::patched_NtMapViewOfSection` to `_security_check_cookie`. Apparently the former lives in a page that is currently mapped executable but not the latter (probably a result of interaction with third-party DLLs or programs). I wonder how this crash would evolve if we didn't use stack buffers in `mozilla::freestanding::patched_NtMapViewOfSection`, as that should remove the call to `_security_check_cookie`. I think this should fix the current crash, but we may get a different crash instead. I'll see if that's possible.
I contacted both Samsung SDS and Fasoo. Fasoo replied quickly and says that the two products are independent, so the correlation makes me wonder if they are maybe incompatible.

Regarding the crash itself, it occurs while jumping from `mozilla::freestanding::patched_NtMapViewOfSection` to `_security_check_cookie`, both in `firefox.exe`. Apparently the former lives in a page that is currently mapped executable but not the latter (probably a result of interaction with third-party DLLs or programs). I wonder how this crash would evolve if we didn't use stack buffers in `mozilla::freestanding::patched_NtMapViewOfSection`, as that should remove the call to `_security_check_cookie`. I think this should fix the current crash, but we may get a different crash instead. I'll see if that's possible.
I contacted both Samsung SDS and Fasoo. Fasoo replied quickly and says that the two products are independent, so the correlation makes me wonder if they are maybe incompatible.

Regarding the crash itself, it occurs while jumping from `mozilla::freestanding::patched_NtMapViewOfSection` to `_security_check_cookie`, both in `firefox.exe`. Apparently the former lives in a page that is currently mapped executable but not the latter (probably a result of interaction with third-party DLLs or programs). I wonder how this crash would evolve if we didn't use stack buffers in `mozilla::freestanding::patched_NtMapViewOfSection`, as that should remove the call to `_security_check_cookie`. I think this should fix the current crash, but we may get a different crash instead. I'll investigate if that's possible.

Back to Bug 1733532 Comment 3