Closed
Bug 1025339
Opened 10 years ago
Closed 7 years ago
IS_TARGET_MPQ macro in Android libhardware opens /sys/devices/system/soc/soc0/id in content processes
Categories
(Core :: Security: Process Sandboxing, defect)
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: jld, Unassigned)
References
Details
(Whiteboard: sb-)
hardware/libhardware/include/hardware/hardware.h: 36 #define IS_TARGET_MPQ(status) \ 37 { \ 38 int id=0; \ 39 FILE *fp; \ 40 if((fp = fopen("/sys/devices/system/soc/soc0/id","r")) != NULL){ \
Reporter | ||
Comment 1•9 years ago
|
||
Move process sandboxing bugs to the new Bugzilla component. (Sorry for the bugspam; filter on 3c21328c-8cfb-4819-9d88-f6e965067350.)
Component: Security → Security: Process Sandboxing
Reporter | ||
Comment 2•9 years ago
|
||
Sorry for the bugspam; filter on 086f2ac3-ac15-4299-889b-009181af5029.
Blocks: 1121295
Reporter | ||
Comment 3•9 years ago
|
||
Sorry for the bugspam; filter on 086f2ac3-ac15-4299-889b-009181af5029.
No longer blocks: 930258
Updated•8 years ago
|
Whiteboard: sb-
Reporter | ||
Comment 4•7 years ago
|
||
B2G-specific sandboxing bugs are WONTFIX. (I'm reasonably sure these bugs don't have implications for other platforms, but comment if I missed something.)
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•