Closed Bug 1025339 Opened 10 years ago Closed 7 years ago

IS_TARGET_MPQ macro in Android libhardware opens /sys/devices/system/soc/soc0/id in content processes

Categories

(Core :: Security: Process Sandboxing, defect)

All
Gonk (Firefox OS)
defect
Not set
normal

Tracking

()

RESOLVED WONTFIX

People

(Reporter: jld, Unassigned)

References

Details

(Whiteboard: sb-)

hardware/libhardware/include/hardware/hardware.h:

     36 #define IS_TARGET_MPQ(status) \
     37 { \
     38     int id=0; \
     39     FILE *fp; \
     40     if((fp = fopen("/sys/devices/system/soc/soc0/id","r")) != NULL){ \
Move process sandboxing bugs to the new Bugzilla component.

(Sorry for the bugspam; filter on 3c21328c-8cfb-4819-9d88-f6e965067350.)
Component: Security → Security: Process Sandboxing
Sorry for the bugspam; filter on 086f2ac3-ac15-4299-889b-009181af5029.
Blocks: 1121295
Sorry for the bugspam; filter on 086f2ac3-ac15-4299-889b-009181af5029.
No longer blocks: 930258
No longer blocks: 930258
Whiteboard: sb-
B2G-specific sandboxing bugs are WONTFIX.  (I'm reasonably sure these bugs don't have implications for other platforms, but comment if I missed something.)
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.