Closed
Bug 1047620
Opened 10 years ago
Closed 10 years ago
Fix sandboxing for B2G --disable-jemalloc builds, which call mremap via libc.so!dlrealloc
Categories
(Core :: Security, defect)
Tracking
()
RESOLVED
FIXED
mozilla34
People
(Reporter: jld, Assigned: jld)
References
Details
Attachments
(1 file)
1.12 KB,
patch
|
kang
:
review+
|
Details | Diff | Splinter Review |
Valgrind and Sanitizer builds disable jemalloc, meaning we get the system malloc; and on (some versions of?) Android, it optimizes large realloc()s by using mremap. So that needs to be whitelisted.
Assignee | ||
Comment 1•10 years ago
|
||
Attack surface note: this applies only to builds used for (relatively) high-overhead memory debugging methods.
Attachment #8466435 -
Flags: review?(gdestuynder)
Comment on attachment 8466435 [details] [diff] [review] bug1047620-allow-mremap-hg0.diff Review of attachment 8466435 [details] [diff] [review]: ----------------------------------------------------------------- having attack surface note in bug++ :)
Attachment #8466435 -
Flags: review?(gdestuynder) → review+
Assignee | ||
Comment 3•10 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/36cf6a98d663
Comment 4•10 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/36cf6a98d663
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla34
You need to log in
before you can comment on or make changes to this bug.
Description
•