Open Bug 1205598 Opened 9 years ago Updated 2 years ago

Print preview doesn't honor Private Browsing Mode and writes to /tmp

Categories

(Firefox :: Private Browsing, defect, P3)

38 Branch
defect

Tracking

()

People

(Reporter: intrigeri, Unassigned)

References

(Blocks 1 open bug)

Details

(Whiteboard: [tor][tor-standalone])

User Agent: Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101 Firefox/38.0
Build ID: 20100101

Steps to reproduce:

1. Start Tails 1.5.1
2. Start Tor Browser (which is given its own $TMPDIR and hasn't access to /tmp)
3. Open the print preview dialog in Tails 1.5.1: open menu via sandwidch icon -> Print.


Actual results:

The print preview is empty (gray background only), and the AppArmor logs show that Firefox has tried to create a file in /tmp (e.g. /tmp/tmpfY7kKdS).


Expected results:

A print preview should be displayed.

Background: on Tails, for application isolation we have an AppArmor policy that blocks access to /tmp for the web browser (Tor Browser, that is Firefox + some patches). So, we give the browser its own temporary directory and we have a wrapper around the brower that exports $TMPDIR accordingly. 

I would expect that the print preview functionality honors $TMPDIR, and works even if /tmp is not accessible read-write.
I think we should make the stronger claim that the print preview should not write to disk in the first place if Private Browsing Mode is activated.
Status: UNCONFIRMED → NEW
Component: Untriaged → Private Browsing
Ever confirmed: true
Summary: Print preview doesn't honor $TMPDIR and tries to write to /tmp → Print preview doesn't honor Private Browsing Mode and writes to /tmp
And /tmp is even not cleaned up afterwards (i.e. when the browser gets closed) it seems.
Whiteboard: [tor]
Priority: -- → P3
Blocks: meta_tor
Whiteboard: [tor] → [tor][tor-standalone]
There have been similar leaking to TMPDIR problems, like the one I solved in 1123480. Might be useful as reference, and there might be other leaks lurking which an audit could reveal. Braintease: how to write a comprehensive TMPDIR leak test for feature additions with disk access?
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.