Closed Bug 1285287 Opened 8 years ago Closed 8 years ago

Seccomp sandbox violation: sys_getresuid32 called in content process of Firefox desktop

Categories

(Core :: Security: Process Sandboxing, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla50
Tracking Status
firefox50 --- fixed

People

(Reporter: tedd, Assigned: tedd)

References

Details

Crash Data

Attachments

(1 file)

Crash report: https://crash-stats.mozilla.com/report/index/c3a1ea13-7633-49d0-a010-5663e2160707

shows that sys_getresuid32 is called in the content process. Whitelisting this system call should not be an issue, we have sys_getresuid already whitelisted.
Attachment #8769235 - Flags: review?(gpascutto) → review+
Keywords: checkin-needed
Pushed by cbook@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/516786c7c7b8
Use proper macros to whitelist getres*id. r=gcp
Keywords: checkin-needed
https://hg.mozilla.org/mozilla-central/rev/516786c7c7b8
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla50
Crash Signature: [@ mozilla::LookAndFeel::GetColor ] [@ libc-2.19.so@0xb6d86 ] [@ libc-2.19.so@0xb8116 ] [@ libc-2.19.so@0xb5856 ] [@ libc-2.19.so@0xa45e2 ] [@ libc-2.17.so@0xb9f16 ] [@ libc-2.22.so@0xb35a8 ] [@ libc-2.22.so@0xb9e68 ] [@ libc-2.19.so@0xb6836 ] [@ libc-2.2…
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: