Closed Bug 1285769 Opened 8 years ago Closed 8 years ago

Seccomp sandbox violation: sys_get_mempolicy called in content process of Firefox desktop

Categories

(Core :: Security: Process Sandboxing, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla50
Tracking Status
firefox50 --- fixed

People

(Reporter: tedd, Assigned: tedd)

References

Details

(Whiteboard: sblc1)

Crash Data

Attachments

(1 file)

Whiteboard: sblc1
Crash Signature: [@ libc-2.23.so@0x100c19 ]
This is used by ffmpeg / libavcodec to decide the thread pool strategy for H264/H265 decoding.

It's harmless but on the other hand it's also pointless attack surface.
Try push: https://treeherder.mozilla.org/#/jobs?repo=try&revision=c6f75781c4fc
Assignee: nobody → julian.r.hector
Status: NEW → ASSIGNED
Attachment #8774437 - Flags: review?(gpascutto)
Attachment #8774437 - Flags: review?(gpascutto) → review+
Try in Comment 2.

Please check-in after Bug 1285770 (to avoid merge conflicts)
Keywords: checkin-needed
Pushed by cbook@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/c941e8a13954
Add sys_get_mempolicy to seccomp whitelist. r=gcp
Keywords: checkin-needed
https://hg.mozilla.org/mozilla-central/rev/c941e8a13954
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla50
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: