Closed
Bug 1369545
Opened 8 years ago
Closed 5 years ago
address potentially unsafe snprintf usage in PrepareAcceptLanguages
Categories
(Core :: Networking, enhancement, P2)
Tracking
()
People
(Reporter: keeler, Unassigned)
References
Details
(Keywords: sec-low, Whiteboard: [necko-triaged])
snprintf returns the number of bytes it *would have* written when it runs out of buffer space. PrepareAcceptLanguages uses the return value from snprintf without checking this. It looks like in practice this code can't overflow the buffer (and it comes from a user pref anyway (as opposed to content, which would be concerning), from what I can tell), but we should actually do the check and better future-proof this code.
Updated•8 years ago
|
status-firefox53:
--- → wontfix
status-firefox54:
--- → wontfix
status-firefox55:
--- → affected
status-firefox-esr45:
--- → wontfix
status-firefox-esr52:
--- → affected
tracking-firefox53:
--- → ?
tracking-firefox54:
--- → ?
tracking-firefox55:
--- → ?
tracking-firefox-esr52:
--- → ?
Updated•8 years ago
|
Version: unspecified → 45 Branch
Comment 1•8 years ago
|
||
Track 53-/54- as we've build 54 RC and there is not security level here. Feel free to nominate again if the security level is critical/high.
This is a sec-low that doesn't need to be tracked for 55. In 55, we are already tracking several sec-high/sec-crits. If there is a fix ready for this one and deemed low risk, please nominate for uplift to Beta.
Comment 4•8 years ago
|
||
Potential sec bug that I don't want to backlog just that. PrepareAcceptLanguages is a candidate to rewrite with Tokenizer and an encapsulated string buffer (ns*CString), tho.
Whiteboard: [necko-next]
Updated•8 years ago
|
Updated•8 years ago
|
Priority: -- → P2
Whiteboard: [necko-next] → [necko-triaged]
Updated•6 years ago
|
Comment 5•5 years ago
|
||
This was fixed in bug 1403802 by rewriting the method in rust.
Status: NEW → RESOLVED
Closed: 5 years ago
Resolution: --- → DUPLICATE
Updated•2 years ago
|
Group: network-core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•