Open Bug 1446549 Opened 6 years ago Updated 2 years ago

nsIMIMEService implementations are not compatible with content sandboxing

Categories

(Core :: Security: Process Sandboxing, defect, P2)

61 Branch
defect

Tracking

()

Tracking Status
firefox61 --- affected

People

(Reporter: haik, Assigned: haik)

References

Details

The nsIMIMEService implementations rely on getting information about installed applications and that is problematic when used from content processes. On Mac, the system libraries that are used to lookup the application used for MIME types depend on being able to read from /Applications which is blocked in content processes. This is a problem on Linux too. See Mac bug 1437281 and bug 1391186 and Linux bug 1382323 for examples. There are still some call sites that do MIME lookups in content. We should refactor our code so that content processes don't do MIME lookups OR, if they need to, we should remote the API's.
See Also: → 1437281
For reference, bug 1434392 was indirectly caused by this — it was a regression caused by bug 1412464 which was a sandboxing workaround for the MIME service.
Priority: -- → P3
Priority: P3 → P2
See Also: → 1452278
Blocks: 1332190

Bug 1452278 remoted some of these problematic calls on macOS and went into Firefox 68. The plan with 1452278 was to enable it for all platforms after some soak time. This can be tested on other platforms by changing nsExternalHelperAppService::GetSingleton() to use nsOSHelperAppServiceChild for child processes like it does for Mac.

Assignee: nobody → haftandilian
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.