Closed
Bug 1477253
Opened 7 years ago
Closed 7 years ago
AV1 decoder is turned on by default !
Categories
(Core :: Audio/Video: Playback, defect, P1)
Core
Audio/Video: Playback
Tracking
()
RESOLVED
FIXED
mozilla63
Tracking | Status | |
---|---|---|
firefox-esr52 | --- | unaffected |
firefox-esr60 | --- | unaffected |
firefox61 | --- | disabled |
firefox62 | --- | disabled |
firefox63 | --- | fixed |
People
(Reporter: jya, Assigned: drno)
References
Details
(Keywords: regression, sec-high, Whiteboard: [post-critsmash-triage])
Attachments
(1 file)
741 bytes,
patch
|
jya
:
review+
dveditz
:
sec-approval+
|
Details | Diff | Splinter Review |
This is a regression from bug 1448222
https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.h#867
That's pretty bad...
AV1 is turned on by default, including in 61 which is rather ancient code.
Assignee | ||
Comment 1•7 years ago
|
||
Given that any code before the landing of the AV1 release in 63 is based on code from last September which has a lot of known sec issues I'm setting sec-high.
Keywords: sec-high
Assignee | ||
Comment 2•7 years ago
|
||
It looks like the MOZ_AV1 define around the AV1 prevented this from going to this all way into Release with 61 (I just tested it with 61 and 62).
status-firefox61:
--- → unaffected
status-firefox62:
--- → unaffected
status-firefox63:
--- → affected
Assignee | ||
Updated•7 years ago
|
Assignee: nobody → drno
Rank: 5
Priority: -- → P1
Assignee | ||
Comment 3•7 years ago
|
||
Updated•7 years ago
|
Reporter | ||
Comment 4•7 years ago
|
||
do we need security approval for this?
Reporter | ||
Comment 5•7 years ago
|
||
Comment on attachment 8993684 [details] [diff] [review]
Turn off AV1 by default
[Security approval request comment]
How easily could an exploit be constructed based on the patch? need to hack around AV1, something we had enabled for over almost a year
Do comments in the patch, the check-in comment, or tests included in the patch paint a bulls-eye on the security problem? hard to say...
Which older supported branches are affected by this flaw? all nightly since 61
If not all supported branches, which bug introduced the flaw? 1448222
Do you have backports for the affected branches? If not, how different, hard to create, and risky will they be? no need
How likely is this patch to cause regressions; how much testing does it need? none
Attachment #8993684 -
Flags: sec-approval?
Attachment #8993684 -
Flags: review+
Reporter | ||
Comment 6•7 years ago
|
||
ok, so as per https://wiki.mozilla.org/Security/Bug_Approval_Process
we fit under the:
A specific regressing check-in has been identified
The developer can (and has) marked the status flags for ESR, Beta, and Aurora as "unaffected"
We have not shipped this vulnerability in anything other than a nightly build
so we can land...
Reporter | ||
Updated•7 years ago
|
Attachment #8993684 -
Flags: sec-approval?
Comment 7•7 years ago
|
||
Comment on attachment 8993684 [details] [diff] [review]
Turn off AV1 by default
Not needed as you noted, but sec-approval=dveditz anyway since my query already picked this up
Attachment #8993684 -
Flags: sec-approval+
![]() |
||
Comment 8•7 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/da3f76df8820bd2144d34c8c8cc98ae6d73a1664
https://hg.mozilla.org/mozilla-central/rev/da3f76df8820
Group: media-core-security → core-security-release
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla63
![]() |
||
Comment 9•7 years ago
|
||
Apologies for the error :(
I just went back and double-checked all the pref values in bug 1448222's patch. As well as media.av1.enabled being incorrectly changed from false to true, I found one other error, involving media.memory_caches_combined_limit_kb:
- Before the patch it was always 524288.
- After the patch it is 524288, except on Android where it is 32768.
(I think this error must have occurred because the nearby media.cache_size pref had a value of 32768 on Android both before and after the patch.)
drno, should the value of media.memory_caches_combined_limit_kb be changed to 524288 on Android? If so, I'm happy to do that in a separate bug. (I would have asked jya, but he's on PTO.)
Flags: needinfo?(drno)
Updated•7 years ago
|
Flags: qe-verify-
Whiteboard: [post-critsmash-triage]
Assignee | ||
Comment 10•7 years ago
|
||
(In reply to Nicholas Nethercote [:njn] from comment #9)
> drno, should the value of media.memory_caches_combined_limit_kb be changed
> to 524288 on Android? If so, I'm happy to do that in a separate bug. (I
> would have asked jya, but he's on PTO.)
Thanks for double checking. Yes sounds like a good idea to restore the original value on that one as well in a new bug.
Flags: needinfo?(drno)
![]() |
||
Comment 11•7 years ago
|
||
I filed bug 1479631 to fix media.memory_caches_combined_limit_kb.
Updated•6 years ago
|
Group: core-security-release
You need to log in
before you can comment on or make changes to this bug.
Description
•