IPC: wild-ptr crash PNecko::Msg_PredPredict [@mozilla::net::NeckoParent::RecvPredPredict]
Categories
(Core :: Networking, defect, P1)
Tracking
()
People
(Reporter: posidron, Assigned: valentin)
References
(Blocks 1 open bug)
Details
(Keywords: crash, csectype-bounds, sec-moderate, Whiteboard: [necko-triaged][post-cristsmash-triage][adv-main65+][adv-esr60.5+])
Attachments
(3 files)
3.45 KB,
text/plain
|
Details | |
45.53 KB,
text/plain
|
Details | |
47 bytes,
text/x-phabricator-request
|
RyanVM
:
approval-mozilla-beta+
RyanVM
:
approval-mozilla-esr60+
|
Details | Review |
Reporter | ||
Updated•6 years ago
|
Reporter | ||
Comment 1•6 years ago
|
||
Updated•6 years ago
|
Comment 2•6 years ago
|
||
Assignee | ||
Comment 3•6 years ago
|
||
Comment 4•6 years ago
|
||
Assignee | ||
Comment 5•6 years ago
|
||
Assignee | ||
Comment 6•6 years ago
|
||
Assignee | ||
Updated•6 years ago
|
Updated•6 years ago
|
Comment 7•6 years ago
|
||
https://hg.mozilla.org/integration/autoland/rev/16e495b2c1b5
If I'm following the blame correctly, this is from bug 1433609 and ESR60 is therefore not affected?
Assignee | ||
Comment 8•6 years ago
|
||
(In reply to Ryan VanderMeulen [:RyanVM] from comment #7)
https://hg.mozilla.org/integration/autoland/rev/16e495b2c1b5
If I'm following the blame correctly, this is from bug 1433609 and ESR60 is therefore not affected?
I'd say it's more of a follow-up to bug 1433609, which I think is in esr60 too. :)
I think it should apply cleanly, but let me know if doesn't.
Comment 9•6 years ago
|
||
Indeed, thanks!
Comment 10•6 years ago
|
||
Comment 11•6 years ago
|
||
Please nominate this for Beta/ESR60 approval when you get a chance.
Assignee | ||
Comment 12•6 years ago
|
||
Comment on attachment 9034792 [details]
Bug 1517542 - Fail URL deserialization if query or ref start at position 0 r=mayhemer!
[Beta/Release Uplift Approval Request]
Feature/Bug causing the regression: None
User impact if declined: Possible out-of-bounds memory access if the content process sends corrupted messages.
Is this code covered by automated tests?: Yes
Has the fix been verified in Nightly?: No
Needs manual test from QE?: No
If yes, steps to reproduce:
List of other uplifts needed: None
Risk to taking this patch: Low
Why is the change risky/not risky? (and alternatives if risky): Just adds a check to make sure we never dereference out of bounds indexes in the string.
String changes made/needed:
[ESR Uplift Approval Request]
If this is not a sec:{high,crit} bug, please state case for ESR consideration:
User impact if declined:
Fix Landed on Version: 66
Risk to taking this patch: Low
Why is the change risky/not risky? (and alternatives if risky): Just adds a check to make sure we never dereference out of bounds indexes in the string.
String or UUID changes made by this patch:
Comment 13•6 years ago
|
||
Comment on attachment 9034792 [details]
Bug 1517542 - Fail URL deserialization if query or ref start at position 0 r=mayhemer!
[Triage Comment]
Follow-up fix from previous work which fixes a possible out-of-bounds memory access if the content process sends corrupted messages. Approved for 65.0b10 and 60.5.0esr.
Comment 14•6 years ago
|
||
uplift |
Comment 15•6 years ago
|
||
uplift |
Updated•6 years ago
|
Updated•6 years ago
|
Updated•5 years ago
|
Description
•