Closed Bug 1671166 Opened 5 years ago Closed 4 years ago

Perform IPC based Principal vetting for ContentParent::Recv(Principal)

Categories

(Core :: DOM: Security, task, P3)

task

Tracking

()

RESOLVED FIXED
86 Branch
Tracking Status
firefox86 --- fixed

People

(Reporter: ckerschb, Assigned: ckerschb)

References

(Depends on 1 open bug, Blocks 1 open bug)

Details

(Whiteboard: [domsecurity-active])

Attachments

(1 file, 1 obsolete file)

For grating notifications we should perform a check whether the principal matches the processId the site was assigned to before returning true.

Severity: -- → S4
Priority: -- → P3
Summary: Perform IPC based Principal vetting for ContentParent::HasNotificationPermission(IPC::Principal) → Perform IPC based Principal vetting for ContentParent::Recv(Principal)
Attachment #9186039 - Attachment description: Bug 1671166: Validate received Principal in ContentParent matches RemoteTypePrincipal. → Bug 1671166: Validate received Principal in ContentParent
Attachment #9188680 - Attachment is obsolete: true
Depends on: 1680768
Depends on: 1681504
Depends on: 1681510
Depends on: 1686003
Depends on: 1686200
Pushed by apavel@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/4161bcfbf75f Validate received Principal in ContentParent r=nika

Thanks, I'll have a look.

Flags: needinfo?(ckerschb)
Depends on: 1686679
Pushed by rmaries@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/1b95fe6d0d4c Validate received Principal in ContentParent r=nika
Status: ASSIGNED → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → 86 Branch
Depends on: 1687890
Depends on: 1687891
Depends on: 1688815
Blocks: 1696391
Blocks: 1699389
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: