Intelligently handle file: origins w.r.t. Spectre
Categories
(Core :: Security, task)
Tracking
()
People
(Reporter: tjr, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: [spectre-blocker][sp3])
As described on github and especially in chromium's bugtracker - if an attacker is running a script in a file:// origin, it can use <img> (but not fetch) to get local files in-memory, including things like the cookie jar. Before we disable Spectre mitigations we should ensure we have some mitigations in place for this.
Chrome seems to be headed down a path that does both Site Isolation for file:// origins and some form of CORB for cross-directory requests.
In the shorter term, we could also just not disable Spectre mitigations for file:// origins (and only web origins).
Comment 1•4 years ago
|
||
How does this relate to JavaScript JITs? Did you meant to set a different component?
| Reporter | ||
Comment 2•4 years ago
|
||
Preset when filing.
| Reporter | ||
Comment 3•4 years ago
|
||
We discussed this and consider it a blocker for disabling Spectre mitigations.
file:// origins are pretty icky for a lot of reasons, so not disabling spectre mitigations feels like a reasonable goal in the short/medium term.
Updated•4 years ago
|
Updated•4 years ago
|
Updated•2 years ago
|
Updated•2 years ago
|
Description
•