Treat xrm-ms files as executable (so we warn about them)
Categories
(Toolkit :: Downloads API, defect, P3)
Tracking
()
People
(Reporter: Gijs, Assigned: mak)
Details
(Keywords: sec-moderate, sec-vector, Whiteboard: [adv-main125+][adv-esr115.10+])
Attachments
(4 files)
48 bytes,
text/x-phabricator-request
|
Details | Review | |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-beta+
|
Details | Review |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-esr115+
|
Details | Review |
316 bytes,
text/plain
|
Details |
Reporter | ||
Updated•1 year ago
|
Assignee | ||
Comment 1•1 year ago
|
||
Assignee | ||
Comment 2•1 year ago
|
||
Daniel, I assume dependencies of a bug inherit its sec level, so this would also be sec-moderate. Though as I don't want to bend rules, I'm asking for confirmation.
Comment 3•1 year ago
|
||
Sometimes. we have to balance the fact that this is a separate bug in its own right with not wanting to double-count issues and getting teams in trouble for "having too many security bugs". In this case, sec-moderate seem good.
![]() |
||
Comment 5•1 year ago
|
||
Comment 6•1 year ago
•
|
||
:mak does this impact ESR115 wondering if we need an uplift there also?
Updated•1 year ago
|
Assignee | ||
Comment 8•1 year ago
|
||
Original Revision: https://phabricator.services.mozilla.com/D205067
Updated•1 year ago
|
Comment 9•1 year ago
|
||
Uplift Approval Request
- Explanation of risk level: Adding file extension to a list
- User impact if declined: sec-moderate risk on opening the file
- Is Android affected?: no
- Code covered by automated testing: yes
- Needs manual QE test: yes
- String changes made/needed: No
- Fix verified in Nightly: no
- Risk associated with taking this patch: Low
- Steps to reproduce for manual QE testing: Try downloading a file with one of these extensions. If you can't find one easily, rename one in a local file explorer and drag to the tabstrip. Expected behaviour is that once downloaded there's a prompt when trying to open it, rather than it immediately opening
Assignee | ||
Comment 10•1 year ago
|
||
Original Revision: https://phabricator.services.mozilla.com/D205067
Updated•1 year ago
|
Comment 11•1 year ago
|
||
Uplift Approval Request
- User impact if declined: sec-moderate risk on opening the file
- Is Android affected?: no
- Code covered by automated testing: yes
- Explanation of risk level: Adding file extension to a list
- Risk associated with taking this patch: Low
- Fix verified in Nightly: no
- Steps to reproduce for manual QE testing: yes
- Needs manual QE test: yes
- String changes made/needed: No
Assignee | ||
Updated•1 year ago
|
Updated•1 year ago
|
Updated•1 year ago
|
Updated•1 year ago
|
Updated•1 year ago
|
Comment 12•1 year ago
|
||
uplift |
Comment 13•1 year ago
|
||
uplift |
Updated•1 year ago
|
Updated•1 year ago
|
Comment 14•1 year ago
|
||
I've reproduced this issue on Win 11 x64 with an affected Nightly build, 2024-03-18. Thank you, Marco for providing the test file.
The issue is verified as fixed on Win 11 x64 using the latest builds, Nightly 126.0a1, Beta 125.0b4 and Esr 115.10.0.
Updated•1 year ago
|
Comment 15•1 year ago
|
||
Updated•1 year ago
|
Updated•1 year ago
|
Updated•11 months ago
|
Description
•