Closed Bug 1934258 Opened 3 months ago Closed 3 months ago

Crash in [@ mozilla::ipc::IProtocol::FatalError | mozilla::dom::PContentParent::DeallocManagee] with Qihoo 360

Categories

(External Software Affecting Firefox :: Other, defect)

Unspecified
Windows 11
defect

Tracking

(firefox-esr128133+ fixed)

RESOLVED FIXED
128 Branch
Tracking Status
firefox-esr128 133+ fixed

People

(Reporter: dmeehan, Assigned: gstoll)

Details

(Keywords: crash)

Crash Data

Attachments

(1 file)

Crash report: https://crash-stats.mozilla.org/report/index/396d6f9b-589f-451c-a68f-e9ec90241129

Reason:

EXCEPTION_ACCESS_VIOLATION_READ

Top 10 frames:

0  xul.dll  mozilla::ipc::IProtocol::FatalError(char const* const)  ipc/glue/ProtocolUtils.cpp:394
0  xul.dll  mozilla::dom::PContentParent::DeallocManagee(int, mozilla::ipc::IProtocol*)  ipc/ipdl/PContentParent.cpp:6357
1  xul.dll  PLDHashTable::ComputeKeyHash(void const*) const  xpcom/ds/PLDHashTable.cpp:479
1  xul.dll  PLDHashTable::Search(void const*) const  xpcom/ds/PLDHashTable.cpp:499
2  chromesafe64.dll  chromesafe64.dll@0x20ae6
3  ntdll.dll  RtlSetLastWin32Error
4  ?  @0x00000156baef0b0f
5  xul.dll  _tailMerge_hid.dll
6  chromesafe64.dll  chromesafe64.dll@0x22bb0
7  chromesafe64.dll  chromesafe64.dll@0x2ae03

:jld could this be triaged? Not sure what introduced this in 128.5esr

Flags: needinfo?(jld)

Changing components because all crash reports have chromesafe64.dll from Beijing Qihu Technology Co., Ltd. in stack.

Component: IPC → Other
Flags: needinfo?(jld) → needinfo?(gstoll)
Product: Core → External Software Affecting Firefox
Assignee: nobody → gstoll
Status: NEW → ASSIGNED
Flags: needinfo?(gstoll)
Summary: Crash in [@ mozilla::ipc::IProtocol::FatalError | mozilla::dom::PContentParent::DeallocManagee] → Crash in [@ mozilla::ipc::IProtocol::FatalError | mozilla::dom::PContentParent::DeallocManagee] with Qihoo 360

Windows DLLBlocklist request form

  1. How were we aware of the problem?
    Topcrasher in ESR (but seemingly no crashes in release/beta/nightly)

  2. What is a suspicious product causing the problem?
    Qihoo 360 Total Security by Beijing Qihu Technology Co., Ltd.

  3. Is the product downloadable? If so, do we have a local repro?
    No, as far as I can tell.

  4. Which OS versions does the problem occur on?
    Windows 10 and 11.

  5. Which process types does the problem occur on?
    Just the browser process.

  6. What is the maximum version of the module in the crash reports?
    According to telemetry the maximum version that crashes is 2.0.0.26.

  7. Is the issue fixed by a newer version of the product?
    It looks like there are newer versions being used in ESR that do not crash, so possibly.

  8. Do we have data about the module in the third-party-module ping?
    Yes

  9. Do we know how the module is loaded?
    Looks safe to block.

  10. Describe your conclusion.
    We should block chromesafe64.dll versions 2.0.0.26 and earlier in the browser process in ESR only.

Attachment #9443009 - Flags: approval-mozilla-esr128?
Attachment #9443009 - Flags: approval-mozilla-esr128? → approval-mozilla-esr128+

Merged in esr128 and an esr128.5 branch

Status: ASSIGNED → RESOLVED
Closed: 3 months ago
Resolution: --- → FIXED
Target Milestone: --- → 128 Branch
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: