Closed
Bug 443059
Opened 17 years ago
Closed 17 years ago
Figure out how to deal with overflowing reference counts.
Categories
(Core :: XPCOM, defect)
Core
XPCOM
Tracking
()
RESOLVED
DUPLICATE
of bug 337421
People
(Reporter: jst, Unassigned)
Details
(Whiteboard: [sg:dupe 337421])
Bug 440230 fixed a couple of 16-bit reference counts that were possibly exploitable, this is a followup to that bug to figure out what to do in the much less likely case where a 32-bit reference count overflows. On 32-bit systems that requires a leak, on 64-bit systems it's possible to overflow w/o a leak (though not really trivially). So here we should figure out if and how to deal with the remaining parts...
Updated•17 years ago
|
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → DUPLICATE
Updated•17 years ago
|
Whiteboard: [sg:dupe 337421]
Updated•13 years ago
|
Group: core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•