Closed Bug 443059 Opened 17 years ago Closed 17 years ago

Figure out how to deal with overflowing reference counts.

Categories

(Core :: XPCOM, defect)

defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 337421

People

(Reporter: jst, Unassigned)

Details

(Whiteboard: [sg:dupe 337421])

Bug 440230 fixed a couple of 16-bit reference counts that were possibly exploitable, this is a followup to that bug to figure out what to do in the much less likely case where a 32-bit reference count overflows. On 32-bit systems that requires a leak, on 64-bit systems it's possible to overflow w/o a leak (though not really trivially). So here we should figure out if and how to deal with the remaining parts...
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → DUPLICATE
Whiteboard: [sg:dupe 337421]
Group: core-security
You need to log in before you can comment on or make changes to this bug.