Closed Bug 455257 Opened 16 years ago Closed 7 years ago

Distinguish "random address" crashes based on page location and permissions

Categories

(Socorro :: Backend, task)

task
Not set
normal

Tracking

(Not tracked)

RESOLVED WONTFIX

People

(Reporter: jruderman, Unassigned)

References

()

Details

(Keywords: sec-want, Whiteboard: [sg:want P4])

Now that Firefox has a JIT, not all crashes with a "random address" at the top of the stack are likely to be security holes. The following information would make it easier to tell which ones are likely to be security holes: * page "location" (e.g. stack, malloc, mmap, not mapped at all) * page permissions (e.g. RX, RW) JITted code is in mmap memory and has RX permissions when it runs. See also bug 411349.
Whiteboard: [sg:want P4]
We'll have to find out if we have enough info in the minidump to give you this, or if we need to add features to breakpad to make this work.
The minidump module struct doesn't have this info: http://code.google.com/p/google-breakpad/source/browse/trunk/src/google_breakpad/common/minidump_format.h#358 We'd have to collect some extra info client-side to provide this.
Component: Socorro → Breakpad Integration
Product: Webtools → Toolkit
QA Contact: socorro → breakpad.integration
We could do this on crashes from Windows 7 systems now since we fixed bug 620974. Also, exposing additional information from minidump_stackwalk in general will be easier once we've fixed bug 573100 (it's planned for Socorro 1.7.8).
Component: Breakpad Integration → Backend
Product: Toolkit → Socorro
still desired or wontfix?
Flags: needinfo?(ted)
This is probably useful, but I'm pretty sure the exploitability analysis takes this into consideration as well, so there might not be additional value beyond just looking at the existing `exploitable` classification.
Flags: needinfo?(ted)
Thanks! When we have clear scope and value, we can reopen or file new.
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.