Closed
Bug 769265
(CVE-2012-3979)
Opened 13 years ago
Closed 13 years ago
Audit for incorrect uses of __android_log_print
Categories
(Core :: DOM: Core & HTML, defect)
Tracking
()
RESOLVED
FIXED
mozilla16
People
(Reporter: mrbkap, Assigned: mrbkap)
Details
(Keywords: sec-audit, sec-high, Whiteboard: [advisory-tracking+])
Attachments
(1 file)
2.72 KB,
patch
|
bent.mozilla
:
review+
lsblakk
:
approval-mozilla-aurora-
lsblakk
:
approval-mozilla-beta+
mrbkap
:
checkin+
|
Details | Diff | Splinter Review |
Debugging something today, I realized that we have a few places where we incorrectly call __android_log_print in potentially exploitable ways. The fix is easy and coming up.
Assignee | ||
Comment 1•13 years ago
|
||
Attachment #637506 -
Flags: review?(bent.mozilla)
Updated•13 years ago
|
Attachment #637506 -
Flags: review?(bent.mozilla) → review+
Assignee | ||
Comment 2•13 years ago
|
||
Assignee | ||
Updated•13 years ago
|
Attachment #637506 -
Flags: checkin+
Comment 3•13 years ago
|
||
Status: NEW → RESOLVED
Closed: 13 years ago
status-firefox16:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla16
Updated•13 years ago
|
status-firefox-esr10:
--- → unaffected
Updated•13 years ago
|
Comment 4•13 years ago
|
||
We should fix this in Firefox 15.
Comment 5•13 years ago
|
||
Please nominate for aurora uplift so we can look at getting this in before merge day on Monday July 16th.
Updated•13 years ago
|
Assignee | ||
Comment 6•13 years ago
|
||
Comment on attachment 637506 [details] [diff] [review]
Fix
[Approval Request Comment]
User impact if declined: Possible problems if people use dump in evil ways on Android.
Testing completed (on m-c, etc.): The patch has been in m-c for a while.
Risk to taking this patch (and alternatives if risky): Very low risk.
Attachment #637506 -
Flags: approval-mozilla-beta?
Attachment #637506 -
Flags: approval-mozilla-aurora?
Comment 7•13 years ago
|
||
Comment on attachment 637506 [details] [diff] [review]
Fix
This is already fixed in Aurora (16) so only approving for Beta (15)
Attachment #637506 -
Flags: approval-mozilla-beta?
Attachment #637506 -
Flags: approval-mozilla-beta+
Attachment #637506 -
Flags: approval-mozilla-aurora?
Attachment #637506 -
Flags: approval-mozilla-aurora-
Assignee | ||
Comment 8•13 years ago
|
||
Updated•13 years ago
|
Whiteboard: [advisory-tracking+]
Comment 9•13 years ago
|
||
Will this do anything bad if people aren't actively debugging android? I'm guessing that __android_log_print bails out if not actually being used before doing the dangerous printf family stuff, and if so that reduces the severity here to sec-moderate since you could only target a handful of people debugging while visiting attack sites.
Updated•12 years ago
|
Alias: CVE-2012-3979
Assignee | ||
Comment 10•12 years ago
|
||
As far as I know, __android_log_print always prints stuff to the logcat. However, I don't know if there's anything that controls whether or not that's on. dougt might know more.
Comment 11•12 years ago
|
||
The advisory here says that this can only be exploited through dump() which is disabled by default. If this is the case, then this isn't sec-high. Of course if there's another way to supply the string from content, then that rating is perfectly valid.
Comment 12•12 years ago
|
||
As far as I know none of the dump() implementations touched in attachment 637506 [details] [diff] [review] are exposed to content, except maybe the Worker* ones.
WorkerPrivate.cpp's implementation only uses it as a fallback if reporting to the console service fails, which shouldn't really ever happen in practice.
WorkerScope.cpp's implementation looks to not be pref-controlled, which means that workers calling dump() can spam stdout in release builds, which seems like a bug we should fix regardless of the security implementations.
Comment 13•12 years ago
|
||
I confirmed that it's exposed to content (using http://gavinsharp.com/tmp/worker.html) and filed bug 785656.
Updated•12 years ago
|
Group: core-security
Updated•6 years ago
|
Component: DOM → DOM: Core & HTML
You need to log in
before you can comment on or make changes to this bug.
Description
•