Closed
Bug 938341
(CVE-2013-5616)
Opened 11 years ago
Closed 11 years ago
heap-use-after-free in libxul.so!nsEventListenerManager::HandleEventSubType
Categories
(Core :: DOM: UI Events & Focus Handling, defect)
Tracking
()
RESOLVED
FIXED
mozilla28
People
(Reporter: truber, Assigned: MatsPalmgren_bugz)
References
Details
(6 keywords, Whiteboard: [asan][adv-main26+][adv-esr24.2+])
Attachments
(5 files, 2 obsolete files)
205 bytes,
text/html
|
Details | |
38.12 KB,
text/html
|
Details | |
1.08 KB,
patch
|
Details | Diff | Splinter Review | |
4.88 KB,
patch
|
MatsPalmgren_bugz
:
review+
abillings
:
approval-mozilla-aurora+
abillings
:
approval-mozilla-beta+
abillings
:
approval-mozilla-esr24+
abillings
:
sec-approval+
|
Details | Diff | Splinter Review |
2.81 KB,
patch
|
Details | Diff | Splinter Review |
Found by the BlackBerry Security Automated Analysis Team's fuzzing framework ALF. ==24554==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c000255a58 at pc 0x7fb832e41778 bp 0x7fff0b8b91f0 sp 0x7fff0b8b91e8 READ of size 8 at 0x60c000255a58 thread T0 #0 0x7fb832e41777 (libxul.so!nsEventListenerManager::HandleEventSubType(nsListenerStruct*, mozilla::dom::CallbackObjectHolder<mozilla::dom::EventListener, nsIDOMEventListener> const&, nsIDOMEvent*, mozilla::dom::EventTarget*, nsCxPusher*)+0x367) Line 268 of "../../../dist/include/mozilla/dom/CallbackObject.h" #1 0x7fb832e42516 (libxul.so!nsEventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent**, mozilla::dom::EventTarget*, nsEventStatus*, nsCxPusher*)+0xa36) Line 1038 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventListenerManager.cpp" #2 0x7fb832e33303 (libxul.so!nsEventTargetChainItem::HandleEvent(nsEventChainPostVisitor&, ELMCreationDetector&, nsCxPusher*)+0x4d3) Line 325 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventListenerManager.h" #3 0x7fb832e325a9 (libxul.so!nsEventTargetChainItem::HandleEventTargetChain(nsTArray<nsEventTargetChainItem>&, nsEventChainPostVisitor&, nsDispatchingCallback*, ELMCreationDetector&, nsCxPusher*)+0x829) Line 313 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventDispatcher.cpp" #4 0x7fb832e36274 (libxul.so!nsEventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent*, nsEventStatus*, nsDispatchingCallback*, nsCOMArray<mozilla::dom::EventTarget>*)+0x2974) Line 605 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventDispatcher.cpp" #5 0x7fb833009c78 (libxul.so!nsGenericHTMLElement::Click()+0x718) Line 2738 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/html/content/src/nsGenericHTMLElement.cpp" #6 0x7fb83558dd50 (libxul.so!mozilla::dom::HTMLElementBinding::click(JSContext*, JS::Handle<JSObject*>, nsGenericHTMLElement*, JSJitMethodCallArgs const&)+0x30) Line 582 of "./HTMLElementBinding.cpp" #7 0x7fb83558d5da (libxul.so!mozilla::dom::HTMLElementBinding::genericMethod(JSContext*, unsigned int, JS::Value*)+0x68a) Line 4767 of "./HTMLElementBinding.cpp" #8 0x7fb837c257c7 (libxul.so!js::Invoke(JSContext*, JS::CallArgs, js::MaybeConstruct)+0x5f7) Line 220 of "/builds/slave/m-in-l64-asan-0000000000000000/build/js/src/jscntxtinlines.h" #9 0x7fb837c1a70b (libxul.so!Interpret(JSContext*, js::RunState&)+0x18c9b) Line 2502 of "/builds/slave/m-in-l64-asan-0000000000000000/build/js/src/vm/Interpreter.cpp" #10 0x7fb837c01993 (libxul.so!js::RunScript(JSContext*, js::RunState&)+0x3f3) Line 420 of "/builds/slave/m-in-l64-asan-0000000000000000/build/js/src/vm/Interpreter.cpp" #11 0x7fb837c25a03 (libxul.so!js::Invoke(JSContext*, JS::CallArgs, js::MaybeConstruct)+0x833) Line 482 of "/builds/slave/m-in-l64-asan-0000000000000000/build/js/src/vm/Interpreter.cpp" #12 0x7fb837c26778 (libxul.so!js::Invoke(JSContext*, JS::Value const&, JS::Value const&, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>)+0x568) Line 513 of "/builds/slave/m-in-l64-asan-0000000000000000/build/js/src/vm/Interpreter.cpp" #13 0x7fb83792bbd7 (libxul.so!JS_CallFunctionValue(JSContext*, JSObject*, JS::Value, unsigned int, JS::Value*, JS::Value*)+0x117) Line 4920 of "/builds/slave/m-in-l64-asan-0000000000000000/build/js/src/jsapi.cpp" #14 0x7fb83537f02f (libxul.so!mozilla::dom::EventHandlerNonNull::Call(JSContext*, JS::Handle<JSObject*>, nsDOMEvent&, mozilla::ErrorResult&)+0x23f) Line 36 of "./EventHandlerBinding.cpp" #15 0x7fb83365bc53 (libxul.so!nsJSEventListener::HandleEvent(nsIDOMEvent*)+0xab3) Line 58 of "../../../dist/include/mozilla/dom/EventHandlerBinding.h" #16 0x7fb832e41622 (libxul.so!nsEventListenerManager::HandleEventSubType(nsListenerStruct*, mozilla::dom::CallbackObjectHolder<mozilla::dom::EventListener, nsIDOMEventListener> const&, nsIDOMEvent*, mozilla::dom::EventTarget*, nsCxPusher*)+0x212) Line 960 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventListenerManager.cpp" #17 0x7fb832e42516 (libxul.so!nsEventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent**, mozilla::dom::EventTarget*, nsEventStatus*, nsCxPusher*)+0xa36) Line 1038 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventListenerManager.cpp" #18 0x7fb832e33303 (libxul.so!nsEventTargetChainItem::HandleEvent(nsEventChainPostVisitor&, ELMCreationDetector&, nsCxPusher*)+0x4d3) Line 325 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventListenerManager.h" #19 0x7fb832e321de (libxul.so!nsEventTargetChainItem::HandleEventTargetChain(nsTArray<nsEventTargetChainItem>&, nsEventChainPostVisitor&, nsDispatchingCallback*, ELMCreationDetector&, nsCxPusher*)+0x45e) Line 292 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventDispatcher.cpp" #20 0x7fb832e36274 (libxul.so!nsEventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, nsIDOMEvent*, nsEventStatus*, nsDispatchingCallback*, nsCOMArray<mozilla::dom::EventTarget>*)+0x2974) Line 605 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/events/src/nsEventDispatcher.cpp" #21 0x7fb8322c410b (libxul.so!nsDocumentViewer::LoadComplete(tag_nsresult)+0x91b) Line 997 of "/builds/slave/m-in-l64-asan-0000000000000000/build/layout/base/nsDocumentViewer.cpp" #22 0x7fb83644079a (libxul.so!nsDocShell::EndPageLoad(nsIWebProgress*, nsIChannel*, tag_nsresult)+0x5ca) Line 6776 of "/builds/slave/m-in-l64-asan-0000000000000000/build/docshell/base/nsDocShell.cpp" #23 0x7fb83643da29 (libxul.so!nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, tag_nsresult)+0x1499) Line 6573 of "/builds/slave/m-in-l64-asan-0000000000000000/build/docshell/base/nsDocShell.cpp" #24 0x7fb83643df6c (libxul.so!non-virtual thunk to nsDocShell::OnStateChange(nsIWebProgress*, nsIRequest*, unsigned int, tag_nsresult)+0xc) Line 6579 of "/builds/slave/m-in-l64-asan-0000000000000000/build/docshell/base/nsDocShell.cpp" #25 0x7fb836490fbf (libxul.so!nsDocLoader::DoFireOnStateChange(nsIWebProgress*, nsIRequest*, int&, tag_nsresult)+0x47f) Line 1331 of "/builds/slave/m-in-l64-asan-0000000000000000/build/uriloader/base/nsDocLoader.cpp" #26 0x7fb836490313 (libxul.so!nsDocLoader::doStopDocumentLoad(nsIRequest*, tag_nsresult)+0x263) Line 865 of "/builds/slave/m-in-l64-asan-0000000000000000/build/uriloader/base/nsDocLoader.cpp" #27 0x7fb83648dfaf (libxul.so!nsDocLoader::DocLoaderIsEmpty(bool)+0x7ef) Line 755 of "/builds/slave/m-in-l64-asan-0000000000000000/build/uriloader/base/nsDocLoader.cpp" #28 0x7fb83648f528 (libxul.so!nsDocLoader::OnStopRequest(nsIRequest*, nsISupports*, tag_nsresult)+0x5b8) Line 639 of "/builds/slave/m-in-l64-asan-0000000000000000/build/uriloader/base/nsDocLoader.cpp" #29 0x7fb83648fdc9 (libxul.so!non-virtual thunk to nsDocLoader::OnStopRequest(nsIRequest*, nsISupports*, tag_nsresult)+0x9) Line 642 of "/builds/slave/m-in-l64-asan-0000000000000000/build/uriloader/base/nsDocLoader.cpp" #30 0x7fb831a22d79 (libxul.so!nsLoadGroup::RemoveRequest(nsIRequest*, nsISupports*, tag_nsresult)+0x799) Line 688 of "/builds/slave/m-in-l64-asan-0000000000000000/build/netwerk/base/src/nsLoadGroup.cpp" #31 0x7fb832b1c8b6 (libxul.so!nsDocument::DoUnblockOnload()+0x226) Line 7988 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/base/src/nsDocument.cpp" #32 0x7fb832b1c56b (libxul.so!nsDocument::UnblockOnload(bool)+0x55b) Line 7916 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/base/src/nsDocument.cpp" #33 0x7fb832afb232 (libxul.so!nsDocument::DispatchContentLoadedEvents()+0xb02) Line 4702 of "/builds/slave/m-in-l64-asan-0000000000000000/build/content/base/src/nsDocument.cpp" #34 0x7fb832b3fa0c (libxul.so!nsRunnableMethodImpl<void (nsDocument::*)(), void, true>::Run()+0x6c) Line 382 of "../../../dist/include/nsThreadUtils.h" #35 0x7fb835f7cba9 (libxul.so!nsThread::ProcessNextEvent(bool, bool*)+0xaa9) Line 622 of "/builds/slave/m-in-l64-asan-0000000000000000/build/xpcom/threads/nsThread.cpp" #36 0x7fb835ea8cd1 (libxul.so!NS_ProcessNextEvent(nsIThread*, bool)+0xb1) Line 251 of "/builds/slave/m-in-l64-asan-0000000000000000/build/xpcom/glue/nsThreadUtils.cpp" #37 0x7fb834a162d1 (libxul.so!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*)+0x311) Line 85 of "/builds/slave/m-in-l64-asan-0000000000000000/build/ipc/glue/MessagePump.cpp" #38 0x7fb836084b53 (libxul.so!MessageLoop::Run()+0x1c3) Line 220 of "/builds/slave/m-in-l64-asan-0000000000000000/build/ipc/chromium/src/base/message_loop.cc" #39 0x7fb8347eea4c (libxul.so!nsBaseAppShell::Run()+0x5c) Line 161 of "/builds/slave/m-in-l64-asan-0000000000000000/build/widget/xpwidgets/nsBaseAppShell.cpp" #40 0x7fb8341f5a0e (libxul.so!nsAppStartup::Run()+0xbe) Line 267 of "/builds/slave/m-in-l64-asan-0000000000000000/build/toolkit/components/startup/nsAppStartup.cpp" #41 0x7fb83174e655 (libxul.so!XREMain::XRE_mainRun()+0x1e05) Line 3976 of "/builds/slave/m-in-l64-asan-0000000000000000/build/toolkit/xre/nsAppRunner.cpp" #42 0x7fb83174f58a (libxul.so!XREMain::XRE_main(int, char**, nsXREAppData const*)+0x4fa) Line 4044 of "/builds/slave/m-in-l64-asan-0000000000000000/build/toolkit/xre/nsAppRunner.cpp" #43 0x7fb8317504bb (libxul.so!XRE_main+0x3ab) Line 4246 of "/builds/slave/m-in-l64-asan-0000000000000000/build/toolkit/xre/nsAppRunner.cpp" #44 0x459dcd (firefox!main+0x94d) Line 275 of "/builds/slave/m-in-l64-asan-0000000000000000/build/browser/app/nsBrowserApp.cpp" #45 0x7fb840e9776c (libc.so.6!__libc_start_main+0xec) Line 226 of "libc-start.c" #46 0x45934c (firefox!_start+0x28) 0x60c000255a58 is located 88 bytes inside of 128-byte region [0x60c000255a00,0x60c000255a80) freed by thread T0 here: #0 0x44653b (firefox!realloc+0x5b) Line 95 of "/builds/slave/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc" #1 0x7fb83e04e65e (libmozalloc.so!moz_xrealloc+0xe) Line 84 of "/builds/slave/m-in-l64-asan-0000000000000000/build/memory/mozalloc/mozalloc.cpp" previously allocated by thread T0 here: #0 0x446395 (firefox!malloc+0x55) Line 74 of "/builds/slave/moz-toolchain/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc" #1 0x7fb83e04e5c8 (libmozalloc.so!moz_xmalloc+0x8) Line 52 of "/builds/slave/m-in-l64-asan-0000000000000000/build/memory/mozalloc/mozalloc.cpp" Shadow bytes around the buggy address: 0x0c1880042af0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c1880042b00: fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa fa 0x0c1880042b10: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1880042b20: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1880042b30: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa =>0x0c1880042b40: fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd 0x0c1880042b50: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c1880042b60: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c1880042b70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1880042b80: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1880042b90: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 ASan internal: fe ==24554==ABORTING
Comment 1•11 years ago
|
||
<applet contenteditable="true">. I can reproduce a crash with Java in click-to-play mode. Jesse, do you know if Java was installed/enabled on the machine which experienced this error? Nightly crash report: https://crash-stats.mozilla.com/report/index/85a797dc-99dd-49aa-a455-c33622131113
Assignee | ||
Comment 2•11 years ago
|
||
Also crashes a non-Asan debug build on Linux64 (without Java installed).
Severity: normal → critical
Component: General → Event Handling
Product: Firefox → Core
Whiteboard: [asan]
Reporter | ||
Comment 3•11 years ago
|
||
(In reply to Benjamin Smedberg [:bsmedberg] from comment #1) > Jesse, do you know if Java was installed/enabled on the > machine which experienced this error? > Java was not installed. The machine was Ubuntu server 12.04.3 with minimum deps for Xvfb and Firefox
Updated•11 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Assignee | ||
Comment 4•11 years ago
|
||
We're removing event listeners from the mListeners array of the ELM in frame #30, deallocating memory for the items. Not a problem per se, since we anticipated this and made a 'kungFuDeathGrip' for the one we're using. The problem is the second param to HandleEventSubType is *by reference* and we pass 'ls->mListener' so this is a pointer into the memory we're currently deallocating ('ls'). http://hg.mozilla.org/mozilla-central/annotate/7b014f0f3b03/content/events/src/nsEventListenerManager.cpp#l1039 We should just pass in 'kungFuDeathGrip' instead. Note that 'ls' suffers the same problem but it's only used before calling HandleEvent. We should null it out and make a comment about it though to avoid future mistakes. http://hg.mozilla.org/mozilla-central/annotate/7b014f0f3b03/content/events/src/nsEventListenerManager.cpp#l932
Assignee: nobody → matspal
Assignee | ||
Comment 5•11 years ago
|
||
This is a better stack showing when the actual corruption occurs.
Attachment #832028 -
Attachment is obsolete: true
Assignee | ||
Comment 6•11 years ago
|
||
Attachment #832499 -
Flags: review?(bugs)
Assignee | ||
Comment 7•11 years ago
|
||
Comment 8•11 years ago
|
||
Comment on attachment 832499 [details] [diff] [review] fix >- EventListenerHolder kungFuDeathGrip(ls->mListener); >- if (NS_FAILED(HandleEventSubType(ls, ls->mListener, *aDOMEvent, >- aCurrentTarget, aPusher))) { >+ // NOTE: HandleEventSubType may run script and destroy the world, >+ // e.g. 'ls' or anything else in mListeners. >+ if (NS_FAILED(HandleEventSubType(ls, *aDOMEvent, aCurrentTarget, >+ aPusher))) { I wouldn't add the comment >+++ b/content/events/src/nsEventListenerManager.h >@@ -411,18 +411,20 @@ public: > protected: > void HandleEventInternal(nsPresContext* aPresContext, > mozilla::WidgetEvent* aEvent, > nsIDOMEvent** aDOMEvent, > mozilla::dom::EventTarget* aCurrentTarget, > nsEventStatus* aEventStatus, > nsCxPusher* aPusher); > >+ /** >+ * @note calling this might run script that destroys the world >+ */ > nsresult HandleEventSubType(nsListenerStruct* aListenerStruct, this is rather obvious, since event listener is usually a script. So perhaps no worth to add the comment.
Attachment #832499 -
Flags: review?(bugs) → review+
Updated•11 years ago
|
status-b2g18:
--- → unaffected
status-b2g-v1.2:
--- → unaffected
status-firefox26:
--- → affected
status-firefox27:
--- → affected
status-firefox28:
--- → affected
status-firefox-esr24:
--- → affected
tracking-firefox26:
--- → ?
tracking-firefox27:
--- → +
tracking-firefox28:
--- → +
Flags: sec-bounty?
Assignee | ||
Comment 9•11 years ago
|
||
(In reply to Olli Pettay [:smaug] from comment #8) > I wouldn't add the comment OK, I'm splitting out the code comments into a separate patch for later landing when the bug is public. > this is rather obvious, since event listener is usually a script. So perhaps > no worth to add the comment. OK, removed this comment altogether.
Attachment #832499 -
Attachment is obsolete: true
Attachment #832554 -
Flags: review+
Assignee | ||
Comment 10•11 years ago
|
||
Assignee | ||
Comment 11•11 years ago
|
||
It seems b2g18 might also be affected; we're passing 'ls->mListener' by reference here: https://hg.mozilla.org/releases/mozilla-b2g18/file/3d28e6cbacce/content/events/src/nsEventListenerManager.cpp#l961 and then using it, after CompileEventHandlerInternal, on line 889: https://hg.mozilla.org/releases/mozilla-b2g18/file/3d28e6cbacce/content/events/src/nsEventListenerManager.cpp#l866
Assignee | ||
Comment 12•11 years ago
|
||
Nope, sorry, it's not by reference but the actual pointer value, so it should be independent of 'ls'.
Assignee | ||
Comment 13•11 years ago
|
||
Comment on attachment 832554 [details] [diff] [review] fix (without code comments) [Security approval request comment] How easily could an exploit be constructed based on the patch? Seems hard to me. Do comments in the patch, the check-in comment, or tests included in the patch paint a bulls-eye on the security problem? No comments, no tests. Which older supported branches are affected by this flaw? All except b2g18* If not all supported branches, which bug introduced the flaw? Don't know, I'll check and add a dependency. Do you have backports for the affected branches? If not, how different, hard to create, and risky will they be? I expect the same patch will apply. How likely is this patch to cause regressions; how much testing does it need? Very unlikely to cause regressions. No special testing needed.
Attachment #832554 -
Flags: sec-approval?
Assignee | ||
Comment 14•11 years ago
|
||
Looking at "hg blame" I'm guessing this cset is the culprit (landed in mozilla23): http://hg.mozilla.org/mozilla-central/rev/55cad36868d8
Comment 15•11 years ago
|
||
Yes, definitely. Sorry about that. :(
Updated•11 years ago
|
Comment 16•11 years ago
|
||
Comment on attachment 832554 [details] [diff] [review] fix (without code comments) sec-approval+ for trunk. Please either prepare appropriate patches or just nominate this for Aurora, Beta, and ESR24.
Attachment #832554 -
Flags: sec-approval? → sec-approval+
Assignee | ||
Comment 17•11 years ago
|
||
Comment on attachment 832554 [details] [diff] [review] fix (without code comments) [Approval Request Comment] Bug caused by (feature/regressing bug #): bug 835643 User impact if declined: sec-critical crash Testing completed (on m-c, etc.): not landed yet Risk to taking this patch (and alternatives if risky): low risk String or IDL/UUID changes made by this patch: none
Attachment #832554 -
Flags: approval-mozilla-esr24?
Attachment #832554 -
Flags: approval-mozilla-beta?
Attachment #832554 -
Flags: approval-mozilla-b2g26?
Attachment #832554 -
Flags: approval-mozilla-aurora?
Updated•11 years ago
|
Attachment #832554 -
Flags: approval-mozilla-beta?
Attachment #832554 -
Flags: approval-mozilla-beta+
Attachment #832554 -
Flags: approval-mozilla-aurora?
Attachment #832554 -
Flags: approval-mozilla-aurora+
Assignee | ||
Comment 18•11 years ago
|
||
https://hg.mozilla.org/integration/mozilla-inbound/rev/44fe639256f8
Comment 19•11 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/44fe639256f8
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla28
Comment 20•11 years ago
|
||
https://hg.mozilla.org/releases/mozilla-aurora/rev/0395ab4e357b https://hg.mozilla.org/releases/mozilla-beta/rev/55acf28131b7
Updated•11 years ago
|
Flags: sec-bounty? → sec-bounty+
Comment 22•11 years ago
|
||
https://hg.mozilla.org/releases/mozilla-b2g26_v1_2/rev/55acf28131b7 Al, can you approve this for esr24?
Flags: needinfo?(abillings)
Updated•11 years ago
|
Attachment #832554 -
Flags: approval-mozilla-esr24? → approval-mozilla-esr24+
Updated•11 years ago
|
Flags: needinfo?(abillings)
Assignee | ||
Comment 24•11 years ago
|
||
Restoring flags. (hmm, why doesn't history say anything about how they got to "affected" again?)
Comment 25•11 years ago
|
||
Confirmed crash on FF28 2013-11-13. Verified fixed on ASan builds of FF24esr, FF26, FF27 and FF28, 2013-11-20.
Updated•11 years ago
|
Whiteboard: [asan] → [asan][adv-main26+][adv-esr24.2+]
Updated•11 years ago
|
Alias: CVE-2013-5616
Updated•11 years ago
|
Attachment #832554 -
Flags: approval-mozilla-b2g26?
Updated•11 years ago
|
Updated•9 years ago
|
Group: core-security
Comment 28•9 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/eb01c6ccd716
Assignee | ||
Updated•9 years ago
|
Flags: in-testsuite? → in-testsuite+
Updated•8 years ago
|
Keywords: csectype-uaf
Updated•5 years ago
|
Component: Event Handling → User events and focus handling
You need to log in
before you can comment on or make changes to this bug.
Description
•