Closed
Bug 995071
Opened 10 years ago
Closed 9 years ago
Remote PR_OpenFile for sandboxing
Categories
(Core :: Security: Process Sandboxing, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 965724
People
(Reporter: arroway, Unassigned)
References
Details
When opening the camera app without any memory card or typing a number in the dialer, the PR_OpenFile function in nsprpub/pr/src/pthreads/ptio.c is calling open: osfd = _md_iovector._open64(name, osflags, mode); On a keon, it tries to open: /data/local/tmp/mozilla-temp-153210048 705 /data/local/tmp/mozilla-temp-153210048 2 (pathname, flags)
Comment 1•9 years ago
|
||
I'll try to reproduce this and get more information the next time I un-bit-rot my patches for bug 930258 — PR_OpenFile is a generic utility function, so we need to find out what's opening these temporary files and why, in order to make this an actionable bug.
Flags: needinfo?(jld)
Comment 2•9 years ago
|
||
Move process sandboxing bugs to their new, separate component. (Sorry for the bugspam; filter on 3c21328c-8cfb-4819-9d88-f6e965067350.)
Component: Security → Security: Process Sandboxing
Comment 3•9 years ago
|
||
Can't reproduce, but given the filenames and the STR I'm pretty sure I know what this was and when it was fixed.
Status: NEW → RESOLVED
Closed: 9 years ago
Flags: needinfo?(jld)
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•