Closed Bug 995071 Opened 10 years ago Closed 9 years ago

Remote PR_OpenFile for sandboxing

Categories

(Core :: Security: Process Sandboxing, defect)

x86_64
Linux
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 965724

People

(Reporter: arroway, Unassigned)

References

Details

When opening the camera app without any memory card or typing a number in the dialer, the PR_OpenFile function in nsprpub/pr/src/pthreads/ptio.c is calling open:

osfd = _md_iovector._open64(name, osflags, mode);


On a keon, it tries to open: 
/data/local/tmp/mozilla-temp-153210048 705
/data/local/tmp/mozilla-temp-153210048 2
(pathname, flags)
I'll try to reproduce this and get more information the next time I un-bit-rot my patches for bug 930258 — PR_OpenFile is a generic utility function, so we need to find out what's opening these temporary files and why, in order to make this an actionable bug.
Flags: needinfo?(jld)
Move process sandboxing bugs to their new, separate component.

(Sorry for the bugspam; filter on 3c21328c-8cfb-4819-9d88-f6e965067350.)
Component: Security → Security: Process Sandboxing
Can't reproduce, but given the filenames and the STR I'm pretty sure I know what this was and when it was fixed.
Status: NEW → RESOLVED
Closed: 9 years ago
Flags: needinfo?(jld)
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.