Closed
Bug 1144398
Opened 11 years ago
Closed 11 years ago
URL with embedded null: crash [@ _platform_strncmp | nsStandardURL::SegmentIs | nsStandardURL::EqualsInternal]
Categories
(Core :: Networking, defect)
Tracking
()
RESOLVED
FIXED
mozilla39
Tracking | Status | |
---|---|---|
firefox37 | --- | unaffected |
firefox38 | + | fixed |
firefox39 | + | fixed |
firefox-esr31 | --- | unaffected |
b2g-v1.4 | --- | unaffected |
b2g-v2.0 | --- | unaffected |
b2g-v2.0M | --- | unaffected |
b2g-v2.1 | --- | unaffected |
b2g-v2.1S | --- | unaffected |
b2g-v2.2 | --- | unaffected |
b2g-master | --- | fixed |
People
(Reporter: jruderman, Assigned: valentin)
References
Details
(Keywords: crash, sec-high, testcase)
Crash Data
Attachments
(4 files, 1 obsolete file)
253 bytes,
text/html
|
Details | |
8.33 KB,
text/plain
|
Details | |
8.03 KB,
text/plain
|
Details | |
3.83 KB,
patch
|
mcmanus
:
review+
abillings
:
approval-mozilla-aurora+
abillings
:
sec-approval+
|
Details | Diff | Splinter Review |
No description provided.
Reporter | ||
Comment 1•11 years ago
|
||
Reporter | ||
Comment 2•11 years ago
|
||
Reporter | ||
Comment 3•11 years ago
|
||
First stack:
* Crash on load
* Frame #10 is mozilla::places::History::RegisterVisitedCallback
Second stack:
* Crash on unload
* Frame #5 is mozilla::places::History::UnregisterVisitedCallback
Assignee | ||
Comment 4•11 years ago
|
||
Attachment #8579391 -
Flags: review?(mcmanus)
Assignee | ||
Updated•11 years ago
|
Assignee: nobody → valentin.gosu
Status: NEW → ASSIGNED
Assignee | ||
Comment 7•11 years ago
|
||
Attachment #8579434 -
Flags: review?(mcmanus)
Assignee | ||
Comment 8•11 years ago
|
||
Comment on attachment 8579391 [details] [diff] [review]
Restrict charcters which are allowed in the URL hash (ref)
I removed the percent decoding bit, because of a web-platform regression:
https://treeherder.mozilla.org/#/jobs?repo=try&revision=f8605f9110db
Attachment #8579391 -
Attachment is obsolete: true
Attachment #8579391 -
Flags: review?(mcmanus)
Comment 9•11 years ago
|
||
Comment on attachment 8579434 [details] [diff] [review]
Restrict charcters which are allowed in the URL hash (ref)
Review of attachment 8579434 [details] [diff] [review]:
-----------------------------------------------------------------
this adds another linear scan of the whole url.. but valentin convinced me its the only way to do it safely without massively ripping things up and the url parser engages in far too many copies and scans already so this change doesn't significantly change the complexity of a url parse.
since a stale version of this has already gone to try once, please send it again and get a green run before committing.
Attachment #8579434 -
Flags: review?(mcmanus) → review+
Assignee | ||
Comment 10•11 years ago
|
||
Keywords: checkin-needed
Comment 11•11 years ago
|
||
Needs sec-approval.
https://wiki.mozilla.org/Security/Bug_Approval_Process
Keywords: checkin-needed
Assignee | ||
Comment 12•11 years ago
|
||
Comment on attachment 8579434 [details] [diff] [review]
Restrict charcters which are allowed in the URL hash (ref)
[Security approval request comment]
How easily could an exploit be constructed based on the patch?
- Easily.
Do comments in the patch, the check-in comment, or tests included in the patch paint a bulls-eye on the security problem?
- Yes, it is fairly obvious what the patch does. It restricts several characters from appearing in the ref part of the URL.
Which older supported branches are affected by this flaw?
- Nightly and Aurora
If not all supported branches, which bug introduced the flaw?
- Introduced by bug 1093611.
Do you have backports for the affected branches? If not, how different, hard to create, and risky will they be?
- This patch should be easy to apply on all affected branches (nightly + aurora)
How likely is this patch to cause regressions; how much testing does it need?
- Unlikely. It introduces an extra check which should have been there from the beginning.
Attachment #8579434 -
Flags: sec-approval?
Comment 13•11 years ago
|
||
Comment on attachment 8579434 [details] [diff] [review]
Restrict charcters which are allowed in the URL hash (ref)
sec-approval+ for trunk.
Let's get a patch nominated for aurora as well.
Attachment #8579434 -
Flags: sec-approval? → sec-approval+
Updated•11 years ago
|
status-firefox37:
--- → unaffected
status-firefox38:
--- → affected
status-firefox39:
--- → affected
status-firefox-esr31:
--- → unaffected
tracking-firefox38:
--- → +
tracking-firefox39:
--- → +
Assignee | ||
Updated•11 years ago
|
Keywords: checkin-needed
Comment 14•11 years ago
|
||
Flags: in-testsuite?
Keywords: checkin-needed
Assignee | ||
Comment 15•11 years ago
|
||
Comment on attachment 8579434 [details] [diff] [review]
Restrict charcters which are allowed in the URL hash (ref)
Approval Request Comment
[Feature/regressing bug #]:
Introduced by bug 1093611.
[User impact if declined]:
Possible security concerns.
[Describe test coverage new/current, TreeHerder]:
Green on try. Pushed to m-c. Manual testing.
[Risks and why]:
Low risk patch. It introduces a check for invalid characters.
The extra check may pose a performance issue, but it is negligible for the average case (we already do many scans of the URL spec).
[String/UUID change made/needed]:
None.
Attachment #8579434 -
Flags: approval-mozilla-aurora?
Updated•11 years ago
|
Attachment #8579434 -
Flags: approval-mozilla-aurora? → approval-mozilla-aurora+
Comment 16•11 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 11 years ago
status-b2g-v1.4:
--- → unaffected
status-b2g-v2.0:
--- → unaffected
status-b2g-v2.0M:
--- → unaffected
status-b2g-v2.1:
--- → unaffected
status-b2g-v2.1S:
--- → unaffected
status-b2g-v2.2:
--- → unaffected
status-b2g-master:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla39
Comment 17•11 years ago
|
||
Updated•10 years ago
|
Group: core-security → core-security-release
Updated•9 years ago
|
Group: core-security-release
You need to log in
before you can comment on or make changes to this bug.
Description
•