Closed
Bug 1041862
Opened 10 years ago
Closed 3 years ago
Re-Audit IPDL protocols
Categories
(Core :: IPC, defect, P3)
Tracking
()
RESOLVED
FIXED
People
(Reporter: pauljt, Unassigned)
References
(Blocks 1 open bug)
Details
(Keywords: sec-audit)
Attachments
(1 file)
(deleted),
application/x-gzip
|
Details |
With Seccomp & e10s approaching, its probably worth revisiting previous IPDL audits. My team will look at this, but happy for any input from other teams. (we may need inputs for platforms other than b2g)
The main goal of this will be to examine the attack surface in once sandboxing mechanisms are implemented.
Attached is an initial dump of all ipdl endpoints generated by jhector:
see here for details: https://github.com/jhector/gecko-dev/blob/master/run-genipdl.sh
Comment 1•10 years ago
|
||
(In reply to Paul Theriault [:pauljt] from comment #0)
> Attached is an initial dump of all ipdl endpoints generated by jhector:
> see here for details:
> https://github.com/jhector/gecko-dev/blob/master/run-genipdl.sh
has moved to: https://github.com/jhector/gecko-dev/blob/ipdl_visitor/run-genipdl.sh
Reporter | ||
Updated•8 years ago
|
Blocks: sandbox-sa
Updated•8 years ago
|
Depends on: CVE-2017-5456
Updated•7 years ago
|
Depends on: CVE-2019-9802
Updated•7 years ago
|
Priority: P1 → P3
Updated•3 years ago
|
Status: NEW → RESOLVED
Closed: 3 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•