Closed
Bug 927687
(CVE-2013-5607)
Opened 11 years ago
Closed 11 years ago
Avoid unsigned integer wrapping in PL_ArenaAllocate
Categories
(NSPR :: NSPR, defect, P2)
NSPR
NSPR
Tracking
(firefox25 fixed, firefox26+ verified, firefox27+ verified, firefox28+ verified, firefox-esr17- wontfix, firefox-esr2425+ verified, b2g18 fixed, b2g-v1.1hd fixed, b2g-v1.2 fixed, b2g-v1.3 fixed)
People
(Reporter: wtc, Assigned: wtc)
References
Details
(Keywords: sec-moderate)
Attachments
(1 file, 1 obsolete file)
(deleted),
patch
|
rrelyea
:
review+
praghunath
:
approval-mozilla-b2g18+
wtc
:
checked-in+
|
Details | Diff | Splinter Review |
The attached patch for PL_ArenaAllocate ensures that the sums of unsigned integers
don't wrap.
Note that a->base, a->avail, and a->limit are of the PRUword type, an unsigned
integer type large enough to hold a pointer. The patch relies on the invariant
that a->base <= a->limit and a->avail <= a->limit.
Attachment #818175 -
Flags: review?(rrelyea)
Comment 2•11 years ago
|
||
Friendly nudge for Rob's review.
Assignee | ||
Comment 3•11 years ago
|
||
I found that the first two changes in my patch were proposed by
Kamil Dudka (or Pascal Cuoq?) in bug 770534 one year ago.
This patch now contains only the third change.
Attachment #818175 -
Attachment is obsolete: true
Attachment #818175 -
Flags: review?(rrelyea)
Attachment #823689 -
Flags: review?(rrelyea)
Comment 4•11 years ago
|
||
Comment on attachment 823689 [details] [diff] [review]
Patch v2
r+ rrelyea
Attachment #823689 -
Flags: review?(rrelyea) → review+
Assignee | ||
Comment 5•11 years ago
|
||
Comment on attachment 823689 [details] [diff] [review]
Patch v2
Patch checked in: https://hg.mozilla.org/projects/nspr/rev/4df6bc35be64
Attachment #823689 -
Flags: checked-in+
Assignee | ||
Updated•11 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Updated•11 years ago
|
status-b2g18:
--- → affected
status-b2g-v1.1hd:
--- → affected
status-b2g-v1.2:
--- → affected
status-firefox25:
--- → wontfix
status-firefox26:
--- → affected
status-firefox27:
--- → affected
status-firefox28:
--- → affected
status-firefox-esr17:
--- → affected
status-firefox-esr24:
--- → affected
tracking-b2g18:
--- → ?
tracking-firefox26:
--- → +
tracking-firefox27:
--- → +
tracking-firefox28:
--- → +
tracking-firefox-esr17:
--- → ?
tracking-firefox-esr24:
--- → ?
Keywords: sec-critical → sec-high
Comment 6•11 years ago
|
||
Do we need a separate bug here for updating NSPR in m-c, aurora, and beta?
Flags: needinfo?(wtc)
Assignee | ||
Comment 7•11 years ago
|
||
If there is no risk of confusion, we can just use this bug for updating NSPR
in m-c, aurora, and beta.
Flags: needinfo?(wtc)
Comment 8•11 years ago
|
||
(In reply to Wan-Teh Chang from comment #7)
> If there is no risk of confusion, we can just use this bug for updating NSPR
> in m-c, aurora, and beta.
Can you prepare that patch or do we need someone else to?
Flags: needinfo?(wtc)
Comment 9•11 years ago
|
||
Also, minusing and wontfixing for esr17 since that will be EOL on the next release date.
Updated•11 years ago
|
Keywords: sec-high → sec-moderate
Assignee | ||
Comment 10•11 years ago
|
||
(In reply to lsblakk@mozilla.com [:lsblakk] from comment #8)
Kai Engert or I will take care of updating NSPR.
Flags: needinfo?(wtc)
Comment 11•11 years ago
|
||
I guess this needs a separate CVE because technically NSPR is a separate library even though we ship it along with NSS. CVE-2013-5607
Alias: CVE-2013-5607
Comment 12•11 years ago
|
||
I think bug 935568 has fixed this by updating NSPR - is that correct? Anything else need doing here?
Flags: needinfo?(wtc)
Comment 13•11 years ago
|
||
Matt - this is another one, do you mind tying up the loose ends here before we ship? A bunch of bugs were fixed by the respin of 25.0 and esr - is this one of them?
Flags: needinfo?(mwobensmith)
Comment 14•11 years ago
|
||
I assume that this was updated because of bug 935568. Others can feel free to weigh in, but this tells me that the bug has been verified.
Flags: needinfo?(mwobensmith)
Updated•11 years ago
|
Updated•11 years ago
|
Flags: needinfo?(wtc)
Updated•11 years ago
|
Updated•11 years ago
|
status-b2g-v1.3:
--- → fixed
Updated•11 years ago
|
Group: crypto-core-security → core-security
Comment 15•11 years ago
|
||
b2g18 (v1.1) is currently on NSPR 4.9.5. The Mercurial history doesn't go back to the 4.9.x days, but AFAICT, this is the only security bug fixed since then? If so, is it worth taking an update to 4.10.2 just for this?
Flags: needinfo?(wtc)
Assignee | ||
Comment 16•11 years ago
|
||
Summary: I recommend taking an update to NSPR 4.10.2, but there is a
complication with the client.py script. Also, it is more important to
update to NSS_3_14_5_RTM.
Ryan: I checked the NSPR 4.9.6, 4.10, 4.10.1, and 4.10.2 release notes.
You are right, only NSPR 4.10.2 has security bug fixes (bug 770534 is
the other one).
In general NSPR updates have a low risk and should be uneventful.
But in NSPR 4.10 the master source repository changed from CVS to
Mercurial. So the Python script we use to import an NSPR tag also needs
to be updated. This is step 2 in
https://developer.mozilla.org/en-US/docs/Updating_NSPR_or_NSS_in_mozilla-central
It seems that the update to client.py isn't too complated:
http://hg.mozilla.org/mozilla-central/rev/b20eab2be2dc
You don't need to commit the update to client.py because it will
also change where NSS is pulled from. NSS_3_14_5_RTM is still in CVS.
Flags: needinfo?(wtc)
Comment 17•11 years ago
|
||
FWIW, NSS is in the process of being updated to 3.14.5 in bug 898431. My understanding is that dkeeler has a patch in progress pending testing. If you feel that updating NSPR to version 4.10.2 is worth doing, can you please attach a patch to bug 935568 and request approval-mozilla-b2g18 on it? Thanks :)
Comment 18•11 years ago
|
||
Comment on attachment 823689 [details] [diff] [review]
Patch v2
[Triage Comment]: Taking in 18 for sec-moderate
Attachment #823689 -
Flags: approval-mozilla-b2g18+
Updated•11 years ago
|
Updated•10 years ago
|
Group: core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•