Closed
Bug 1443498
Opened 7 years ago
Closed 7 years ago
AddressSanitizer: heap-buffer-overflow toolkit/components/resistfingerprinting/nsRFPService.cpp:416:41 in mozilla::nsRFPService::RandomMidpoint(long long, long long, long long*, unsigned char*)
Categories
(Core :: DOM: Events, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 1442984
| Tracking | Status | |
|---|---|---|
| firefox60 | --- | affected |
People
(Reporter: bc, Unassigned)
References
()
Details
Attachments
(1 file)
|
23.74 KB,
text/plain
|
Details |
1. https://www.bing.com/images/search?q=Rotfuchs%2C%2BTier&qpvt=Rotfuchs%2C%2BTier&FORM=IARRSM
I can not reproduce this locally but I have another url which I can reproduce but which contains PII which I can not post here.
opt/debug asan builds.
2. ==20236==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060002d6af4 at pc 0x7f8af22b8d0f bp 0x7ffca593aaf0 sp 0x7ffca593aae8
READ of size 4 at 0x6060002d6af4 thread T0 (Web Content)
JavaScript error: chrome://browser/content/browser.js, line 6777: TypeError: cannot use the given object as a weak map key
#0 0x7f8af22b8d0e in mozilla::nsRFPService::RandomMidpoint(long long, long long, long long*, unsigned char*) /builds/worker/workspace/build/src/toolkit/components/resistfingerprinting/nsRFPService.cpp:416:41
#1 0x7f8af22b9dba in mozilla::nsRFPService::ReduceTimePrecisionImpl(double, mozilla::nsRFPService::TimeScale, double, mozilla::TimerPrecisionType) /builds/worker/workspace/build/src/toolkit/components/resistfingerprinting/nsRFPService.cpp:489:9
Updated•7 years ago
|
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → DUPLICATE
Updated•4 years ago
|
Group: core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•