Security/Sandbox/2016-05-26

From MozillaWiki
Jump to: navigation, search

« previous week | index | next week »

bobowen

  • Filed bug 1274952 - Move process sandboxing defines into browser/
  • bug 1270447 - Printing via parent fails when using pref print.always_print_silent=true - reviewed
  • bug 1274937 - Add outer window ID to nsFrameLoader::Print to allow printing of frames - reviewed
  • bug 1275194 - Crash in nsPrintData::DoOnStatusChange - landed
  • bug 1250125 - Make a 0 security.sandbox.content.level turn off the content process sandbox to allow Beta testing - landed
  • bug 1252877 - Add support for taking plugin window captures at the start of a scroll - started looking at this
  • bug 1271890 - Crash in base::win::PEImage::GetProcAddress - not got much further with this, wonder about loading plugin-container.exe permanently
  • bug 1275813 - Crash in base::win::PEImage::GetProcOrdinal - looks like this might be down to third party security product
  • bug 1272704 - NSPR logging appears to be broken on Windows from Content processes - considering just removing the code that disallows forward slash in nsLocalFileWin.cpp

haik

tedd

  • bug 1274553 - file broker stat() problem in permissive mode - caused the file broker issues that I encountered - landed
  • bug 1259508 - sys_clone violation related to audio - landed
  • bug 1274873 - gmain signal blocking issue on systems with no TSYNC - patches submitted, review requested
  • bug 1275781 - seccomp violation: sys_accept - encountered during tests on try - patch pending
  • bug 1275785 - seccomp violation: sys_bind - encountered during tests on try - patch pending
  • bug 1275786 - seccomp violation: sys_listen - encountered during tests on try - patch pending
  • bug 1275920 - seccomp violation: sys_rt_tgsigqueueinfo - encountered during tests on try - unclear how to solve this yet (pretty dangerous system call)

aklotz

  • No sandboxing work this week

roundtable

  • bug 1274706 - Reduce message size for PExternalHelperAppChild::SendOnDataAvailable
  • bug 1270018 - bsmedberg is suggesting the "move sandboxed temp dir creation and destruction into directory service provider" route