Security/Sandbox/2016-05-26

From MozillaWiki
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

« previous week | index | next week »

bobowen

  • Filed bug 1274952 - Move process sandboxing defines into browser/
  • bug 1270447 - Printing via parent fails when using pref print.always_print_silent=true - reviewed
  • bug 1274937 - Add outer window ID to nsFrameLoader::Print to allow printing of frames - reviewed
  • bug 1275194 - Crash in nsPrintData::DoOnStatusChange - landed
  • bug 1250125 - Make a 0 security.sandbox.content.level turn off the content process sandbox to allow Beta testing - landed
  • bug 1252877 - Add support for taking plugin window captures at the start of a scroll - started looking at this
  • bug 1271890 - Crash in base::win::PEImage::GetProcAddress - not got much further with this, wonder about loading plugin-container.exe permanently
  • bug 1275813 - Crash in base::win::PEImage::GetProcOrdinal - looks like this might be down to third party security product
  • bug 1272704 - NSPR logging appears to be broken on Windows from Content processes - considering just removing the code that disallows forward slash in nsLocalFileWin.cpp

haik

tedd

  • bug 1274553 - file broker stat() problem in permissive mode - caused the file broker issues that I encountered - landed
  • bug 1259508 - sys_clone violation related to audio - landed
  • bug 1274873 - gmain signal blocking issue on systems with no TSYNC - patches submitted, review requested
  • bug 1275781 - seccomp violation: sys_accept - encountered during tests on try - patch pending
  • bug 1275785 - seccomp violation: sys_bind - encountered during tests on try - patch pending
  • bug 1275786 - seccomp violation: sys_listen - encountered during tests on try - patch pending
  • bug 1275920 - seccomp violation: sys_rt_tgsigqueueinfo - encountered during tests on try - unclear how to solve this yet (pretty dangerous system call)

aklotz

  • No sandboxing work this week

roundtable

  • bug 1274706 - Reduce message size for PExternalHelperAppChild::SendOnDataAvailable
  • bug 1270018 - bsmedberg is suggesting the "move sandboxed temp dir creation and destruction into directory service provider" route