Security/Sandbox/2015-10-08

< Security‎ | Sandbox
Revision as of 15:53, 12 November 2015 by Bobowen (talk | contribs) (Created page with "<!-- Maybe don't screw with these links unless you've read this blog post: http://blog.johnath.com/2011/01/20/automatic-date-links-in-mediawiki/ Just copy them to new pages an...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

« previous week | index | next week »

2015-10-08

Windows

  • Content Sandboxing
    • bug 1207972 - Move to using USER_INTERACTIVE and JOB_INTERACTIVE - landed.
    • bug 1156742 - print to xps with low integrity sandbox - work modifying Moz2D recording to work standalone, pretty much done. Now working on utilising it for printing. Hope to have something working by early next week.
    • bug 1173371 - Sandbox prevents Firefox from working from a network drive on Windows - needs an update to the chromium code, which we can take in isolation. Then need to translate our policy paths to the standard ones that chromium uses for comparison.
  • GMP Sandboxing
    • bug 1197007 - [EME] Sandbox prevents eme-adobe.dll loading on Win10 when Firefox profile on FAT-formatted SD card - Adobe have removed the side by side assembly manifest from their latest CDM and this has fixed the problem. It also means we can go back to using USER_LOCKDOWN, so I’ll look to land that next week.


Linux/B2G

  • Content Sandboxing
    • bug 930258 landed on inbound. (B2G emulator only… for now.)

Cross Platform

  • WebRTC/OpenH264 Sandboxing
    • bug 1209987 Fixing thread correctness issues in the Sandboxing code. Proper spinup/shutdown is hard.