gecko-dev/mozglue/dllservices
Toshihito Kikuchi e83bcb5130 Bug 1630281 - Cache the executable's IAT for ntdll.dll before COM initialization. r=mhowell
When the browser process starts a sandbox process, we copy the executable's IAT
for ntdll.dll into the new process to prevent DLL injection via IAT tampering as
the launcher process does.  However, if IAT has been modified by a module injected
via `SetWindowHookEx`, the browser process cannot copy IAT because a modified IAT
is invalid in a different process, failing to start any sandbox processes.

The proposed fix is to cache IAT before COM initialization which may load
modules via `SetWindowHookEx` for the first time in the process.

Differential Revision: https://phabricator.services.mozilla.com/D73303
2020-04-30 18:26:18 +00:00
..
Authenticode.cpp Bug 1625138 - Part 41: Remove no longer needed includes for mozilla/TypeTraits. r=froydnj 2020-03-28 16:00:09 +00:00
Authenticode.h Bug 1592120: Add flag to Authenticode::GetBinaryOrgName to skip trust verification and use it in untrusted modules processing; r=mhowell 2019-10-28 21:58:49 +00:00
LoaderAPIInterfaces.h Bug 1630281 - Cache the executable's IAT for ntdll.dll before COM initialization. r=mhowell 2020-04-30 18:26:18 +00:00
LoaderObserver.cpp Bug 1605248: Convert LoaderObserver::Clear to LoaderObserver::Disable; r=mhowell 2019-12-19 22:20:37 +00:00
LoaderObserver.h Bug 1605248: Convert LoaderObserver::Clear to LoaderObserver::Disable; r=mhowell 2019-12-19 22:20:37 +00:00
ModuleLoadFrame.cpp Bug 1610790: Part 2 - Implement GetProcAddress for a remote process. r=handyman 2020-02-11 22:21:10 +02:00
ModuleLoadFrame.h Bug 1522830: Part 6 - Add API to be able to initialize launcher dll blocklist during spawning of child process; r=mhowell 2019-12-06 22:03:45 +00:00
ModuleLoadInfo.h Bug 1610702 - Generalize Vector::podResizeToFit into Vector::shrinkStorageToFit(). r=froydnj 2020-02-03 17:32:12 +00:00
NtLoaderAPI.h Bug 1542830: Part 4 - Modify mozglue to use new untrusted modules interfaces; r=mhowell 2019-09-23 20:18:41 +00:00
WindowsDllBlocklist.cpp Bug 1628628 - RedirectToNoOpEntryPoint is expected to block a module with ASAN. r=mhowell 2020-04-10 23:44:17 +00:00
WindowsDllBlocklist.h Bug 1522830: Part 2 - Make launcher blocklist work in child processes; r=mhowell 2019-12-06 22:00:18 +00:00
WindowsDllBlocklistCommon.h Bug 1603974 - Part 7: Introduce a new blocklist type RedirectToNoOpEntryPoint. r=mhowell 2020-04-08 14:27:03 +00:00
WindowsDllBlocklistDefs.in Bug 1581092 - Prevent the Hancom Office shell extension from crashing Firefox r=tkikuchi 2020-04-28 14:35:57 +00:00
WindowsDllServices.h Bug 1620594 - Part 2: Use SchedulerGroup::Dispatch instead of SystemGroup::Dispatch. r=nika 2020-04-07 15:16:33 +00:00
WindowsFallbackLoaderAPI.cpp Bug 1522830: Part 6 - Add API to be able to initialize launcher dll blocklist during spawning of child process; r=mhowell 2019-12-06 22:03:45 +00:00
WindowsFallbackLoaderAPI.h Bug 1522830: Part 6 - Add API to be able to initialize launcher dll blocklist during spawning of child process; r=mhowell 2019-12-06 22:03:45 +00:00
gen_dll_blocklist_defs.py Bug 1603974 - Part 7: Introduce a new blocklist type RedirectToNoOpEntryPoint. r=mhowell 2020-04-08 14:27:03 +00:00
moz.build Bug 1620744 - Convert gen_dll_blocklist_defs.py to py3; r=firefox-build-system-reviewers,rstewart 2020-03-10 20:19:29 +00:00