gecko-dev/security/sandbox
Jed Davis c5a7acdf32 Bug 1439057 - Tighten /dev/shm access in Linux content sandbox policy. r=froydnj,gcp
This patch uses the shared memory name prefixes introduced in bug 1447867
to prevent access to /dev/shm files of other applications or other
processes within the same browser instance.

When a shared memory implementation that doesn't use shm_open is available
(specifically, the memfd_create support to be added in bug 1440203),
/dev/shm access is completely denied.

MozReview-Commit-ID: L2ylG5KrXTU

--HG--
extra : rebase_source : ca1deece6117e843d691a13fff05bd0f97ec0408
2018-04-12 23:48:16 -06:00
..
chromium Bug 1449480: Don't crash in opt builds when scoped_handle.cc CloseHandleWrapper fails. r=jimm 2018-03-28 16:07:15 +01:00
chromium-shim Bug 1445167 Part 2: Make LOG_FATAL messages in chromium sandbox code crash. r=jld 2018-03-20 10:45:31 +00:00
common Bug 1444291 - Part 3 - Add read access to the Mac Flash sandbox, support sandbox levels r=Alex_Gaynor 2018-03-15 20:23:19 -07:00
linux Bug 1439057 - Tighten /dev/shm access in Linux content sandbox policy. r=froydnj,gcp 2018-04-12 23:48:16 -06:00
mac Backed out 4 changesets (bug 525063) on request from Andi. a=backout 2018-04-13 16:01:28 +03:00
test Bug 1436575 - Manually fix the errors from no-compare-against-boolean-literal that the autofix couldn't change. r=standard8 2018-02-08 13:35:53 -05:00
win Bug 1453929: Enable handle verifier on 32-bit EARLY_BETA_OR_EARLIER. r=jimm 2018-04-14 20:24:07 +01:00
moz.build Bug 1432381: Replace sidestep resolvers with stubs as they are not actually used. r=aklotz 2018-02-06 08:52:26 +00:00