Open Bug 614351 Opened 14 years ago Updated 2 years ago

deny JS-ctypes access to addon (e10s) child processes

Categories

(Core :: XPCOM, defect)

defect

Tracking

()

Tracking Status
e10s later ---

People

(Reporter: warner, Unassigned)

Details

bsmedberg mentioned a while back that they were adding JS-ctypes access to E10S child processes. To help maintain confinement of Jetpack addons (specifically the code that runs outside of the main browser process), we'd like to turn this off. In particular, when the main process launches a new jetpack process, we'd like a flag that lets us disable js-ctypes in the child.

The goal is this: if sandboxing fails in the child process, such that it starts executing hostile javascript without confinement, we'd like to limit the damage that the evil code can do. Without js-ctypes, it is limited to sending messages to the parent process (so the damage is limited to whatever the parent is willing to do in response to those messages). If the child *does* have js-ctypes access, then it has compromised the entire user account.

I'm not sure what Product/Component this should be attached to, but I'll start with jetpack and hope that someone who knows more than me can assign it appropriately.
Component: General → XPCOM
Product: Add-on SDK → Core
QA Contact: general → xpcom
Target Milestone: -- → ---
Version: unspecified → Trunk
For reference, bug 588563 is where ctypes were exposed to the jetpack process. Setting product/component to match.
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.