Closed Bug 918680 (fix-ipc-sandbox) Opened 11 years ago Closed 6 years ago

Tighten content processes sandbox by securing use of IPC (or use IPC for resource access when not used)

Categories

(Firefox OS Graveyard :: General, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED WONTFIX

People

(Reporter: kang, Unassigned)

References

(Depends on 1 open bug, Blocks 1 open bug)

Details

(Keywords: meta, sec-want)

This bug tracks all bugs which intent to tighten the sandbox whitelist by:

- Implementing an IPC call for resource access when this is not already done, but should (and currently result in a system call being whitelisted in the sandbox so that the resource can be directly accessed, such as open() for files)

- Ensuring that when IPC is used, proper resource access control occur in the parent process, and that the content processes only get the data they really need to get

- Ensuring that any input (over IPC) from content process to the parent process is never trusted by the parent
Keywords: sec-want
We have important bugs blocked on this. Is this going to be addressed soon?
(In reply to Al Billings [:abillings] from comment #1)
> We have important bugs blocked on this. Is this going to be addressed soon?

I'm a little confused by the question — this is a tracking bug for a large set of ongoing work, covering the gradual process of improving IPC security.
Keywords: meta
Depends on: 927633
No longer depends on: 922775
Well, we have security issues that it blocks that are not actively being worked on because it was expected that IPC security would be improved. Since some of these issues have been open for many releases, I'm trying to find out when this work will happen.
Depends on: 931086
Depends on: 951405
Moving to sandbox-sa in case any of this is still relevant.
Blocks: sandbox-sa
No longer blocks: b2gSystemSecurity
Firefox OS is not being worked on
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.