gecko-dev/security/sandbox
Toshihito Kikuchi 80dfd02627 Bug 1629361 - Disable the launcher process when a content process fails to start. r=mhowell
If a third-party application modifies IAT of ntdll.dll in the browser process
after process launch, the browser process fails to launch a sandbox process,
resulting in a situation where a window is opened without any functionality.

This patch is to mitigate that situation by disabling the launcher process
when the browser process fails to launch a sandbox process.

Differential Revision: https://phabricator.services.mozilla.com/D70873

--HG--
extra : moz-landing-system : lando
2020-04-14 16:14:22 +00:00
..
chromium Bug 1557282 Part 1: Take chromium commit c1ce57ea5d31208af589b4839390a44ab20b0c8f. r=handyman,gcp 2020-03-12 20:39:40 +00:00
chromium-shim Bug 1615401 - Part 2: Keep Chromium's file_version_info_win.cpp updated r=bobowen 2020-03-06 22:24:01 +02:00
common Bug 1613985 - Use default for equivalent-to-default constructors/destructors in security. r=rrelyea 2020-03-16 10:56:56 +00:00
linux Bug 1623885 - Add "subsystem" to Mesa sandbox policy to fix libdrm-2.4.101+. r=gcp 2020-04-12 21:21:32 +00:00
mac Bug 1614983 - Create a new sandbox profile for the socket process r=spohl 2020-03-11 22:20:13 +00:00
test Bug 1620542 - Automatically fix ESLint errors in .eslintrc.js files. r=mossop 2020-03-07 10:09:44 +00:00
win Bug 1629361 - Disable the launcher process when a content process fails to start. r=mhowell 2020-04-14 16:14:22 +00:00
moz.build Bug 1615401 - Part 1: Partially implement FileVersionInfoWin to use from OSInfo::Kernel32BaseVersion(). r=bobowen 2020-03-06 18:51:54 +02:00