Open Bug 1506198 Opened 6 years ago Updated 2 years ago

Re-investigate per-content process tempdirs

Categories

(Core :: Security: Process Sandboxing, enhancement, P2)

x86_64
Linux
enhancement

Tracking

()

Tracking Status
firefox65 --- affected

People

(Reporter: gcp, Assigned: gcp)

References

(Blocks 1 open bug)

Details

We currently use a shared temporary directory, shared by all content processes. After Fission, we want origins (sites?) to not be able to influence each other. So we should either: a) Make this directory per-content-process. b) Remove tempdir access entirely. This may be possible after WebGL and more font remoting.
Priority: -- → P2
Assignee: nobody → gpascutto
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.