Open
Bug 1506198
Opened 6 years ago
Updated 2 years ago
Re-investigate per-content process tempdirs
Categories
(Core :: Security: Process Sandboxing, enhancement, P2)
Tracking
()
NEW
Tracking | Status | |
---|---|---|
firefox65 | --- | affected |
People
(Reporter: gcp, Assigned: gcp)
References
(Blocks 1 open bug)
Details
We currently use a shared temporary directory, shared by all content processes.
After Fission, we want origins (sites?) to not be able to influence each other. So we should either:
a) Make this directory per-content-process.
b) Remove tempdir access entirely. This may be possible after WebGL and more font remoting.
Assignee | ||
Updated•6 years ago
|
Blocks: fission-site-sandbox
Updated•6 years ago
|
Priority: -- → P2
Assignee | ||
Updated•6 years ago
|
Assignee: nobody → gpascutto
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•