sandboxing can no longer be enabled on OpenBSD
Categories
(Core :: Security: Process Sandboxing, defect, P5)
Tracking
()
People
(Reporter: jcs, Assigned: jcs)
References
(Regression)
Details
(Keywords: regression)
Attachments
(1 file, 2 obsolete files)
(deleted),
patch
|
gcp
:
review+
RyanVM
:
approval-mozilla-beta+
RyanVM
:
approval-mozilla-esr68+
|
Details | Diff | Splinter Review |
old-configure.in
previously allowed MOZ_SANDBOX
to be set to 1 on OpenBSD when --enable-sandbox
was supplied.
This was broken by #1375863 which changed the logic for old-configure.in
to explicitly disable MOZ_SANDBOX
on non-Linux/Win/Darwin platforms even if --enable-sandbox
was supplied.
Comment 1•5 years ago
|
||
Bugbug thinks this bug should belong to this component, but please revert this change in case of error.
Updated•5 years ago
|
Updated•5 years ago
|
Comment 2•5 years ago
|
||
mike, can you please r+ that ? I need it backported up to esr68.. and it seems we cant set r? anymore.
Comment 4•5 years ago
|
||
Dammit. Thanks for spotting it..
Updated•5 years ago
|
Comment 5•5 years ago
|
||
Updated•5 years ago
|
Pushed by apavel@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/f5846b25585f
Reenable sandbox by default on OpenBSD r=froydnj
Comment 8•5 years ago
|
||
bugherder |
Updated•5 years ago
|
Comment 9•5 years ago
|
||
Comment on attachment 9091233 [details] [diff] [review]
Reenable sandboxing by default on OpenBSD
Beta/Release Uplift Approval Request
- User impact if declined: Failure to enable sandboxing when building on OpenBSD
- Is this code covered by automated tests?: No
- Has the fix been verified in Nightly?: Yes
- Needs manual test from QE?: No
- If yes, steps to reproduce:
- List of other uplifts needed: None
- Risk to taking this patch: Low
- Why is the change risky/not risky? (and alternatives if risky): NPOTB/tier3
- String changes made/needed:
Comment 10•5 years ago
|
||
Comment on attachment 9091233 [details] [diff] [review]
Reenable sandboxing by default on OpenBSD
ESR Uplift Approval Request
- If this is not a sec:{high,crit} bug, please state case for ESR consideration: Friendlier for downstream distributors on tier3
- User impact if declined: Failure to enable sandboxing when building on OpenBSD
- Fix Landed on Version: 71
- Risk to taking this patch: Low
- Why is the change risky/not risky? (and alternatives if risky): NPOTB/tier3
- String or UUID changes made by this patch:
Comment 11•5 years ago
|
||
Comment 12•5 years ago
|
||
bugherder uplift |
Comment 13•5 years ago
|
||
bugherder uplift |
Updated•3 years ago
|
Description
•