6c01889e00
- appdate screenshot URL updated (by mailaender@opensuse.org) - Mozilla Thunderbird 91.0 * based on Mozilla's 91 ESR codebase * many new and changed features https://www.thunderbird.net/en-US/thunderbird/91.0/releasenotes/#whatsnew * Renamed "Add-ons" to "Add-ons and Themes" and "Options" to "Preferences" * Thunderbird now operates in multi-process (e10s) mode by default * New user interface for adding attachments * Enable redirect of messages * CardDAV address book support - Removed obsolete patches: * mozilla-bmo1463035.patch * mozilla-ppc-altivec_static_inline.patch * mozilla-pipewire-0-3.patch * mozilla-bmo1554971.patch - add mozilla-libavcodec58_91.patch - removed obsolete BigEndian ICU build workaround - updated build requirements - build using clang OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaThunderbird?expand=0&rev=600
50 lines
2.2 KiB
Diff
50 lines
2.2 KiB
Diff
From: meissner@suse.com, cgrobertson@suse.com
|
|
Subject: allow Firefox to access addtional process information
|
|
References:
|
|
http://bugzilla.suse.com/show_bug.cgi?id=1167132
|
|
bsc#1174284 - Firefox tab just crashed in FIPS mode
|
|
|
|
diff --git a/security/sandbox/linux/Sandbox.cpp b/security/sandbox/linux/Sandbox.cpp
|
|
--- a/security/sandbox/linux/Sandbox.cpp
|
|
+++ b/security/sandbox/linux/Sandbox.cpp
|
|
@@ -647,16 +647,17 @@ void SetMediaPluginSandbox(const char* a
|
|
SANDBOX_LOG_ERROR("failed to open plugin file %s: %s", aFilePath,
|
|
strerror(errno));
|
|
MOZ_CRASH("failed while trying to open the plugin file ");
|
|
}
|
|
|
|
auto files = new SandboxOpenedFiles();
|
|
files->Add(std::move(plugin));
|
|
files->Add("/dev/urandom", true);
|
|
+ files->Add("/dev/random", true);
|
|
files->Add("/etc/ld.so.cache"); // Needed for NSS in clearkey.
|
|
files->Add("/sys/devices/system/cpu/cpu0/tsc_freq_khz");
|
|
files->Add("/sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq");
|
|
files->Add("/proc/cpuinfo"); // Info also available via CPUID instruction.
|
|
files->Add("/proc/sys/crypto/fips_enabled"); // Needed for NSS in clearkey.
|
|
#ifdef __i386__
|
|
files->Add("/proc/self/auxv"); // Info also in process's address space.
|
|
#endif
|
|
diff --git a/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp b/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp
|
|
--- a/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp
|
|
+++ b/security/sandbox/linux/broker/SandboxBrokerPolicyFactory.cpp
|
|
@@ -308,16 +308,18 @@ void SandboxBrokerPolicyFactory::InitCon
|
|
policy->AddDir(rdwr, "/dev/dri");
|
|
}
|
|
|
|
// Bug 1575985: WASM library sandbox needs RW access to /dev/null
|
|
policy->AddPath(rdwr, "/dev/null");
|
|
|
|
// Read permissions
|
|
policy->AddPath(rdonly, "/dev/urandom");
|
|
+ policy->AddPath(rdonly, "/dev/random");
|
|
+ policy->AddPath(rdonly, "/proc/sys/crypto/fips_enabled");
|
|
policy->AddPath(rdonly, "/proc/cpuinfo");
|
|
policy->AddPath(rdonly, "/proc/meminfo");
|
|
policy->AddDir(rdonly, "/sys/devices/cpu");
|
|
policy->AddDir(rdonly, "/sys/devices/system/cpu");
|
|
policy->AddDir(rdonly, "/lib");
|
|
policy->AddDir(rdonly, "/lib64");
|
|
policy->AddDir(rdonly, "/usr/lib");
|
|
policy->AddDir(rdonly, "/usr/lib32");
|