tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

commit 64c63627e4fdbb421c9bc6f68bbf311733d5c5d6
parent a1184e56a76fffb5e395d34129787a0df67a8da7
Author: Bob Owen <bobowencode@gmail.com>
Date:   Tue, 28 Oct 2025 08:44:45 +0000

Bug 1996515 - Remove named pipe rule from windows content process sandbox. r=handyman

Differential Revision: https://phabricator.services.mozilla.com/D270194

Diffstat:
Msecurity/sandbox/win/src/sandboxbroker/sandboxBroker.cpp | 6------
1 file changed, 0 insertions(+), 6 deletions(-)

diff --git a/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp b/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp @@ -1217,12 +1217,6 @@ void SandboxBroker::SetSecurityLevelForContentProcess(int32_t aSandboxLevel, } } #endif - - // We still currently create IPC named pipes in the content process. - result = config->AllowNamedPipes(L"\\\\.\\pipe\\chrome.*"); - MOZ_RELEASE_ASSERT( - sandbox::SBOX_ALL_OK == result, - "With these static arguments AddRule should never fail."); } }