commit 64c63627e4fdbb421c9bc6f68bbf311733d5c5d6 parent a1184e56a76fffb5e395d34129787a0df67a8da7 Author: Bob Owen <bobowencode@gmail.com> Date: Tue, 28 Oct 2025 08:44:45 +0000 Bug 1996515 - Remove named pipe rule from windows content process sandbox. r=handyman Differential Revision: https://phabricator.services.mozilla.com/D270194 Diffstat:
| M | security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp | | | 6 | ------ |
1 file changed, 0 insertions(+), 6 deletions(-)
diff --git a/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp b/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp @@ -1217,12 +1217,6 @@ void SandboxBroker::SetSecurityLevelForContentProcess(int32_t aSandboxLevel, } } #endif - - // We still currently create IPC named pipes in the content process. - result = config->AllowNamedPipes(L"\\\\.\\pipe\\chrome.*"); - MOZ_RELEASE_ASSERT( - sandbox::SBOX_ALL_OK == result, - "With these static arguments AddRule should never fail."); } }