Bug 1125891 - Enable the no-admin sandbox for Flash. r=bobowen, a=lmandel
authorBenjamin Smedberg <benjamin@smedbergs.us>
Mon, 26 Jan 2015 13:25:15 -0500
changeset 249432 a8f82447f9adb78a50db25918ec7dc41bd53d692
parent 249431 24376efc40fb111571c759c25ffac897bd884b47
child 249433 8f49a2fc3f0ccf0e6149e392df7405427df5affb
push id4489
push userraliiev@mozilla.com
push dateMon, 23 Feb 2015 15:17:55 +0000
treeherdermozilla-beta@fd7c3dc24146 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersbobowen, lmandel
bugs1125891
milestone37.0a2
Bug 1125891 - Enable the no-admin sandbox for Flash. r=bobowen, a=lmandel
browser/app/profile/firefox.js
--- a/browser/app/profile/firefox.js
+++ b/browser/app/profile/firefox.js
@@ -1182,17 +1182,17 @@ pref("browser.tabs.remote.desktopbehavio
 // process and also if they are subsequently allowed by the broker process.
 // This will require a restart.
 pref("security.sandbox.windows.log", false);
 
 // Controls whether the Windows NPAPI plugin process is sandboxed by default.
 // To get a different setting for a particular plugin replace "default", with
 // the plugin's nice file name, see: nsPluginTag::GetNiceFileName.
 pref("dom.ipc.plugins.sandbox.default", false);
-pref("dom.ipc.plugins.sandbox.flash", false);
+pref("dom.ipc.plugins.sandbox.flash", true);
 
 #if defined(MOZ_CONTENT_SANDBOX)
 // This controls whether the Windows content process sandbox is using a more
 // strict sandboxing policy.  This will require a restart.
 pref("security.sandbox.windows.content.moreStrict", false);
 
 #if defined(MOZ_STACKWALKING)
 // This controls the depth of stack trace that is logged when Windows sandbox