commit b94ed0aa5d3c37edd4ad777c85c7fe686d061679 Author: Yawning Angel yawning@schwanenlied.me Date: Wed Jul 19 20:06:06 2017 +0000
Bug 22967: Force disable crashdump reporting.
Since crashdumps are developed as a GSOC project, ensure that if/when this makes it to production, that it will be force disabled. --- ChangeLog | 1 + src/cmd/sandboxed-tor-browser/internal/sandbox/application.go | 3 +++ 2 files changed, 4 insertions(+)
diff --git a/ChangeLog b/ChangeLog index f44a091..625a7d8 100644 --- a/ChangeLog +++ b/ChangeLog @@ -2,6 +2,7 @@ Changes in version 0.0.12 - UNRELEASED: * Bug 22969: Disable the addon blocklist. * Bug 22984: Force IDNs to be displayed as punycode to thwart homograph attacks. + * Bug 22967: Force disable crashdump reporting.
Changes in version 0.0.11 - 2017-07-18: * Bug 22910: Deprecate the volatile extension dir option. diff --git a/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go b/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go index c4acbad..54d64aa 100644 --- a/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go +++ b/src/cmd/sandboxed-tor-browser/internal/sandbox/application.go @@ -209,6 +209,9 @@ func RunTorBrowser(cfg *config.Config, manif *config.Manifest, tor *tor.Tor) (pr // Hardware accelerated OpenGL will not work, and never will. h.setenv("LIBGL_ALWAYS_SOFTWARE", "1")
+ // Crashdumps regardless of being sanitized or not, not to be trusted. + h.setenv("MOZ_CRASHREPORTER_DISABLE", "1") + // Tor Browser currently is incompatible with PaX MPROTECT, apply the // override if needed. realFirefoxPath := filepath.Join(realBrowserHome, "firefox")
tor-commits@lists.torproject.org