|Linux sandboxing improvements in Firefox 60|
|By Thom Holwerda on 2018-05-11 18:36:45|
Continuing our past work, Firefox 60 brings further important improvements to security sandboxing on Linux, making it harder for attackers that find security bugs in the browser to escalate those into attacks against the rest of the system.
This means that content processes have to follow any network access restrictions Firefox imposes - for example, if the browser has been set up to use a proxy server, connecting directly to the internet is no longer possible. But more important are the restrictions on connections to local services: they often assume that anything connecting to them has the full authority of the user running it, and either allow it to ask for arbitrary code to run, or aren't careful about preventing that. Normally that's not a security problem because the client could just run that code itself, but if it's a sandboxed Firefox process, that could have meant a sandbox escape.
- Firefox removes core product support for RSS/Atom feeds - 2018-10-13
- The effect of ad blocking on user engagement with the web - 2018-10-02
- Firefox 62.0 released - 2018-09-05
- Firefox: changing our approach to anti-tracking - 2018-08-30
- More related articles