aboutsummaryrefslogtreecommitdiffstats
path: root/community/firefox-esr/fix-seccomp-bpf.patch
diff options
context:
space:
mode:
authorLi Q <li66@21cn.com>2019-07-13 14:11:58 -0300
committerSören Tempel <soeren+git@soeren-tempel.net>2019-07-17 12:48:11 +0200
commit6aadc57ae091f6fb0adb24cdf7f23d04f0503545 (patch)
treee1e7d9bd76cf789f2b872ce78bcb444e9faa41de /community/firefox-esr/fix-seccomp-bpf.patch
parent6f7f26dac17d4027ca00a7181310699405320e23 (diff)
downloadaports-6aadc57ae091f6fb0adb24cdf7f23d04f0503545.tar.bz2
aports-6aadc57ae091f6fb0adb24cdf7f23d04f0503545.tar.xz
community/firefox-esr: upgrade to 68.0
See https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/
Diffstat (limited to 'community/firefox-esr/fix-seccomp-bpf.patch')
-rw-r--r--community/firefox-esr/fix-seccomp-bpf.patch18
1 files changed, 2 insertions, 16 deletions
diff --git a/community/firefox-esr/fix-seccomp-bpf.patch b/community/firefox-esr/fix-seccomp-bpf.patch
index c44d9ea48e..de7bd175ee 100644
--- a/community/firefox-esr/fix-seccomp-bpf.patch
+++ b/community/firefox-esr/fix-seccomp-bpf.patch
@@ -1,7 +1,5 @@
-diff --git a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc
-index 003708d2c..79488795d 100644
---- a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc
-+++ b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc
+--- a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:53:46.083976137 +0000
++++ b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:51:22.084596411 +0000
@@ -25,6 +25,11 @@
#include "sandbox/linux/system_headers/linux_seccomp.h"
#include "sandbox/linux/system_headers/linux_signal.h"
@@ -14,15 +12,3 @@ index 003708d2c..79488795d 100644
namespace {
struct arch_sigsys {
-diff --git a/security/sandbox/linux/SandboxFilter.cpp b/security/sandbox/linux/SandboxFilter.cpp
-index 0f59f2a87..5c07dbb31 100644
---- a/security/sandbox/linux/SandboxFilter.cpp
-+++ b/security/sandbox/linux/SandboxFilter.cpp
-@@ -989,6 +989,7 @@ class ContentSandboxPolicy : public SandboxPolicyCommon {
- // ffmpeg, and anything else that calls isatty(), will be told
- // that nothing is a typewriter:
- .ElseIf(request == TCGETS, Error(ENOTTY))
-+ .ElseIf(request == TIOCGWINSZ, Error(ENOTTY))
- // Allow anything that isn't a tty ioctl, for now; bug 1302711
- // will cover changing this to a default-deny policy.
- .ElseIf(shifted_type != kTtyIoctls, Allow())