diff options
author | Li Q <li66@21cn.com> | 2019-07-13 14:11:58 -0300 |
---|---|---|
committer | Sören Tempel <soeren+git@soeren-tempel.net> | 2019-07-17 12:48:11 +0200 |
commit | 6aadc57ae091f6fb0adb24cdf7f23d04f0503545 (patch) | |
tree | e1e7d9bd76cf789f2b872ce78bcb444e9faa41de /community/firefox-esr/fix-seccomp-bpf.patch | |
parent | 6f7f26dac17d4027ca00a7181310699405320e23 (diff) | |
download | aports-6aadc57ae091f6fb0adb24cdf7f23d04f0503545.tar.bz2 aports-6aadc57ae091f6fb0adb24cdf7f23d04f0503545.tar.xz |
community/firefox-esr: upgrade to 68.0
See https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/
Diffstat (limited to 'community/firefox-esr/fix-seccomp-bpf.patch')
-rw-r--r-- | community/firefox-esr/fix-seccomp-bpf.patch | 18 |
1 files changed, 2 insertions, 16 deletions
diff --git a/community/firefox-esr/fix-seccomp-bpf.patch b/community/firefox-esr/fix-seccomp-bpf.patch index c44d9ea48e..de7bd175ee 100644 --- a/community/firefox-esr/fix-seccomp-bpf.patch +++ b/community/firefox-esr/fix-seccomp-bpf.patch @@ -1,7 +1,5 @@ -diff --git a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc -index 003708d2c..79488795d 100644 ---- a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc -+++ b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc +--- a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:53:46.083976137 +0000 ++++ b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:51:22.084596411 +0000 @@ -25,6 +25,11 @@ #include "sandbox/linux/system_headers/linux_seccomp.h" #include "sandbox/linux/system_headers/linux_signal.h" @@ -14,15 +12,3 @@ index 003708d2c..79488795d 100644 namespace { struct arch_sigsys { -diff --git a/security/sandbox/linux/SandboxFilter.cpp b/security/sandbox/linux/SandboxFilter.cpp -index 0f59f2a87..5c07dbb31 100644 ---- a/security/sandbox/linux/SandboxFilter.cpp -+++ b/security/sandbox/linux/SandboxFilter.cpp -@@ -989,6 +989,7 @@ class ContentSandboxPolicy : public SandboxPolicyCommon { - // ffmpeg, and anything else that calls isatty(), will be told - // that nothing is a typewriter: - .ElseIf(request == TCGETS, Error(ENOTTY)) -+ .ElseIf(request == TIOCGWINSZ, Error(ENOTTY)) - // Allow anything that isn't a tty ioctl, for now; bug 1302711 - // will cover changing this to a default-deny policy. - .ElseIf(shifted_type != kTtyIoctls, Allow()) |