diff options
author | Li Q <li66@21cn.com> | 2019-07-13 14:29:57 -0300 |
---|---|---|
committer | Leo <thinkabit.ukim@gmail.com> | 2019-07-20 16:27:40 -0300 |
commit | 510613b01dcd0d9b583e3515c9069d13c0937891 (patch) | |
tree | fefd3d44453dfa65f44a3d62d2e439f20a9a3483 /testing/firefox/fix-seccomp-bpf.patch | |
parent | 0a0f181cc635c90cc70fb6ff9ee0fea59f577dd1 (diff) | |
download | aports-510613b01dcd0d9b583e3515c9069d13c0937891.tar.bz2 aports-510613b01dcd0d9b583e3515c9069d13c0937891.tar.xz |
testing/firefox: upgrade to 68.0
Diffstat (limited to 'testing/firefox/fix-seccomp-bpf.patch')
-rw-r--r-- | testing/firefox/fix-seccomp-bpf.patch | 16 |
1 files changed, 2 insertions, 14 deletions
diff --git a/testing/firefox/fix-seccomp-bpf.patch b/testing/firefox/fix-seccomp-bpf.patch index ae3ba5d44b..de7bd175ee 100644 --- a/testing/firefox/fix-seccomp-bpf.patch +++ b/testing/firefox/fix-seccomp-bpf.patch @@ -1,6 +1,5 @@ -diff -ru firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc firefox-62.0.3/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc ---- firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:53:46.083976137 +0000 -+++ firefox-62.0.3/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:51:22.084596411 +0000 +--- a/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:53:46.083976137 +0000 ++++ b/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:51:22.084596411 +0000 @@ -25,6 +25,11 @@ #include "sandbox/linux/system_headers/linux_seccomp.h" #include "sandbox/linux/system_headers/linux_signal.h" @@ -13,14 +12,3 @@ diff -ru firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf namespace { struct arch_sigsys { -diff -ru firefox-62.0.3.orig/security/sandbox/linux/SandboxFilter.cpp firefox-62.0.3/security/sandbox/linux/SandboxFilter.cpp ---- firefox-62.0.3.orig/security/sandbox/linux/SandboxFilter.cpp 2018-10-01 18:35:28.000000000 +0000 -+++ firefox-62.0.3/security/sandbox/linux/SandboxFilter.cpp 2018-12-14 08:57:50.645264590 +0000 -@@ -997,6 +997,7 @@ class ContentSandboxPolicy : public SandboxPolicyCommon { - // ffmpeg, and anything else that calls isatty(), will be told - // that nothing is a typewriter: - .ElseIf(request == TCGETS, Error(ENOTTY)) -+ .ElseIf(request == TIOCGWINSZ, Error(ENOTTY)) - // Allow anything that isn't a tty ioctl, for now; bug 1302711 - // will cover changing this to a default-deny policy. - .ElseIf(shifted_type != kTtyIoctls, Allow()) |