aboutsummaryrefslogtreecommitdiffstats
path: root/testing/thunderbird/fix-seccomp-bpf.patch
diff options
context:
space:
mode:
authorJoseph Benden <joe@benden.us>2019-07-18 00:10:48 +0000
committerLeonardo Arena <rnalrd@alpinelinux.org>2019-08-28 12:33:37 +0000
commit641fc95383be633859e0c4cd1a22b95b3ef10c79 (patch)
tree7cb0a88f781352d32de2fa1ca85b57cb60169182 /testing/thunderbird/fix-seccomp-bpf.patch
parent76a5e58c61aa5b678248a6eff0937cdf4a924acb (diff)
downloadaports-641fc95383be633859e0c4cd1a22b95b3ef10c79.tar.bz2
aports-641fc95383be633859e0c4cd1a22b95b3ef10c79.tar.xz
testing/thunderbird: new aport
https://www.thunderbird.net/ Thunderbird email client with package for GPG encrypted email (Enigmail). Signed-off-by: Joseph Benden <joe@benden.us>
Diffstat (limited to 'testing/thunderbird/fix-seccomp-bpf.patch')
-rw-r--r--testing/thunderbird/fix-seccomp-bpf.patch26
1 files changed, 26 insertions, 0 deletions
diff --git a/testing/thunderbird/fix-seccomp-bpf.patch b/testing/thunderbird/fix-seccomp-bpf.patch
new file mode 100644
index 0000000000..ae3ba5d44b
--- /dev/null
+++ b/testing/thunderbird/fix-seccomp-bpf.patch
@@ -0,0 +1,26 @@
+diff -ru firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc firefox-62.0.3/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc
+--- firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:53:46.083976137 +0000
++++ firefox-62.0.3/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:51:22.084596411 +0000
+@@ -25,6 +25,11 @@
+ #include "sandbox/linux/system_headers/linux_seccomp.h"
+ #include "sandbox/linux/system_headers/linux_signal.h"
+
++// musl libc defines siginfo_t __si_fields instead of _sifields
++#if defined(OS_LINUX) && !defined(__GLIBC__)
++#define _sifields __si_fields
++#endif
++
+ namespace {
+
+ struct arch_sigsys {
+diff -ru firefox-62.0.3.orig/security/sandbox/linux/SandboxFilter.cpp firefox-62.0.3/security/sandbox/linux/SandboxFilter.cpp
+--- firefox-62.0.3.orig/security/sandbox/linux/SandboxFilter.cpp 2018-10-01 18:35:28.000000000 +0000
++++ firefox-62.0.3/security/sandbox/linux/SandboxFilter.cpp 2018-12-14 08:57:50.645264590 +0000
+@@ -997,6 +997,7 @@ class ContentSandboxPolicy : public SandboxPolicyCommon {
+ // ffmpeg, and anything else that calls isatty(), will be told
+ // that nothing is a typewriter:
+ .ElseIf(request == TCGETS, Error(ENOTTY))
++ .ElseIf(request == TIOCGWINSZ, Error(ENOTTY))
+ // Allow anything that isn't a tty ioctl, for now; bug 1302711
+ // will cover changing this to a default-deny policy.
+ .ElseIf(shifted_type != kTtyIoctls, Allow())