diff options
| author | Joseph Benden <joe@benden.us> | 2019-07-18 00:10:48 +0000 |
|---|---|---|
| committer | Leonardo Arena <rnalrd@alpinelinux.org> | 2019-08-28 12:33:37 +0000 |
| commit | 641fc95383be633859e0c4cd1a22b95b3ef10c79 (patch) | |
| tree | 7cb0a88f781352d32de2fa1ca85b57cb60169182 /testing/thunderbird/fix-seccomp-bpf.patch | |
| parent | 76a5e58c61aa5b678248a6eff0937cdf4a924acb (diff) | |
| download | aports-641fc95383be633859e0c4cd1a22b95b3ef10c79.tar.bz2 aports-641fc95383be633859e0c4cd1a22b95b3ef10c79.tar.xz | |
testing/thunderbird: new aport
https://www.thunderbird.net/
Thunderbird email client with package for GPG encrypted email
(Enigmail).
Signed-off-by: Joseph Benden <joe@benden.us>
Diffstat (limited to 'testing/thunderbird/fix-seccomp-bpf.patch')
| -rw-r--r-- | testing/thunderbird/fix-seccomp-bpf.patch | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/testing/thunderbird/fix-seccomp-bpf.patch b/testing/thunderbird/fix-seccomp-bpf.patch new file mode 100644 index 0000000000..ae3ba5d44b --- /dev/null +++ b/testing/thunderbird/fix-seccomp-bpf.patch @@ -0,0 +1,26 @@ +diff -ru firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc firefox-62.0.3/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc +--- firefox-62.0.3.orig/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:53:46.083976137 +0000 ++++ firefox-62.0.3/security/sandbox/chromium/sandbox/linux/seccomp-bpf/trap.cc 2018-12-14 08:51:22.084596411 +0000 +@@ -25,6 +25,11 @@ + #include "sandbox/linux/system_headers/linux_seccomp.h" + #include "sandbox/linux/system_headers/linux_signal.h" + ++// musl libc defines siginfo_t __si_fields instead of _sifields ++#if defined(OS_LINUX) && !defined(__GLIBC__) ++#define _sifields __si_fields ++#endif ++ + namespace { + + struct arch_sigsys { +diff -ru firefox-62.0.3.orig/security/sandbox/linux/SandboxFilter.cpp firefox-62.0.3/security/sandbox/linux/SandboxFilter.cpp +--- firefox-62.0.3.orig/security/sandbox/linux/SandboxFilter.cpp 2018-10-01 18:35:28.000000000 +0000 ++++ firefox-62.0.3/security/sandbox/linux/SandboxFilter.cpp 2018-12-14 08:57:50.645264590 +0000 +@@ -997,6 +997,7 @@ class ContentSandboxPolicy : public SandboxPolicyCommon { + // ffmpeg, and anything else that calls isatty(), will be told + // that nothing is a typewriter: + .ElseIf(request == TCGETS, Error(ENOTTY)) ++ .ElseIf(request == TIOCGWINSZ, Error(ENOTTY)) + // Allow anything that isn't a tty ioctl, for now; bug 1302711 + // will cover changing this to a default-deny policy. + .ElseIf(shifted_type != kTtyIoctls, Allow()) |
