diff options
author | Stephan Hartmann <sultan@gentoo.org> | 2022-03-06 08:58:15 +0100 |
---|---|---|
committer | Stephan Hartmann <sultan@gentoo.org> | 2022-03-06 08:59:00 +0100 |
commit | 96b76c0fe868ae9cc1bad0d774c0de6792ab7862 (patch) | |
tree | 93a45a6c3b3fad1e239c623c22ace38c54dd5f50 /www-client/chromium/files | |
parent | app-crypt/rhash: Stabilize 1.4.2 arm, #833978 (diff) | |
download | gentoo-96b76c0fe868ae9cc1bad0d774c0de6792ab7862.tar.gz gentoo-96b76c0fe868ae9cc1bad0d774c0de6792ab7862.tar.bz2 gentoo-96b76c0fe868ae9cc1bad0d774c0de6792ab7862.zip |
www-client/chromium: security cleanup
Bug: https://bugs.gentoo.org/834477
Package-Manager: Portage-3.0.30, Repoman-3.0.3
Signed-off-by: Stephan Hartmann <sultan@gentoo.org>
Diffstat (limited to 'www-client/chromium/files')
-rw-r--r-- | www-client/chromium/files/chromium-glibc-2.34.patch | 50 |
1 files changed, 0 insertions, 50 deletions
diff --git a/www-client/chromium/files/chromium-glibc-2.34.patch b/www-client/chromium/files/chromium-glibc-2.34.patch deleted file mode 100644 index 64c03a6adae6..000000000000 --- a/www-client/chromium/files/chromium-glibc-2.34.patch +++ /dev/null @@ -1,50 +0,0 @@ -From 600d63c2c59a9892dbc5423d7d8bb1565a9f91e7 Mon Sep 17 00:00:00 2001 -From: Michel Salim <michel@fb.com> -Date: Thu, 04 Nov 2021 14:22:40 -0700 -Subject: [PATCH] Handle long SIGSTKSZ in glibc > 2.33 - -`SIGSTKSZ` is no longer constant in glibc > 2.33 but a function -returning a long. Cast before taking `max`. - -See https://sourceware.org/git/?p=glibc.git;a=blob;f=NEWS;h=85e84fe53699fe9e392edffa993612ce08b2954a;hb=HEAD - -Signed-off-by: Michel Salim <michel@fb.com> -Change-Id: I197f8ff3053eede80d6aed096be4f0113dd43241 -(relocated to chromium repo, removed static) ---- - -diff --git a/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc b/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc -index ca353c4..5cdabcf 100644 ---- a/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc -+++ b/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc -@@ -138,7 +138,7 @@ - // SIGSTKSZ may be too small to prevent the signal handlers from overrunning - // the alternative stack. Ensure that the size of the alternative stack is - // large enough. -- static const unsigned kSigStackSize = std::max(16384, SIGSTKSZ); -+ const unsigned kSigStackSize = std::max(16384U, (unsigned)SIGSTKSZ); - - // Only set an alternative stack if there isn't already one, or if the current - // one is too small. -diff --git a/sandbox/linux/services/credentials.cc b/sandbox/linux/services/credentials.cc -index ca6b595..1c1ee42 100644 ---- a/sandbox/linux/services/credentials.cc -+++ b/sandbox/linux/services/credentials.cc -@@ -11,6 +11,7 @@ - #include <stddef.h> - #include <stdint.h> - #include <stdio.h> -+#include <string.h> - #include <sys/syscall.h> - #include <sys/types.h> - #include <sys/wait.h> -@@ -100,7 +101,8 @@ bool ChrootToSafeEmptyDir() { - // TODO(crbug.com/1247458) Broken in MSan builds after LLVM f1bb30a4956f. - clone_flags |= CLONE_VM | CLONE_VFORK | CLONE_SETTLS; - -- char tls_buf[PTHREAD_STACK_MIN] = {0}; -+ char tls_buf[PTHREAD_STACK_MIN]; -+ memset(tls_buf, 0, PTHREAD_STACK_MIN); - tls = tls_buf; - #endif - |