pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

chromium: update to 136.0.7103.113



Module Name:	pkgsrc-wip
Committed By:	kikadf <kikadf.01%gmail.com@localhost>
Pushed By:	kikadf
Date:		Fri May 16 14:18:00 2025 +0200
Changeset:	dcbb45dfeeb22e3c3509de430fea473d5688d4e0

Modified Files:
	chromium/COMMIT_MSG
	chromium/Makefile
	chromium/distinfo
Added Files:
	chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc

Log Message:
chromium: update to 136.0.7103.113

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=dcbb45dfeeb22e3c3509de430fea473d5688d4e0

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 chromium/COMMIT_MSG                                   | 17 ++++++++++++++++-
 chromium/Makefile                                     |  2 +-
 chromium/distinfo                                     | 13 +++++++------
 ...e_platform_wayland_host_wayland__frame__manager.cc | 19 +++++++++++++++++++
 4 files changed, 43 insertions(+), 8 deletions(-)

diffs:
diff --git a/chromium/COMMIT_MSG b/chromium/COMMIT_MSG
index 7363236555..0046f23927 100644
--- a/chromium/COMMIT_MSG
+++ b/chromium/COMMIT_MSG
@@ -1,4 +1,4 @@
-www/chromium: update to ***
+www/chromium: update to 136.0.7103.113
 
 * 131.0.6778.264
 This update includes 4 security fixes. Below, we highlight
@@ -275,3 +275,18 @@ Reported by Huang Xilin of Ant Group Light-Year Security Lab on 2025-04-20
 As usual, our ongoing internal security work was responsible for a
 wide range of fixes:
 [415837391] Various fixes from internal audits, fuzzing and other initiatives
+
+* 136.0.7103.113
+This update includes 4 security fixes. Below, we highlight fixes
+that were contributed by external researchers. Please see the
+Chrome Security Page for more information.
+[N/A][415810136] High CVE-2025-4664: Insufficient policy enforcement
+in Loader. Source: X post from @slonser_ on 2025-05-05
+[TBD][412578726] High CVE-2025-4609: Incorrect handle provided in
+unspecified circumstances in Mojo. Reported by Micky on 2025-04-22
+Google is aware of reports that an exploit for CVE-2025-4664 exists
+in the wild.
+
+As usual, our ongoing internal security work was responsible for a
+wide range of fixes:
+[417268830] Various fixes from internal audits, fuzzing and other initiatives
diff --git a/chromium/Makefile b/chromium/Makefile
index bd783ca381..3b550860fa 100644
--- a/chromium/Makefile
+++ b/chromium/Makefile
@@ -1,7 +1,7 @@
 # $NetBSD$
 
 DISTNAME=			chromium-${VERSION}
-VERSION=			136.0.7103.92
+VERSION=			136.0.7103.113
 CATEGORIES=			www
 MASTER_SITES=			https://commondatastorage.googleapis.com/chromium-browser-official/
 EXTRACT_SUFX_C=			.tar.xz
diff --git a/chromium/distinfo b/chromium/distinfo
index fb12dd3cd2..329f126b0f 100644
--- a/chromium/distinfo
+++ b/chromium/distinfo
@@ -1,11 +1,11 @@
 $NetBSD$
 
-BLAKE2s (chromium-136.0.7103.92-testdata.tar.xz) = 5c0f1bb395618d0a1c9b9ad3ee2badca9418ba8d072ffc389de059b049cad60e
-SHA512 (chromium-136.0.7103.92-testdata.tar.xz) = 82d1c3a01d3859a9f0b311d9b75421bd5d9cc01ae13cfd9c7d18efbfa90768b6eae5fdafa84142b42c455c797f02471aa0d42995b00fc5a4d6e8f81c0d48f626
-Size (chromium-136.0.7103.92-testdata.tar.xz) = 651393856 bytes
-BLAKE2s (chromium-136.0.7103.92.tar.xz) = d60bc473fcab6277415b41831a5d50b803c664a72b2f71200e3d93cf116ac790
-SHA512 (chromium-136.0.7103.92.tar.xz) = 63cf064de6e6a17bfd6e337a7c8ae66a503275e6be0f119317c1d923d78d56e0cc2a906e84a3d173d9e584c696dd5276533b156a4f8ab368e53b2f350bee480a
-Size (chromium-136.0.7103.92.tar.xz) = 7188412240 bytes
+BLAKE2s (chromium-136.0.7103.113-testdata.tar.xz) = 8fc7b7d4fcf71eef8f67b19693ef48eb0c0ecbe28a3fcae289a99a1bdd8728a1
+SHA512 (chromium-136.0.7103.113-testdata.tar.xz) = 5eedfa17054056d5f7110bb7becd4ca77dc73ab2bcc0b722dbb591acbe15d6e569f26c988c59661763a1b239e9a18955975fbae4d172536f42e081674fdbb8d6
+Size (chromium-136.0.7103.113-testdata.tar.xz) = 651614116 bytes
+BLAKE2s (chromium-136.0.7103.113.tar.xz) = cb075c691969e8f5b6576eb4c8f262dde5e87759d3f2cf38147923242c1ec444
+SHA512 (chromium-136.0.7103.113.tar.xz) = 4a946b0d99ca6ccf7035877dbf3e2de28fe7f30960362a3886faa93d86cc84150a43b27feb512ce4aef8d9533bdbe26dd9788666d4822ee1e2053c1269c441fe
+Size (chromium-136.0.7103.113.tar.xz) = 7196537592 bytes
 BLAKE2s (kikadf-chromium-audioio-v130.0.tar.gz) = 45fe07cb8280f81b8ef490059002da426b59fe69b5ebd53951fe1dc3e9495a10
 SHA512 (kikadf-chromium-audioio-v130.0.tar.gz) = 840aed119dc69982f14fd5f4767e144bfc8a66672b660f0f05f5459070d7f6a36b8719ae7c0de049f7345dec39266759aedcdd5ee37aa4e98bcd2b44d06a3a4c
 Size (kikadf-chromium-audioio-v130.0.tar.gz) = 7824 bytes
@@ -1382,6 +1382,7 @@ SHA1 (patch-ui_ozone_platform_headless_ozone__platform__headless.cc) = aa6d200c9
 SHA1 (patch-ui_ozone_platform_headless_vulkan__implementation__headless.cc) = 89d8a85629d6f7696ef6f6ac4bdad8c9ab5ebfb2
 SHA1 (patch-ui_ozone_platform_wayland_common_wayland__util.cc) = 69e025754ab7c10f26fbed2ed35c3accfae1827a
 SHA1 (patch-ui_ozone_platform_wayland_gpu_vulkan__implementation__wayland.cc) = cc65a479fdfe5bfaa31e08a09d8ec45a9f4e5528
+SHA1 (patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc) = 09c9b3ce6558cda23e63d5815535ba6324259154
 SHA1 (patch-ui_ozone_platform_wayland_host_zwp__text__input__wrapper__v1.cc) = 5b94773ee9ccf9c0ff98f828951f192fac0df6b2
 SHA1 (patch-ui_ozone_platform_x11_vulkan__implementation__x11.cc) = 7fd972d2fb841b9f98821955cff78ac22f970204
 SHA1 (patch-ui_ozone_platform_x11_x11__screen__ozone.cc) = e4058fb8112205c81ea25e7db6cca66ce4e7600f
diff --git a/chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc b/chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc
new file mode 100644
index 0000000000..53f93ed051
--- /dev/null
+++ b/chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc
@@ -0,0 +1,19 @@
+$NetBSD$
+
+* Part of patchset to build chromium on NetBSD
+* Based on OpenBSD's chromium patches, and
+  pkgsrc's qt5-qtwebengine patches
+
+--- ui/ozone/platform/wayland/host/wayland_frame_manager.cc.orig	2025-05-15 16:17:47.857547304 +0000
++++ ui/ozone/platform/wayland/host/wayland_frame_manager.cc
+@@ -461,8 +461,10 @@ std::optional<bool> WaylandFrameManager:
+   surface->UpdateBufferDamageRegion(
+       gfx::ToEnclosingRectIgnoringError(surface_damage));
+ 
++#if !BUILDFLAG(IS_BSD)
+   if (!config.access_fence_handle.is_null())
+     surface->set_acquire_fence(std::move(config.access_fence_handle));
++#endif
+ 
+   bool needs_commit = false;
+ 


Home | Main Index | Thread Index | Old Index