pkgsrc-WIP-changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
chromium: update to 136.0.7103.113
Module Name: pkgsrc-wip
Committed By: kikadf <kikadf.01%gmail.com@localhost>
Pushed By: kikadf
Date: Fri May 16 14:18:00 2025 +0200
Changeset: dcbb45dfeeb22e3c3509de430fea473d5688d4e0
Modified Files:
chromium/COMMIT_MSG
chromium/Makefile
chromium/distinfo
Added Files:
chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc
Log Message:
chromium: update to 136.0.7103.113
To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=dcbb45dfeeb22e3c3509de430fea473d5688d4e0
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diffstat:
chromium/COMMIT_MSG | 17 ++++++++++++++++-
chromium/Makefile | 2 +-
chromium/distinfo | 13 +++++++------
...e_platform_wayland_host_wayland__frame__manager.cc | 19 +++++++++++++++++++
4 files changed, 43 insertions(+), 8 deletions(-)
diffs:
diff --git a/chromium/COMMIT_MSG b/chromium/COMMIT_MSG
index 7363236555..0046f23927 100644
--- a/chromium/COMMIT_MSG
+++ b/chromium/COMMIT_MSG
@@ -1,4 +1,4 @@
-www/chromium: update to ***
+www/chromium: update to 136.0.7103.113
* 131.0.6778.264
This update includes 4 security fixes. Below, we highlight
@@ -275,3 +275,18 @@ Reported by Huang Xilin of Ant Group Light-Year Security Lab on 2025-04-20
As usual, our ongoing internal security work was responsible for a
wide range of fixes:
[415837391] Various fixes from internal audits, fuzzing and other initiatives
+
+* 136.0.7103.113
+This update includes 4 security fixes. Below, we highlight fixes
+that were contributed by external researchers. Please see the
+Chrome Security Page for more information.
+[N/A][415810136] High CVE-2025-4664: Insufficient policy enforcement
+in Loader. Source: X post from @slonser_ on 2025-05-05
+[TBD][412578726] High CVE-2025-4609: Incorrect handle provided in
+unspecified circumstances in Mojo. Reported by Micky on 2025-04-22
+Google is aware of reports that an exploit for CVE-2025-4664 exists
+in the wild.
+
+As usual, our ongoing internal security work was responsible for a
+wide range of fixes:
+[417268830] Various fixes from internal audits, fuzzing and other initiatives
diff --git a/chromium/Makefile b/chromium/Makefile
index bd783ca381..3b550860fa 100644
--- a/chromium/Makefile
+++ b/chromium/Makefile
@@ -1,7 +1,7 @@
# $NetBSD$
DISTNAME= chromium-${VERSION}
-VERSION= 136.0.7103.92
+VERSION= 136.0.7103.113
CATEGORIES= www
MASTER_SITES= https://commondatastorage.googleapis.com/chromium-browser-official/
EXTRACT_SUFX_C= .tar.xz
diff --git a/chromium/distinfo b/chromium/distinfo
index fb12dd3cd2..329f126b0f 100644
--- a/chromium/distinfo
+++ b/chromium/distinfo
@@ -1,11 +1,11 @@
$NetBSD$
-BLAKE2s (chromium-136.0.7103.92-testdata.tar.xz) = 5c0f1bb395618d0a1c9b9ad3ee2badca9418ba8d072ffc389de059b049cad60e
-SHA512 (chromium-136.0.7103.92-testdata.tar.xz) = 82d1c3a01d3859a9f0b311d9b75421bd5d9cc01ae13cfd9c7d18efbfa90768b6eae5fdafa84142b42c455c797f02471aa0d42995b00fc5a4d6e8f81c0d48f626
-Size (chromium-136.0.7103.92-testdata.tar.xz) = 651393856 bytes
-BLAKE2s (chromium-136.0.7103.92.tar.xz) = d60bc473fcab6277415b41831a5d50b803c664a72b2f71200e3d93cf116ac790
-SHA512 (chromium-136.0.7103.92.tar.xz) = 63cf064de6e6a17bfd6e337a7c8ae66a503275e6be0f119317c1d923d78d56e0cc2a906e84a3d173d9e584c696dd5276533b156a4f8ab368e53b2f350bee480a
-Size (chromium-136.0.7103.92.tar.xz) = 7188412240 bytes
+BLAKE2s (chromium-136.0.7103.113-testdata.tar.xz) = 8fc7b7d4fcf71eef8f67b19693ef48eb0c0ecbe28a3fcae289a99a1bdd8728a1
+SHA512 (chromium-136.0.7103.113-testdata.tar.xz) = 5eedfa17054056d5f7110bb7becd4ca77dc73ab2bcc0b722dbb591acbe15d6e569f26c988c59661763a1b239e9a18955975fbae4d172536f42e081674fdbb8d6
+Size (chromium-136.0.7103.113-testdata.tar.xz) = 651614116 bytes
+BLAKE2s (chromium-136.0.7103.113.tar.xz) = cb075c691969e8f5b6576eb4c8f262dde5e87759d3f2cf38147923242c1ec444
+SHA512 (chromium-136.0.7103.113.tar.xz) = 4a946b0d99ca6ccf7035877dbf3e2de28fe7f30960362a3886faa93d86cc84150a43b27feb512ce4aef8d9533bdbe26dd9788666d4822ee1e2053c1269c441fe
+Size (chromium-136.0.7103.113.tar.xz) = 7196537592 bytes
BLAKE2s (kikadf-chromium-audioio-v130.0.tar.gz) = 45fe07cb8280f81b8ef490059002da426b59fe69b5ebd53951fe1dc3e9495a10
SHA512 (kikadf-chromium-audioio-v130.0.tar.gz) = 840aed119dc69982f14fd5f4767e144bfc8a66672b660f0f05f5459070d7f6a36b8719ae7c0de049f7345dec39266759aedcdd5ee37aa4e98bcd2b44d06a3a4c
Size (kikadf-chromium-audioio-v130.0.tar.gz) = 7824 bytes
@@ -1382,6 +1382,7 @@ SHA1 (patch-ui_ozone_platform_headless_ozone__platform__headless.cc) = aa6d200c9
SHA1 (patch-ui_ozone_platform_headless_vulkan__implementation__headless.cc) = 89d8a85629d6f7696ef6f6ac4bdad8c9ab5ebfb2
SHA1 (patch-ui_ozone_platform_wayland_common_wayland__util.cc) = 69e025754ab7c10f26fbed2ed35c3accfae1827a
SHA1 (patch-ui_ozone_platform_wayland_gpu_vulkan__implementation__wayland.cc) = cc65a479fdfe5bfaa31e08a09d8ec45a9f4e5528
+SHA1 (patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc) = 09c9b3ce6558cda23e63d5815535ba6324259154
SHA1 (patch-ui_ozone_platform_wayland_host_zwp__text__input__wrapper__v1.cc) = 5b94773ee9ccf9c0ff98f828951f192fac0df6b2
SHA1 (patch-ui_ozone_platform_x11_vulkan__implementation__x11.cc) = 7fd972d2fb841b9f98821955cff78ac22f970204
SHA1 (patch-ui_ozone_platform_x11_x11__screen__ozone.cc) = e4058fb8112205c81ea25e7db6cca66ce4e7600f
diff --git a/chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc b/chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc
new file mode 100644
index 0000000000..53f93ed051
--- /dev/null
+++ b/chromium/patches/patch-ui_ozone_platform_wayland_host_wayland__frame__manager.cc
@@ -0,0 +1,19 @@
+$NetBSD$
+
+* Part of patchset to build chromium on NetBSD
+* Based on OpenBSD's chromium patches, and
+ pkgsrc's qt5-qtwebengine patches
+
+--- ui/ozone/platform/wayland/host/wayland_frame_manager.cc.orig 2025-05-15 16:17:47.857547304 +0000
++++ ui/ozone/platform/wayland/host/wayland_frame_manager.cc
+@@ -461,8 +461,10 @@ std::optional<bool> WaylandFrameManager:
+ surface->UpdateBufferDamageRegion(
+ gfx::ToEnclosingRectIgnoringError(surface_damage));
+
++#if !BUILDFLAG(IS_BSD)
+ if (!config.access_fence_handle.is_null())
+ surface->set_acquire_fence(std::move(config.access_fence_handle));
++#endif
+
+ bool needs_commit = false;
+
Home |
Main Index |
Thread Index |
Old Index