forked from pool/ungoogled-chromium
* CVE-2025-0762: Use after free in DevTools - Chromium 132.0.6834.110 (boo#1236306) * CVE-2025-0611: Object corruption in V8 * CVE-2025-0612: Out of bounds memory access in V8 - Chromium 132.0.6834.83 (stable released 2024-01-14) (bsc#1235892) * CVE-2025-0434: Out of bounds memory access in V8 * CVE-2025-0435: Inappropriate implementation in Navigation * CVE-2025-0436: Integer overflow in Skia * CVE-2025-0437: Out of bounds read in Metrics * CVE-2025-0438: Stack buffer overflow in Tracing * CVE-2025-0439: Race in Frames * CVE-2025-0440: Inappropriate implementation in Fullscreen * CVE-2025-0441: Inappropriate implementation in Fenced Frames * CVE-2025-0442: Inappropriate implementation in Payments * CVE-2025-0443: Insufficient data validation in Extensions * CVE-2025-0446: Inappropriate implementation in Extensions * CVE-2025-0447: Inappropriate implementation in Navigation * CVE-2025-0448: Inappropriate implementation in Compositing - dropped patches: * chromium-131-unbundle-enable-freetype.patch (upstream) - added patches: * chromium-8d882c289f17e3a67d6d67d5ff7e9d16ebb4f19a.patch (apply git upstream reverse for 15.x with llvm17) * chromium-93-ffmpeg-4.4-rest.patch (split off to only apply after the reverse) * chromium-132-old_libdrm.patch (applied only on 15.5 with libdrm < 2.4.116) * chromium-132-pdfium-explicit-template.patch OBS-URL: https://build.opensuse.org/package/show/network:chromium/ungoogled-chromium?expand=0&rev=98
20 lines
771 B
Diff
20 lines
771 B
Diff
--- chromium-131.0.6778.69/base/compiler_specific.h 2024/11/18 15:29:10 1.1
|
|
+++ chromium-131.0.6778.69/base/compiler_specific.h 2024/11/18 16:16:01
|
|
@@ -424,10 +424,12 @@
|
|
// // Stack canary checks will not be performed in this body.
|
|
// }
|
|
// ```
|
|
-#if __has_cpp_attribute(gnu::no_stack_protector)
|
|
-#define NO_STACK_PROTECTOR [[gnu::no_stack_protector]]
|
|
-#elif __has_cpp_attribute(gnu::optimize)
|
|
-#define NO_STACK_PROTECTOR [[gnu::optimize("-fno-stack-protector")]]
|
|
+#if defined(COMPILER_GCC) || defined(__clang__)
|
|
+#if HAS_ATTRIBUTE(__no_stack_protector__)
|
|
+#define NO_STACK_PROTECTOR __attribute__((__no_stack_protector__))
|
|
+#else
|
|
+#define NO_STACK_PROTECTOR __attribute__((__optimize__("-fno-stack-protector")))
|
|
+#endif
|
|
#else
|
|
#define NO_STACK_PROTECTOR
|
|
#endif
|