diff --git a/0001-Fix-build-with-glibc-2.34.patch b/0001-Fix-build-with-glibc-2.34.patch deleted file mode 100644 index a19ee39..0000000 --- a/0001-Fix-build-with-glibc-2.34.patch +++ /dev/null @@ -1,54 +0,0 @@ -From 6dc7ed884091eb373f72d53f2b87371cd899378e Mon Sep 17 00:00:00 2001 -From: Christophe Giboudeaux -Date: Wed, 11 Aug 2021 11:39:59 +0200 -Subject: [PATCH] Fix build with glibc 2.34 - ---- - .../abseil-cpp/absl/debugging/failure_signal_handler.cc | 3 ++- - .../breakpad/src/client/linux/handler/exception_handler.cc | 2 +- - 2 files changed, 3 insertions(+), 2 deletions(-) - -diff --git a/src/3rdparty/chromium/sandbox/linux/services/credentials.cc b/src/3rdparty/chromium/sandbox/linux/services/credentials.cc -index d7b5d8c4413..a62cb21bd7a 100644 ---- a/src/3rdparty/chromium/sandbox/linux/services/credentials.cc -+++ b/src/3rdparty/chromium/sandbox/linux/services/credentials.cc -@@ -98,7 +98,9 @@ bool ChrootToSafeEmptyDir() { - // attempt this optimization. - clone_flags |= CLONE_VM | CLONE_VFORK | CLONE_SETTLS; - -- char tls_buf[PTHREAD_STACK_MIN] = {0}; -+ const std::size_t pthread_stack_min = PTHREAD_STACK_MIN; -+ char tls_buf[pthread_stack_min]; -+ memset(tls_buf, 0, pthread_stack_min); - tls = tls_buf; - #endif - -diff --git a/src/3rdparty/chromium/third_party/abseil-cpp/absl/debugging/failure_signal_handler.cc b/src/3rdparty/chromium/third_party/abseil-cpp/absl/debugging/failure_signal_handler.cc -index 5d13bdbbbd1..2ed137b58f1 100644 ---- a/src/3rdparty/chromium/third_party/abseil-cpp/absl/debugging/failure_signal_handler.cc -+++ b/src/3rdparty/chromium/third_party/abseil-cpp/absl/debugging/failure_signal_handler.cc -@@ -135,7 +135,8 @@ static bool SetupAlternateStackOnce() { - #else - const size_t page_mask = sysconf(_SC_PAGESIZE) - 1; - #endif -- size_t stack_size = (std::max(SIGSTKSZ, 65536) + page_mask) & ~page_mask; -+ size_t stack_size = -+ (std::max(SIGSTKSZ, 65536) + page_mask) & ~page_mask; - #if defined(ABSL_HAVE_ADDRESS_SANITIZER) || \ - defined(ABSL_HAVE_MEMORY_SANITIZER) || defined(ABSL_HAVE_THREAD_SANITIZER) - // Account for sanitizer instrumentation requiring additional stack space. -diff --git a/src/3rdparty/chromium/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc b/src/3rdparty/chromium/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc -index ca353c40997..2e43ba6fc04 100644 ---- a/src/3rdparty/chromium/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc -+++ b/src/3rdparty/chromium/third_party/breakpad/breakpad/src/client/linux/handler/exception_handler.cc -@@ -138,7 +138,7 @@ void InstallAlternateStackLocked() { - // SIGSTKSZ may be too small to prevent the signal handlers from overrunning - // the alternative stack. Ensure that the size of the alternative stack is - // large enough. -- static const unsigned kSigStackSize = std::max(16384, SIGSTKSZ); -+ static const unsigned kSigStackSize = std::max(16384, SIGSTKSZ); - - // Only set an alternative stack if there isn't already one, or if the current - // one is too small. --- -2.32.0 diff --git a/_service b/_service index cc88636..05e61e3 100644 --- a/_service +++ b/_service @@ -1,11 +1,11 @@ enable - 5.15.7 + 5.15.8 git://code.qt.io/qt/qtwebengine.git git qtwebengine-everywhere-src - v5.15.7-lts + v5.15.8-lts *.tar diff --git a/_servicedata b/_servicedata index 1653656..ce3bf3b 100644 --- a/_servicedata +++ b/_servicedata @@ -1,4 +1,4 @@ git://code.qt.io/qt/qtwebengine.git - f0a1cb8da24518c03858b85378f9ad82b0603a1a \ No newline at end of file + 96e932d73057c3e705b849249fb02e1837b7576d \ No newline at end of file diff --git a/libqt5-qtwebengine.changes b/libqt5-qtwebengine.changes index 5606622..4aef853 100644 --- a/libqt5-qtwebengine.changes +++ b/libqt5-qtwebengine.changes @@ -1,3 +1,70 @@ +------------------------------------------------------------------- +Tue Jan 04 22:22:01 UTC 2022 - christophe@krop.fr + +- Update to version 5.15.8: + * Update Chromium: + [Backport] CVE-2021-3517: libxml2: Heap-based buffer overflow + in xmlEncodeEntitiesInternal() in entities.c + [Backport] CVE-2021-3541 libxml2: Exponential entity expansion + attack bypasses all existing protection mechanisms + [Backport] CVE-2021-37984 : Heap buffer overflow in PDFium + [Backport] CVE-2021-37987 : Use after free in Network APIs + [Backport] CVE-2021-37989 : Inappropriate implementation in Blink + [Backport] CVE-2021-37992 : Out of bounds read in WebAudio + [Backport] CVE-2021-37993 : Use after free in PDF Accessibility + [Backport] CVE-2021-37996 : Insufficient validation of untrusted + input in Downloads + [Backport] CVE-2021-38001 : Type Confusion in V8 + [Backport] CVE-2021-38003 : Inappropriate implementation in V8 + [Backport] CVE-2021-38005: Use after free in loader (1/3) + [Backport] CVE-2021-38005: Use after free in loader (2/3) + [Backport] CVE-2021-38005: Use after free in loader (3/3) + [Backport] CVE-2021-38007: Type Confusion in V8 + [Backport] CVE-2021-38009: Inappropriate implementation in cache + [Backport] CVE-2021-38010: Inappropriate implementation in serviceworkers + [Backport] CVE-2021-38012: Type Confusion in V8 + [Backport] CVE-2021-38015: Inappropriate implementation in input + [Backport] CVE-2021-38017: Insufficient policy enforcement in iframe + sandbox + [Backport] CVE-2021-38018: Inappropriate implementation in navigation + [Backport] CVE-2021-38019: Insufficient policy enforcement in CORS + [Backport] CVE-2021-38021: Inappropriate implementation in referrer + [Backport] CVE-2021-38022: Inappropriate implementation in WebAuthentication + [Backport] CVE-2021-4057: Use after free in file API + [Backport] CVE-2021-4058: Heap buffer overflow in ANGLE (1/2) + [Backport] CVE-2021-4058: Heap buffer overflow in ANGLE (2/2) + [Backport] CVE-2021-4059: Insufficient data validation in loader + [Backport] CVE-2021-4062: Heap buffer overflow in BFCache + [Backport] CVE-2021-4078: Type confusion in V8 + [Backport] CVE-2021-4079: Out of bounds write in WebRTC + [Backport] CVE-2021-4098: Insufficient data validation in Mojo + [Backport] CVE-2021-4099: Use after free in Swiftshader + [Backport] CVE-2021-4101: Heap buffer overflow in Swiftshader. + [Backport] CVE-2021-4102: Use after free in V8 + [Backport] Dependency for CVE-2021-37989 + [Backport] Dependency for CVE-2021-38009 + [Backport] Security bug 1245870 + [Backport] Security bug 1252858 + [Backport] Security bug 1259899 + Bump V8_PATCH_LEVEL + Compile with GCC 11 -std=c++20 + Fix stack overflow on gpu channel recreate with an error + Use wglSetPixelFormat directly only if in software mode + [Backport] Handle long SIGSTKSZ in glibc > 2.33 + [Backport] abseil-cpp: Fixes build with latest glibc + * Handle qtpdf compilation with static runtime + * Add bitcode support for qtpdf on ios + * Do not access accessibility from qt post routines + * Blacklist javascriptClipboard test on ubuntu 20.04 + * Re-enable network-service-in-process + * Bump version from 5.15.7 to 5.15.8 + * Update patch level + * Fix pinch gesture + * Fix leak of properties after XkbRF_GetNamesProp + * Fix leak on getDefaultScreeenId +- Drop patch: + * 0001-Fix-build-with-glibc-2.34.patch + ------------------------------------------------------------------- Fri Oct 29 09:53:05 UTC 2021 - christophe@krop.fr diff --git a/libqt5-qtwebengine.spec b/libqt5-qtwebengine.spec index 87624b7..c17bce5 100644 --- a/libqt5-qtwebengine.spec +++ b/libqt5-qtwebengine.spec @@ -29,15 +29,15 @@ %global _qtwebengine_dictionaries_dir %{_libqt5_datadir}/qtwebengine_dictionaries Name: libqt5-qtwebengine -Version: 5.15.7 +Version: 5.15.8 Release: 0 Summary: Qt 5 WebEngine Library License: LGPL-3.0-only OR GPL-2.0-only OR GPL-3.0-only Group: Development/Libraries/X11 URL: https://www.qt.io %define base_name libqt5 -%define real_version 5.15.7 -%define so_version 5.15.7 +%define real_version 5.15.8 +%define so_version 5.15.8 %define tar_version qtwebengine-everywhere-src-%{version} Source: %{tar_version}.tar.xz # PATCH-FIX-UPSTREAM armv6-ffmpeg-no-thumb.patch - Fix ffmpeg configuration for armv6 @@ -47,8 +47,6 @@ Patch1: disable-gpu-when-using-nouveau-boo-1005323.diff Patch2: sandbox-statx-futex_time64.patch # PATCH-FIX-OPENSUSE Patch3: rtc-dont-use-h264.patch -# PATCH-FIX-UPSTREAM -Patch4: 0001-Fix-build-with-glibc-2.34.patch # http://www.chromium.org/blink is not ported to PowerPC & s390 ExcludeArch: ppc ppc64 ppc64le s390 s390x # Try to fix i586 MemoryErrors with rpmlint diff --git a/qtwebengine-everywhere-src-5.15.7.tar.xz b/qtwebengine-everywhere-src-5.15.7.tar.xz deleted file mode 100644 index 39749a3..0000000 --- a/qtwebengine-everywhere-src-5.15.7.tar.xz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:3b7360ee119506bb89016f97ee0e5391fa5b3967b542f10092909feeaef460f7 -size 319447784 diff --git a/qtwebengine-everywhere-src-5.15.8.tar.xz b/qtwebengine-everywhere-src-5.15.8.tar.xz new file mode 100644 index 0000000..0f20b61 --- /dev/null +++ b/qtwebengine-everywhere-src-5.15.8.tar.xz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:acb9be08d9ef4ab59274953235c364181aab58d06feb4bff1845d43a70406975 +size 319364220