summaryrefslogtreecommitdiff
path: root/www/chromium/files/patch-chrome_common_chrome__features.cc
diff options
context:
space:
mode:
authorConrad Meyer <cem@FreeBSD.org>2020-03-08 19:44:41 +0000
committerConrad Meyer <cem@FreeBSD.org>2020-03-08 19:44:41 +0000
commit01b2b9b6d686bc18bef1de49a5bf1bc05ebdb09d (patch)
treefddb8430ac8db17b2895d797431b5dd7b48af59b /www/chromium/files/patch-chrome_common_chrome__features.cc
parentgraphics/mesa-libs: Change default to use DRI3 (diff)
www/chromium: update to 80.0.3987.132
This addresses some security issues, including at least one Google admits was being exploited in the wild. For more, see: https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html PR: 244625 Approved by: jrm, rene Security: CVE-2020-6407, CVE-2020-6418 (in the wild), CVE-2020-6420 Differential Revision: https://reviews.freebsd.org/D23984
Diffstat (limited to 'www/chromium/files/patch-chrome_common_chrome__features.cc')
-rw-r--r--www/chromium/files/patch-chrome_common_chrome__features.cc10
1 files changed, 5 insertions, 5 deletions
diff --git a/www/chromium/files/patch-chrome_common_chrome__features.cc b/www/chromium/files/patch-chrome_common_chrome__features.cc
index 1cfaa32e1b67..40f57c3c5911 100644
--- a/www/chromium/files/patch-chrome_common_chrome__features.cc
+++ b/www/chromium/files/patch-chrome_common_chrome__features.cc
@@ -1,8 +1,8 @@
---- chrome/common/chrome_features.cc.orig 2019-12-16 21:51:24 UTC
+--- chrome/common/chrome_features.cc.orig 2020-03-03 18:53:53 UTC
+++ chrome/common/chrome_features.cc
-@@ -86,13 +86,13 @@ const base::Feature kAutoFetchOnNetErrorPage{"AutoFetc
- base::FEATURE_DISABLED_BY_DEFAULT};
- #endif // defined(OS_ANDROID)
+@@ -81,13 +81,13 @@ const base::Feature kAsyncDns {
+ #endif
+ };
-#if defined(OS_WIN) || defined(OS_LINUX)
+#if defined(OS_WIN) || defined(OS_LINUX) || defined(OS_BSD)
@@ -16,7 +16,7 @@
// Enables or disables whether permission prompts are automatically blocked
// after the user has explicitly dismissed them too many times.
-@@ -152,7 +152,7 @@ const base::Feature kThirdPartyModulesBlocking{
+@@ -147,7 +147,7 @@ const base::Feature kThirdPartyModulesBlocking{
const base::Feature kTLS13HardeningForLocalAnchors{
"TLS13HardeningForLocalAnchors", base::FEATURE_DISABLED_BY_DEFAULT};