summaryrefslogtreecommitdiff
path: root/www/iridium/files/patch-ppapi_proxy_flash__resource.cc
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2020-07-23 16:31:18 +0000
committerRene Ladan <rene@FreeBSD.org>2020-07-23 16:31:18 +0000
commit651302b592fe54c5197641402df87ff216c27903 (patch)
tree784a10fc6050d3be8786fd6f4f954d7802bd9204 /www/iridium/files/patch-ppapi_proxy_flash__resource.cc
parentAdd compiler:c++14-lang to USES to atttempt to fix on GCC-based systems: (diff)
www/iridium: update to 2020.04.81
PR: 245959 Submitted by: Matthias Wolf MFH: 2020Q3 Security: any Chromium vulnerability between 73 and 81
Diffstat (limited to 'www/iridium/files/patch-ppapi_proxy_flash__resource.cc')
-rw-r--r--www/iridium/files/patch-ppapi_proxy_flash__resource.cc11
1 files changed, 11 insertions, 0 deletions
diff --git a/www/iridium/files/patch-ppapi_proxy_flash__resource.cc b/www/iridium/files/patch-ppapi_proxy_flash__resource.cc
new file mode 100644
index 000000000000..a45deba61a6e
--- /dev/null
+++ b/www/iridium/files/patch-ppapi_proxy_flash__resource.cc
@@ -0,0 +1,11 @@
+--- ppapi/proxy/flash_resource.cc.orig 2019-09-16 10:01:18 UTC
++++ ppapi/proxy/flash_resource.cc
+@@ -136,7 +136,7 @@ double FlashResource::GetLocalTimeZoneOffset(PP_Instan
+ // require filesystem access prohibited by the sandbox.
+ // TODO(shess): Figure out why OSX needs the access, the sandbox warmup should
+ // handle it. http://crbug.com/149006
+-#if defined(OS_LINUX) || defined(OS_MACOSX)
++#if defined(OS_LINUX) || defined(OS_MACOSX) || defined(OS_BSD)
+ int32_t result = SyncCall<PpapiPluginMsg_Flash_GetLocalTimeZoneOffsetReply>(
+ BROWSER,
+ PpapiHostMsg_Flash_GetLocalTimeZoneOffset(PPTimeToTime(t)),