diff options
Diffstat (limited to 'devel/electron38/files/patch-remoting_host_mojo__caller__security__checker.cc')
-rw-r--r-- | devel/electron38/files/patch-remoting_host_mojo__caller__security__checker.cc | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/devel/electron38/files/patch-remoting_host_mojo__caller__security__checker.cc b/devel/electron38/files/patch-remoting_host_mojo__caller__security__checker.cc new file mode 100644 index 000000000000..87180d437c55 --- /dev/null +++ b/devel/electron38/files/patch-remoting_host_mojo__caller__security__checker.cc @@ -0,0 +1,29 @@ +--- remoting/host/mojo_caller_security_checker.cc.orig 2025-06-30 07:04:30 UTC ++++ remoting/host/mojo_caller_security_checker.cc +@@ -32,7 +32,7 @@ namespace { + namespace remoting { + namespace { + +-#if BUILDFLAG(IS_LINUX) ++#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD) + constexpr auto kAllowedCallerProgramNames = + base::MakeFixedFlatSet<base::FilePath::StringViewType>({ + "remote-open-url", +@@ -60,7 +60,7 @@ bool IsTrustedMojoEndpoint( + const named_mojo_ipc_server::ConnectionInfo& caller) { + #if BUILDFLAG(IS_MAC) + return IsProcessTrusted(caller.audit_token, kAllowedIdentifiers); +-#elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) ++#elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_BSD) + + // TODO: yuweih - see if it's possible to move away from PID-based security + // checks, which might be susceptible of PID reuse attacks. +@@ -84,7 +84,7 @@ bool IsTrustedMojoEndpoint( + base::FilePath::StringType program_name = + caller_process_image_path.BaseName().value(); + if (!kAllowedCallerProgramNames.contains(program_name)) { +-#if BUILDFLAG(IS_LINUX) && !defined(NDEBUG) ++#if (BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_BSD)) && !defined(NDEBUG) + // Linux binaries generated in out/Debug are underscore-separated. To make + // debugging easier, we just check the name again with underscores replaced + // with hyphens. |