← Back to team overview

linux-traipu team mailing list archive

[Bug 1084852] Re: Chromium still tries to enable NEON on arm* builds when told not to

 

This bug was fixed in the package chromium-browser -
23.0.1271.97-0ubuntu0.12.04.1

---------------
chromium-browser (23.0.1271.97-0ubuntu0.12.04.1) precise-security; urgency=low

  * Omit resources/extension/demo files from any packaging verification
    because they're unwanted.
  * Update README.source to include some of these changes.
  * Drop "lzma" from build dependencies.
  * Make most patches follow a common format (no timestamps), to avoid
    future churn.
  * debian/patches/chromium_useragent.patch.in renamed to drop ".in",
    OS "Ubuntu" hardcoded with no compilation-release name, and patch
    refreshed to follow new location of source.
  * In debian/rules, use "-delete" flag on find instead of "-exec rm {} \;",
    to be safer and faster.
  * Also don't include python bytecode or cache files in orig tarball,
    and clean then up on "clean" rule.
  * Write the "REMOVED" list files to the root of the orig tarball,
    instead of inside the src/ directory, where they could collide.
  * Fix dpkg-source warning: Clean up python cached bytecode files.
  * Fix dpkg-source warning: Remove autoconf cache.
  * Fix lintian warning: fta and micahg to XSBC-Original-Maintainer.
  * Fix lintian error not-binnmuable-all-depends-any.
  * Override lintian complaints ancient-autotools-helper-file and
    unused-build-dependency-on-cdbs.
  * debian/patches/arm-neon.patch added to get ARM w/o Neon support.
    (LP: #1084852)
  * In debian/rules, avoid creating invalid subst expression in sed
    of DEBIAN* vars into files.
  * Remove unnecessary glib-header-single-entry.patch .
  * Add patches/struct-siginfo.patch to work around source bug in dereferencing
    internal stuct instead of public type.
  * New upstream version 23.0.1271.97
    - CVE-2012-5139: Use-after-free with visibility events.
    - CVE-2012-5140: Use-after-free in URL loader.
    - CVE-2012-5141: Limit Chromoting client plug-in instantiation.
    - CVE-2012-5142: Crash in history navigation.
    - CVE-2012-5143: Integer overflow in PPAPI image buffers.
    - CVE-2012-5144: Stack corruption in AAC decoding.

chromium-browser (23.0.1271.95-0ubuntu0.12.04.1) UNRELEASED; urgency=low

  [ Micah Gersten <micahg@xxxxxxxxxx> ]
  * New upstream version 23.0.1271.95 (LP: #1086613)
    - CVE-2012-5138: Incorrect file path handling.
    - CVE-2012-5137: Use-after-free in media source handling.
  * Hardcode Ubuntu in Chromium user agent patch; Drop release specific part
    similar to what was done with Firefox; Drop from subst_files in rules
    - rename debian/patches/chromium_useragent.patch.in => debian/patches/chromium_useragent.patch
    - update debian/patches/chromium_useragent.patch
    - update debian/rules
  * Disable user agent patch for the moment as it doesn't apply cleanly
    - update debian/patches/series
  * Switch to xz binary packages, use Pre-Depends on dpkg (>= 1.15.6~)
    - update debian/control
  * Drop armhf FTBFS patch as it's been superseded by upstream changes
    - drop debian/patches/fix-armhf-ftbfs.patch
    - update debian/patches/series

  [ Chad Miller <chad.miller@xxxxxxxxxxxxx> ]
  * Add localization support for ast, bs, en-AU, eo, hy, ia, ka, ku, kw, ms.
  * No longer include Launchpad-generated translations.
  * Disable grd_parse_fix.patch
  * No longer expect unpacked tarball to contain "build-tree".
  * Fix build warning about missing debian/source/format.  Set to "3.0
    (quilt)".
  * Make system-v8 patch use "type none" instead of "type settings".; Leave
    Patch disabled
  * Manually set DEB_{BUILD,HOST}_ARCH when not already set, like when the
    executing program is not dpkg-buildpackage.
  * Make rules file generate LASTCHANGE file at new location.
  * Change get-sources command to kill script when it fails to disable
    gyp-chromium run from DEPS. Never fail silently again.
  * Drop SCM revision from the version.
  * New upstream version 23.0.1271.91
    - CVE-2012-5133: Use-after-free in SVG filters.
    - CVE-2012-5130: Out-of-bounds read in Skia.
    - CVE-2012-5132: Browser crash with chunked encoding.
    - CVE-2012-5134: Buffer underflow in libxml.
    - CVE-2012-5135: Use-after-free with printing.
    - CVE-2012-5136: Bad cast in input element handling.
  * Includes CVE fixes for 23.0.1271.64
    - CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP
      handling.
    - CVE-2012-5120: Out-of-bounds array access in v8.
    - CVE-2012-5116: Use-after-free in SVG filter handling.
    - CVE-2012-5121: Use-after-free in video layout.
    - CVE-2012-5117: Inappropriate load of SVG subresource in img context.
    - CVE-2012-5119: Race condition in Pepper buffer handling.
    - CVE-2012-5122: Bad cast in input handling.
    - CVE-2012-5123: Out-of-bounds reads in Skia.
    - CVE-2012-5124: Memory corruption in texture handling.
    - CVE-2012-5125: Use-after-free in extension tab handling.
    - CVE-2012-5126: Use-after-free in plug-in placeholder handling.
    - CVE-2012-5128: Bad write in v8.
  * Includes CVE fixes for 22.0.1229.94
    - CVE-2012-5112: SVG use-after-free and IPC arbitrary file write.
  * Includes CVE fixes for 22.0.1229.92
    - CVE-2012-2900: Crash in Skia text rendering.
    - CVE-2012-5108: Race condition in audio device handling.
    - CVE-2012-5109: OOB read in ICU regex.
    - CVE-2012-5110: Out-of-bounds read in compositor.
    - CVE-2012-5111: Plug-in crash monitoring was missing for Pepper plug-ins.
  * Includes CVE fixes for 22.0.1229.79
    - CVE-2012-2889: UXSS in frame handling.
    - CVE-2012-2886: UXSS in v8 bindings.
    - CVE-2012-2881: DOM tree corruption with plug-ins.
    - CVE-2012-2876: Buffer overflow in SSE2 optimizations.
    - CVE-2012-2883: Out-of-bounds write in Skia.
    - CVE-2012-2887: Use-after-free in onclick handling.
    - CVE-2012-2888: Use-after-free in SVG text references.
    - CVE-2012-2894: Crash in graphics context handling.
    - CVE-2012-2877: Browser crash with extensions and modal dialogs.
    - CVE-2012-2879: DOM topology corruption.
    - CVE-2012-2884: Out-of-bounds read in Skia.
    - CVE-2012-2874: Out-of-bounds write in Skia.
    - CVE-2012-2878: Use-after-free in plug-in handling.
    - CVE-2012-2880: Race condition in plug-in paint buffer.
    - CVE-2012-2882: Wild pointer in OGG container handling.
    - CVE-2012-2885: Possible double free on exit.
    - CVE-2012-2891: Address leak over IPC.
    - CVE-2012-2892: Pop-up block bypass.
    - CVE-2012-2893: Double free in XSL transforms.
  * Includes CVE fixes for 21.0.1180.89
    - CVE-2012-2865: Out-of-bounds read in line breaking.
    - CVE-2012-2866: Bad cast with run-ins.
    - CVE-2012-2867: Browser crash with SPDY.
    - CVE-2012-2868: Race condition with workers and XHR.
    - CVE-2012-2869: Avoid stale buffer in URL loading.
    - CVE-2012-2870: Lower severity memory management issues in XPath.
    - CVE-2012-2871: Bad cast in XSL transforms.
    - CVE-2012-2872: XSS in SSL interstitial.
  * Includes CVE fixes for 21.0.1180.57
    - CVE-2012-2846: Cross-process interference in renderers.
    - CVE-2012-2847: Missing re-prompt to user upon excessive downloads.
    - CVE-2012-2848: Overly broad file access granted after drag+drop.
    - CVE-2012-2849: Off-by-one read in GIF decoder.
    - CVE-2012-2853: webRequest can interfere with the Chrome Web Store.
    - CVE-2012-2854: Leak of pointer values to WebUI renderers.
    - CVE-2012-2857: Use-after-free in CSS DOM.
    - CVE-2012-2858: Buffer overflow in WebP decoder.
    - CVE-2012-2859: Crash in tab handling.
    - CVE-2012-2860: Out-of-bounds access when clicking in date picker.
  * Includes CVE fixes for 20.0.1132.57
    - CVE-2012-2842: Use-after-free in counter handling.
    - CVE-2012-2843: Use-after-free in layout height tracking.
 -- Chad Miller <chad.miller@xxxxxxxxxxxxx>   Sat, 12 Jan 2013 18:49:00 -0600

** Changed in: chromium-browser (Ubuntu Precise)
       Status: Triaged => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2842

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2843

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2846

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2847

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2848

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2849

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2853

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2854

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2857

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2858

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2859

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2860

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2865

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2866

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2867

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2868

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2869

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2870

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2871

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2872

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2874

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2876

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2877

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2878

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2879

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2880

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2881

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2882

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2883

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2884

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2885

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2886

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2887

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2888

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2889

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2891

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2892

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2893

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2894

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2900

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5108

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5109

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5110

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5111

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5112

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5116

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5117

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5119

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5120

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5121

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5122

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5123

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5124

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5125

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5126

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5127

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5128

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5130

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5132

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5133

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5134

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5135

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5136

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5137

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5138

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5139

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5140

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5141

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5142

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5143

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5144

** Changed in: chromium-browser (Ubuntu)
       Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3083

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3084

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3085

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3086

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3087

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3088

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3089

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3090

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3091

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3092

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3093

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3094

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3095

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3096

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3100

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3101

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3102

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3103

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3104

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3105

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3106

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3107

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3108

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3109

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3111

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3115

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2807

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2815

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2817

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2818

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2819

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2820

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2821

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2823

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2824

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2825

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2826

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2829

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2830

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2831

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2834

-- 
You received this bug notification because you are a member of UBUNTU -
AL - BR, which is subscribed to Chromium Browser.
https://bugs.launchpad.net/bugs/1084852

Title:
  Chromium still tries to enable NEON  on arm* builds when told not to

Status in Chromium Browser:
  Unknown
Status in “chromium-browser” package in Ubuntu:
  Fix Released
Status in “chromium-browser” source package in Oneiric:
  Triaged
Status in “chromium-browser” source package in Precise:
  Fix Released
Status in “chromium-browser” source package in Quantal:
  Fix Released

Bug description:
  When passing 'arm_float_abi=hard  arm_thumb=1 arm_neon=0 arm_fpu=vfpv3-d16 target_arch=arm', Chromium still tries to build with NEON:
  /usr/lib/gcc/arm-linux-gnueabihf/4.7/include/arm_neon.h:32:2: error: #error You must enable NEON instructions (e.g. -mfloat-abi=softfp -mfpu=neon) to use arm_neon.h
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c: In function 'WebRtcIsacfix_AutocorrNeon':
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:44:3: error: unknown type name 'int16x4_t'
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:45:3: error: unknown type name 'int64x1_t'
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:46:3: error: unknown type name 'int64x1_t'
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:47:3: error: unknown type name 'int32x4_t'
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:48:3: error: unknown type name 'int64x2_t'
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:48:3: warning: implicit declaration of function 'vdupq_n_s64' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:53:5: warning: implicit declaration of function 'vld1_s16' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:54:5: warning: implicit declaration of function 'vmull_s16' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:55:5: warning: implicit declaration of function 'vpadalq_s32' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:57:3: warning: implicit declaration of function 'vget_low_s64' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:58:3: warning: implicit declaration of function 'vget_high_s64' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:59:3: warning: implicit declaration of function 'vadd_s64' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:76:3: warning: implicit declaration of function 'vshl_s64' [-Wimplicit-function-declaration]
  third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.c:79:3: warning: implicit declaration of function 'vget_lane_s64' [-Wimplicit-function-declaration]
  make[1]: *** [out/Release/obj.target/isac_neon/third_party/webrtc/modules/audio_coding/codecs/isac/fix/source/filters_neon.o] Error 1
  make[1]: *** Waiting for unfinished jobs....

  Full log:
  https://launchpadlibrarian.net/124450518/buildlog_ubuntu-raring-armhf.chromium-browser_23.0.1271.91-0ubuntu1_FAILEDTOBUILD.txt.gz

  http://code.google.com/p/chromium/wiki/LinuxChromiumArm might have
  information to help (thanks infinity)

To manage notifications about this bug go to:
https://bugs.launchpad.net/chromium-browser/+bug/1084852/+subscriptions