The release of 1.27.111 is inminent. I have the PKGBUILD ready in case alerque can't upload it.
I can confirm that:
- The systemd-resolved issues are fixed
- Printer preview is working fine (But I didn't test it on the previous version)
Git Clone URL: | https://aur.archlinux.org/brave-bin.git (read-only, click to copy) |
---|---|
Package Base: | brave-bin |
Description: | Web browser that blocks ads and trackers by default (binary release) |
Upstream URL: | https://brave.com |
Keywords: | brave browser |
Licenses: | BSD, MPL2, custom:chromium |
Conflicts: | brave |
Provides: | brave, brave-browser |
Submitter: | toropisco |
Maintainer: | alerque (alosarjos) |
Last Packager: | alosarjos |
Votes: | 823 |
Popularity: | 20.30 |
First Submitted: | 2016-04-06 13:16 (UTC) |
Last Updated: | 2024-11-20 18:19 (UTC) |
« First ‹ Previous 1 .. 18 19 20 21 22 23 24 25 26 27 28 .. 59 Next › Last »
The release of 1.27.111 is inminent. I have the PKGBUILD ready in case alerque can't upload it.
I can confirm that:
@the-k Yes at this point I'm sticking to my original position. You can take it up on the aur-general list or something if you want to make a scene, but to consider yourself warned. @mixedCase already outlined some of the issues with your position. Yes, practically EVERY browser update these days include security fixes of various grades and people should be running the absolute latest where possible.
The checksum in this packaging is basically only protecting you from not noticing a corrupted download file. Since it's not being published and signed upstream when this gets bumped it's basically just a blind download by me or somebody else and we slap the checksum we got on it. This is true of most AUR packages. It's basically just the maintainer saying "this is the one that worked for me". If you think that is a safeguard against browser security issues then, respectfully, you're guilty of security theater. At best it tells you your browser downloads are only being MITMed by the same party mine are and not some nefarious clown at your ISP.
To you are anyone else that wants a new version sooner than we push a bump here, download this repo, edit the pkgver to the one you want, and makepkg -sif --skipinteg
it.
Isn't systemd-resolved not the default DNS setup? I thought the arch install has something else for getting DNS working. By the very definition of it not being default Arch wouldn't an Arch user* have enough skills to fix the problem themselves?
*Distros based on Arch are not supported by the AUR as a best practice. They have their own forums for these issues.
@duhdugg: Tried it again on my computer at home. Same as on my office computer. Opening the print preview in 1.27.109 segfaults for me
leaving security to the user by default is a recipe for disaster
@the-k the AUR exists on the premise that the user has the necessary technical acumen to mitigate the risks of installing user-submitted packages. People using AUR helpers (and "friendly" derivatives) to upgrade packages without review is the much larger risk here.
That said, my argument could also be applied as a reason for bumping the version and telling the user to just reconfigure DNS (the user is just as capable of maintaining their system config for the packages they have installed). Either way, you decide whether to pull the latest changes from AUR and build your package from that. You are always free to fork the package or start your own repo. You may disagree with the maintainer's decision here, but he still doesn't owe you anything.
@CReimer no segfaults here on 1.27.109
. here is my PKGBUILD
I can't believe how people has reacted to having a single -bin package that has no dependants outdated for a few days.
There is a new 1.27 release being due for today or tomorrow which should fix all this.
I still can't believe the behaviour that some package managers have to handle for their work during their free time.
I hope I could help a bit providing as much info as I could on the bug and it's resolution upstream. Thanks a lot to mixedCase and now alerque for their time and effort.
Hoping we can see this package on the community repo at some point too.
@alerque So, are you sticking to your original position or are you gonna take an action? I see some input from other users, yet nobody's really weighing on the security aspect and the fact that leaving security to the user by default is a recipe for disaster.
I think there's another huge problem with the newer versions of Brave. Anyone else seeing segfaults in print preview?
The update to 1.27.108 is in the package history, so the following works for me (I'm using openresolv instead of systemd-resolved). No need to skip checksums.
$ git checkout 7339c3c && makepkg -sri
Many thanks to @mixedCase and @alerque for all their time and work.
Pinned Comments
alerque commented on 2021-11-27 03:11 (UTC)
@ant0n et all, lets keep the comments here about packaging issues, general Brave usage issues should go in another forum to not clutter up this comment space. I'm deleting comments that have no relation to packaging. Grey areas like crashes that could be blamed on Arch can stay until proven otherwise, but things like how to configure Brave to handle popups or site X or whatever just don't belong here. Thanks for understanding.