diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-12-20 20:40:18 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-12-20 22:34:22 +0100 |
commit | a1d6f79ce8795d190466bd6e4cc3c191df8741e9 (patch) | |
tree | 27389af065425da0b60d20a760ccde265489ebc7 /source/kde/kde/patch/dolphin.patch | |
parent | 4f53dfead2169d2c8e9d22b1cdb5ed71083fb9b4 (diff) | |
download | current-a1d6f79ce8795d190466bd6e4cc3c191df8741e9.tar.gz current-a1d6f79ce8795d190466bd6e4cc3c191df8741e9.tar.xz |
Tue Dec 20 20:40:18 UTC 202220221220204018
d/p2c-2.02-x86_64-1.txz: Upgraded.
kde/dolphin-22.12.0-x86_64-2.txz: Rebuilt.
[PATCH] Revert "portalize drag urls"
Thanks to marav.
l/gst-plugins-bad-free-1.20.5-x86_64-1.txz: Upgraded.
l/gst-plugins-base-1.20.5-x86_64-1.txz: Upgraded.
l/gst-plugins-good-1.20.5-x86_64-1.txz: Upgraded.
l/gst-plugins-libav-1.20.5-x86_64-1.txz: Upgraded.
l/gstreamer-1.20.5-x86_64-1.txz: Upgraded.
l/libqalculate-4.5.0-x86_64-1.txz: Upgraded.
l/libvncserver-0.9.14-x86_64-1.txz: Upgraded.
l/sdl-1.2.15-x86_64-14.txz: Rebuilt.
This update fixes a heap overflow problem in video/SDL_pixels.c in SDL.
By crafting a malicious .BMP file, an attacker can cause the application
using this library to crash, denial of service, or code execution.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2021-33657
(* Security fix *)
n/gnupg2-2.2.41-x86_64-1.txz: Upgraded.
n/libksba-1.6.3-x86_64-1.txz: Upgraded.
Fix another integer overflow in the CRL's signature parser.
(* Security fix *)
x/libSM-1.2.4-x86_64-1.txz: Upgraded.
x/xcb-util-0.4.1-x86_64-1.txz: Upgraded.
x/xdriinfo-1.0.7-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/kde/kde/patch/dolphin.patch')
-rw-r--r-- | source/kde/kde/patch/dolphin.patch | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/source/kde/kde/patch/dolphin.patch b/source/kde/kde/patch/dolphin.patch index 2e29b7fe5..8606b43d8 100644 --- a/source/kde/kde/patch/dolphin.patch +++ b/source/kde/kde/patch/dolphin.patch @@ -1,2 +1,4 @@ # Let the user decide whether it wants to run Dolphin as root: cat $CWD/patch/dolphin/dolphin_revert_noroot.patch | patch -p1 --verbose || { touch ${SLACK_KDE_BUILD_DIR}/${PKGNAME}.failed ; continue ; } + +cat $CWD/patch/dolphin/c8aed8ac.patch | patch -p1 --verbose || { touch ${SLACK_KDE_BUILD_DIR}/${PKGNAME}.failed ; continue ; } |