summaryrefslogtreecommitdiffstats
path: root/source/kde/kde/patch/dolphin.patch
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-12-20 20:40:18 +0000
committer Eric Hameleers <alien@slackware.com>2022-12-20 22:34:22 +0100
commita1d6f79ce8795d190466bd6e4cc3c191df8741e9 (patch)
tree27389af065425da0b60d20a760ccde265489ebc7 /source/kde/kde/patch/dolphin.patch
parent4f53dfead2169d2c8e9d22b1cdb5ed71083fb9b4 (diff)
downloadcurrent-a1d6f79ce8795d190466bd6e4cc3c191df8741e9.tar.gz
current-a1d6f79ce8795d190466bd6e4cc3c191df8741e9.tar.xz
Tue Dec 20 20:40:18 UTC 202220221220204018
d/p2c-2.02-x86_64-1.txz: Upgraded. kde/dolphin-22.12.0-x86_64-2.txz: Rebuilt. [PATCH] Revert "portalize drag urls" Thanks to marav. l/gst-plugins-bad-free-1.20.5-x86_64-1.txz: Upgraded. l/gst-plugins-base-1.20.5-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.20.5-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.20.5-x86_64-1.txz: Upgraded. l/gstreamer-1.20.5-x86_64-1.txz: Upgraded. l/libqalculate-4.5.0-x86_64-1.txz: Upgraded. l/libvncserver-0.9.14-x86_64-1.txz: Upgraded. l/sdl-1.2.15-x86_64-14.txz: Rebuilt. This update fixes a heap overflow problem in video/SDL_pixels.c in SDL. By crafting a malicious .BMP file, an attacker can cause the application using this library to crash, denial of service, or code execution. Thanks to marav for the heads-up. For more information, see: https://www.cve.org/CVERecord?id=CVE-2021-33657 (* Security fix *) n/gnupg2-2.2.41-x86_64-1.txz: Upgraded. n/libksba-1.6.3-x86_64-1.txz: Upgraded. Fix another integer overflow in the CRL's signature parser. (* Security fix *) x/libSM-1.2.4-x86_64-1.txz: Upgraded. x/xcb-util-0.4.1-x86_64-1.txz: Upgraded. x/xdriinfo-1.0.7-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/kde/kde/patch/dolphin.patch')
-rw-r--r--source/kde/kde/patch/dolphin.patch2
1 files changed, 2 insertions, 0 deletions
diff --git a/source/kde/kde/patch/dolphin.patch b/source/kde/kde/patch/dolphin.patch
index 2e29b7fe5..8606b43d8 100644
--- a/source/kde/kde/patch/dolphin.patch
+++ b/source/kde/kde/patch/dolphin.patch
@@ -1,2 +1,4 @@
# Let the user decide whether it wants to run Dolphin as root:
cat $CWD/patch/dolphin/dolphin_revert_noroot.patch | patch -p1 --verbose || { touch ${SLACK_KDE_BUILD_DIR}/${PKGNAME}.failed ; continue ; }
+
+cat $CWD/patch/dolphin/c8aed8ac.patch | patch -p1 --verbose || { touch ${SLACK_KDE_BUILD_DIR}/${PKGNAME}.failed ; continue ; }