summaryrefslogtreecommitdiffstats
path: root/source/kde/kde/patch
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-11-17 01:49:28 +0000
committer Eric Hameleers <alien@slackware.com>2022-11-17 07:00:14 +0100
commit01d68a3996f2c3ec8237df2fcdfe01da7f00066f (patch)
treea03e0fd198c67bf533921b3c79b041971f6ea493 /source/kde/kde/patch
parent7925f7cd1734e470a902a02163ba11365d91141b (diff)
downloadcurrent-01d68a3996f2c3ec8237df2fcdfe01da7f00066f.tar.gz
current-01d68a3996f2c3ec8237df2fcdfe01da7f00066f.tar.xz
Thu Nov 17 01:49:28 UTC 202220221117014928
ap/man-db-2.11.1-x86_64-1.txz: Upgraded. ap/nano-7.0-x86_64-1.txz: Upgraded. ap/sqlite-3.40.0-x86_64-1.txz: Upgraded. kde/plasma-framework-5.100.0-x86_64-2.txz: Rebuilt. [PATCH] svgitem: do not upscale svg when using fractional scaling. l/netpbm-11.00.02-x86_64-1.txz: Upgraded. n/bind-9.18.9-x86_64-1.txz: Upgraded. n/krb5-1.20.1-x86_64-1.txz: Upgraded. Fixed integer overflows in PAC parsing. Fixed null deref in KDC when decoding invalid NDR. Fixed memory leak in OTP kdcpreauth module. Fixed PKCS11 module path search. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-42898 (* Security fix *) n/samba-4.17.3-x86_64-1.txz: Upgraded. Fixed a security issue where Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap. For more information, see: https://www.samba.org/samba/security/CVE-2022-42898.html https://www.cve.org/CVERecord?id=CVE-2022-42898 (* Security fix *) x/libXft-2.3.7-x86_64-1.txz: Upgraded. x/wayland-protocols-1.29-noarch-1.txz: Upgraded. xap/mozilla-firefox-107.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/107.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-47/ https://www.cve.org/CVERecord?id=CVE-2022-45403 https://www.cve.org/CVERecord?id=CVE-2022-45404 https://www.cve.org/CVERecord?id=CVE-2022-45405 https://www.cve.org/CVERecord?id=CVE-2022-45406 https://www.cve.org/CVERecord?id=CVE-2022-45407 https://www.cve.org/CVERecord?id=CVE-2022-45408 https://www.cve.org/CVERecord?id=CVE-2022-45409 https://www.cve.org/CVERecord?id=CVE-2022-45410 https://www.cve.org/CVERecord?id=CVE-2022-45411 https://www.cve.org/CVERecord?id=CVE-2022-45412 https://www.cve.org/CVERecord?id=CVE-2022-45413 https://www.cve.org/CVERecord?id=CVE-2022-40674 https://www.cve.org/CVERecord?id=CVE-2022-45415 https://www.cve.org/CVERecord?id=CVE-2022-45416 https://www.cve.org/CVERecord?id=CVE-2022-45417 https://www.cve.org/CVERecord?id=CVE-2022-45418 https://www.cve.org/CVERecord?id=CVE-2022-45419 https://www.cve.org/CVERecord?id=CVE-2022-45420 https://www.cve.org/CVERecord?id=CVE-2022-45421 (* Security fix *) xap/mozilla-thunderbird-102.5.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.5.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2022-49/ https://www.cve.org/CVERecord?id=CVE-2022-45403 https://www.cve.org/CVERecord?id=CVE-2022-45404 https://www.cve.org/CVERecord?id=CVE-2022-45405 https://www.cve.org/CVERecord?id=CVE-2022-45406 https://www.cve.org/CVERecord?id=CVE-2022-45408 https://www.cve.org/CVERecord?id=CVE-2022-45409 https://www.cve.org/CVERecord?id=CVE-2022-45410 https://www.cve.org/CVERecord?id=CVE-2022-45411 https://www.cve.org/CVERecord?id=CVE-2022-45412 https://www.cve.org/CVERecord?id=CVE-2022-45416 https://www.cve.org/CVERecord?id=CVE-2022-45418 https://www.cve.org/CVERecord?id=CVE-2022-45420 https://www.cve.org/CVERecord?id=CVE-2022-45421 (* Security fix *) xfce/xfce4-settings-4.16.5-x86_64-1.txz: Upgraded. This update fixes regressions in the previous security fix: mime-settings: Properly quote command parameters. Revert "Escape characters which do not belong into an URI/URL (Issue #390)."
Diffstat (limited to 'source/kde/kde/patch')
-rw-r--r--source/kde/kde/patch/plasma-framework.patch1
-rw-r--r--source/kde/kde/patch/plasma-framework/159f9dbd6f9378c9d1943f83f13fce7c47e3d8b2.patch27
2 files changed, 28 insertions, 0 deletions
diff --git a/source/kde/kde/patch/plasma-framework.patch b/source/kde/kde/patch/plasma-framework.patch
new file mode 100644
index 000000000..0e7a73bfa
--- /dev/null
+++ b/source/kde/kde/patch/plasma-framework.patch
@@ -0,0 +1 @@
+cat $CWD/patch/plasma-framework/159f9dbd6f9378c9d1943f83f13fce7c47e3d8b2.patch | patch -p1 --verbose || { touch ${SLACK_KDE_BUILD_DIR}/${PKGNAME}.failed ; continue ; }
diff --git a/source/kde/kde/patch/plasma-framework/159f9dbd6f9378c9d1943f83f13fce7c47e3d8b2.patch b/source/kde/kde/patch/plasma-framework/159f9dbd6f9378c9d1943f83f13fce7c47e3d8b2.patch
new file mode 100644
index 000000000..490386b19
--- /dev/null
+++ b/source/kde/kde/patch/plasma-framework/159f9dbd6f9378c9d1943f83f13fce7c47e3d8b2.patch
@@ -0,0 +1,27 @@
+From 159f9dbd6f9378c9d1943f83f13fce7c47e3d8b2 Mon Sep 17 00:00:00 2001
+From: Fushan Wen <qydwhotmail@gmail.com>
+Date: Tue, 15 Nov 2022 13:09:10 +0800
+Subject: [PATCH] svgitem: do not upscale svg when using fractional scaling
+
+BUG: 461682
+FIXED-IN: 5.101
+---
+ src/declarativeimports/core/svgitem.cpp | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/src/declarativeimports/core/svgitem.cpp b/src/declarativeimports/core/svgitem.cpp
+index b9ef54c09..7fbbe837e 100644
+--- a/src/declarativeimports/core/svgitem.cpp
++++ b/src/declarativeimports/core/svgitem.cpp
+@@ -166,7 +166,7 @@ void SvgItem::updateDevicePixelRatio()
+ } else {
+ m_svg.data()->setDevicePixelRatio(qMax<qreal>(1.0, std::ceil(qApp->devicePixelRatio())));
+ }
+- m_svg.data()->setScaleFactor(qMax<qreal>(1.0, std::ceil(Units::instance().devicePixelRatio())));
++ m_svg.data()->setScaleFactor(qMax<qreal>(1.0, Units::instance().devicePixelRatio()));
+ }
+ }
+
+--
+GitLab
+