summaryrefslogtreecommitdiffstats
path: root/source/kde
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-08-23 19:27:56 +0000
committer Eric Hameleers <alien@slackware.com>2022-08-24 07:00:16 +0200
commitc08e498a00ff29b81f23b8b1d07618a85dcb15d5 (patch)
tree831481adac5c38739d86c578c6fc08ebbd0a4903 /source/kde
parent2f2ecd3ca0c65ea6d3c2acdd43fd0478d6c8e15d (diff)
downloadcurrent-c08e498a00ff29b81f23b8b1d07618a85dcb15d5.tar.gz
current-c08e498a00ff29b81f23b8b1d07618a85dcb15d5.tar.xz
Tue Aug 23 19:27:56 UTC 202220220823192756
ap/inxi-3.3.21_1-noarch-1.txz: Upgraded. d/ccache-4.6.2-x86_64-1.txz: Upgraded. d/parallel-20220822-noarch-1.txz: Upgraded. kde/kleopatra-22.08.0-x86_64-2.txz: Rebuilt. Patched to build with gpgme-1.18.0. l/babl-0.1.94-x86_64-1.txz: Upgraded. l/hunspell-1.7.1-x86_64-1.txz: Upgraded. Fixed invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707 (* Security fix *) l/libqalculate-4.3.0-x86_64-1.txz: Upgraded. n/ethtool-5.19-x86_64-1.txz: Upgraded. n/gpgme-1.18.0-x86_64-1.txz: Upgraded. n/nghttp2-1.49.0-x86_64-1.txz: Upgraded. x/ibus-1.5.27-x86_64-1.txz: Upgraded. x/libglvnd-1.5.0-x86_64-1.txz: Upgraded. xap/mozilla-firefox-104.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/104.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-33/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478 (* Security fix *) xap/mozilla-thunderbird-102.2.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.2.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2022-36/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478 (* Security fix *) extra/sendmail/sendmail-8.17.1-x86_64-4.txz: Rebuilt. In recent versions of glibc, USE_INET6 has been removed which caused sendmail to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the site.config.m4 allows the reverse lookups to work again fixing this issue. Thanks to talo. extra/sendmail/sendmail-cf-8.17.1-noarch-4.txz: Rebuilt.
Diffstat (limited to 'source/kde')
-rw-r--r--source/kde/kde/build/kleopatra2
-rw-r--r--source/kde/kde/patch/kleopatra.patch2
-rw-r--r--source/kde/kde/patch/kleopatra/a3684049dd4f0d2d47dcc6605ff31ce753254ef9.patch67
3 files changed, 70 insertions, 1 deletions
diff --git a/source/kde/kde/build/kleopatra b/source/kde/kde/build/kleopatra
index d00491fd7..0cfbf0888 100644
--- a/source/kde/kde/build/kleopatra
+++ b/source/kde/kde/build/kleopatra
@@ -1 +1 @@
-1
+2
diff --git a/source/kde/kde/patch/kleopatra.patch b/source/kde/kde/patch/kleopatra.patch
new file mode 100644
index 000000000..df864bb66
--- /dev/null
+++ b/source/kde/kde/patch/kleopatra.patch
@@ -0,0 +1,2 @@
+# Fix build with gpgme-1.18.0:
+cat $CWD/patch/kleopatra/a3684049dd4f0d2d47dcc6605ff31ce753254ef9.patch | patch -p1 --verbose || { touch ${SLACK_KDE_BUILD_DIR}/${PKGNAME}.failed ; continue ; }
diff --git a/source/kde/kde/patch/kleopatra/a3684049dd4f0d2d47dcc6605ff31ce753254ef9.patch b/source/kde/kde/patch/kleopatra/a3684049dd4f0d2d47dcc6605ff31ce753254ef9.patch
new file mode 100644
index 000000000..eb5f52460
--- /dev/null
+++ b/source/kde/kde/patch/kleopatra/a3684049dd4f0d2d47dcc6605ff31ce753254ef9.patch
@@ -0,0 +1,67 @@
+From a3684049dd4f0d2d47dcc6605ff31ce753254ef9 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Ingo=20Kl=C3=B6cker?= <dev@ingo-kloecker.de>
+Date: Fri, 19 Aug 2022 13:43:41 +0200
+Subject: [PATCH] Use ReceiveKeysJob for refreshing OpenPGP keys
+
+This refreshes the OpenPGP key from the configured key server.
+
+GnuPG-bug-id: 5903
+
+CHANGELOG: Fix building against QGpgME 1.18.0
+BUG: 458044
+FIXED-IN: 22.08.1
+
+(cherry picked from commit 87d8b00d4b2286489d5fadc9cfa07f1d721cdfe3)
+---
+ src/commands/refreshcertificatecommand.cpp | 12 ++++++------
+ 1 file changed, 6 insertions(+), 6 deletions(-)
+
+diff --git a/src/commands/refreshcertificatecommand.cpp b/src/commands/refreshcertificatecommand.cpp
+index 226d791f..6a88bbf4 100644
+--- a/src/commands/refreshcertificatecommand.cpp
++++ b/src/commands/refreshcertificatecommand.cpp
+@@ -19,7 +19,7 @@
+ #include <QGpgME/Protocol>
+ #ifdef QGPGME_SUPPORTS_KEY_REFRESH
+ #include <QGpgME/RefreshKeysJob>
+-#include <QGpgME/RefreshOpenPGPKeysJob>
++#include <QGpgME/ReceiveKeysJob>
+ #endif
+
+ #include <gpgme++/importresult.h>
+@@ -44,7 +44,7 @@ public:
+ void cancel();
+
+ #ifdef QGPGME_SUPPORTS_KEY_REFRESH
+- std::unique_ptr<QGpgME::RefreshOpenPGPKeysJob> startOpenPGPJob();
++ std::unique_ptr<QGpgME::ReceiveKeysJob> startOpenPGPJob();
+ std::unique_ptr<QGpgME::RefreshKeysJob> startSMIMEJob();
+ #endif
+ void onOpenPGPJobResult(const ImportResult &result);
+@@ -136,19 +136,19 @@ void RefreshCertificateCommand::Private::cancel()
+ }
+
+ #ifdef QGPGME_SUPPORTS_KEY_REFRESH
+-std::unique_ptr<QGpgME::RefreshOpenPGPKeysJob> RefreshCertificateCommand::Private::startOpenPGPJob()
++std::unique_ptr<QGpgME::ReceiveKeysJob> RefreshCertificateCommand::Private::startOpenPGPJob()
+ {
+- std::unique_ptr<QGpgME::RefreshOpenPGPKeysJob> refreshJob{QGpgME::openpgp()->refreshOpenPGPKeysJob()};
++ std::unique_ptr<QGpgME::ReceiveKeysJob> refreshJob{QGpgME::openpgp()->receiveKeysJob()};
+ Q_ASSERT(refreshJob);
+
+- connect(refreshJob.get(), &QGpgME::RefreshOpenPGPKeysJob::result,
++ connect(refreshJob.get(), &QGpgME::ReceiveKeysJob::result,
+ q, [this](const GpgME::ImportResult &result) {
+ onOpenPGPJobResult(result);
+ });
+ connect(refreshJob.get(), &QGpgME::Job::progress,
+ q, &Command::progress);
+
+- const GpgME::Error err = refreshJob->start({key});
++ const GpgME::Error err = refreshJob->start({QString::fromLatin1(key.primaryFingerprint())});
+ if (err) {
+ showError(err);
+ return {};
+--
+GitLab
+