non port: devel/kf5-kio/files |
SVNWeb
|
Number of commits found: 8 |
Wed, 17 Jun 2020
|
[ 10:45 tcberner ] (Only the first 10 of 142 ports in this commit are shown above. )
Update KDE Frameworks to 5.71.0
June 06, 2020. KDE today announces the release of KDE Frameworks 5.71.0.
KDE Frameworks are over 70 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well tested
libraries with friendly licensing terms. For an introduction see the KDE
Frameworks web page.
This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.
Announcement:
https://kde.org/announcements/kde-frameworks-5.71.0
Exp-run by: antoine
PR: 247240
|
Sun, 24 May 2020
|
[ 20:22 tcberner ]
devel/kf5-kio: add upstream bug fix: "Could not find the program 'konsole'"
From upstrams [1] bug report
Fix service file specifying 'Run in terminal' giving an error code 100
Happens because KIO::DesktopExecParser::resultingArguments() prepends
the terminal application to the command line. If this is a relative path,
as it is most likely to be (and will be in the default 'konsole' case),
the "realExecutable" check in KProcessRunner::KProcessRunner() is triggered
and the job aborts with an error.
Expand the specified terminal executable into a full path in
resultingArguments(),
and return an error immediately if it cannot be found. This full terminal path
is not relative for the KProcessRunner::KProcessRunner() check and does not
fail.
Check that resultingArguments() is not empty (an error return) before accessing
the first word of the command, so that it does not assert if the list is empty.
Also only call resultingArguments() once.
[1] https://bugs.kde.org/show_bug.cgi?id=421374
PR: 246659
Reported by: Serge Volkov <sv@ulstu.ru>
|
Sun, 17 Nov 2019
|
[ 11:06 tcberner ] (Only the first 10 of 91 ports in this commit are shown above. )
Update KDE Frameworks to 5.64.0
November 10, 2019. KDE today announces the release of KDE Frameworks 5.64.0. [1]
KDE Frameworks are over 70 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well tested
libraries with friendly licensing terms. For an introduction see the KDE
Frameworks web page.
This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.
Noteably, there is one FreeBSD specific change:
* KCoreAddons
- KProcessInfoList -- add proclist backend for FreeBSD
[1] https://kde.org/announcements/kde-frameworks-5.64.0.php
PR: 241852
Exp-run by: antoine
|
Fri, 8 Nov 2019
|
[ 08:13 tcberner ]
devel/kf5-kio: add upstream patch for nextcloud calendar support.
Upstream PR:
https://bugs.kde.org/show_bug.cgi?id=413316
PR: 241741
Reported by: Greg Rivers <gcr@tharned.org>
|
Mon, 12 Nov 2018
|
[ 18:31 tcberner ] (Only the first 10 of 150 ports in this commit are shown above. )
Update KDE Frameworks to 5.52.0
PR: 233107
Exp-run by: antoine
|
Sat, 20 Oct 2018
|
[ 18:07 tcberner ]
devel/kf5-kio: add upstream patch to fix crash when accessing help
Obtained
from: https://cgit.kde.org/kio.git/commit/?id=cf3b0d102855a4a90db3fb65a99e0009fcdd3755
|
Fri, 17 Mar 2017
|
[ 06:27 tcberner ] (Only the first 10 of 84 ports in this commit are shown above. )
Update KDE Frameworks to 5.32
* While here, set the MASTER_SITES for the portingAids separately.
* Stop to couple kirigamis' distfiles with kf5 until it's actually a part of it.
PR: 217709
Exp-Run by: antoine
Reviewed by: rakuco
Approved by: rakuco (mentor)
Differential Revision: https://reviews.freebsd.org/D9959
|
Sat, 11 Mar 2017
|
[ 10:28 tcberner ]
Adress CVE-2017-6410 in devel/kf5-kio and x11/kdelibs4
Using a malicious PAC file, and then using exfiltration methods in the PAC
function FindProxyForURL() enables the attacker to expose full https URLs.
This is a security issue since https URLs may contain sensitive
information in the URL authentication part (user:password@host), and in the
path and the query (e.g. access tokens).
This attack can be carried out remotely (over the LAN) since proxy settings
allow ``Detect Proxy Configuration Automatically''
This setting uses WPAD to retrieve the PAC file, and an attacker who has access
to the victim's LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP)
and inject his/her own malicious PAC instead of the legitimate one.
Reviewed by: mat, rakuco
Approved by: rakuco (mentor), mat (mentor)
Obtained from: https://marc.info/?l=kde-announce&m=148831226706885&w=2
MFH: 2017Q1
Security: CVE-2017-6410
Differential Revision: https://reviews.freebsd.org/D9908
|
Number of commits found: 8 |