Fix CVE-2020-9359 in okular
Okular can be tricked into executing local binaries via specially crafted PDF files: https://nvd.nist.gov/vuln/detail/CVE-2020-9359 https://kde.org/info/security/advisory-20200312-1.txt
This commit is contained in:
parent
67cfa0eff0
commit
9e9ddb9548
@ -1,9 +1,9 @@
|
||||
# $OpenBSD: Makefile,v 1.9 2020/03/29 19:43:33 rsadowski Exp $
|
||||
# $OpenBSD: Makefile,v 1.10 2020/03/31 05:01:46 rsadowski Exp $
|
||||
|
||||
COMMENT = KDE document viewer
|
||||
DISTNAME = okular-${VERSION}
|
||||
CATEGORIES = textproc
|
||||
REVISION = 0
|
||||
REVISION = 1
|
||||
|
||||
HOMEPAGE = https://okular.kde.org/
|
||||
|
||||
|
18
x11/kde-applications/okular/patches/patch-core_document_cpp
Normal file
18
x11/kde-applications/okular/patches/patch-core_document_cpp
Normal file
@ -0,0 +1,18 @@
|
||||
$OpenBSD: patch-core_document_cpp,v 1.1 2020/03/31 05:01:46 rsadowski Exp $
|
||||
|
||||
https://nvd.nist.gov/vuln/detail/CVE-2020-9359
|
||||
https://kde.org/info/security/advisory-20200312-1.txt
|
||||
|
||||
Index: core/document.cpp
|
||||
--- core/document.cpp.orig
|
||||
+++ core/document.cpp
|
||||
@@ -4352,7 +4352,8 @@ void Document::processAction( const Action * action )
|
||||
{
|
||||
const QUrl realUrl = KIO::upUrl(d->m_url).resolved(url);
|
||||
// KRun autodeletes
|
||||
- new KRun( realUrl, d->m_widget );
|
||||
+ KRun *r = new KRun( realUrl, d->m_widget );
|
||||
+ r->setRunExecutables(false);
|
||||
}
|
||||
}
|
||||
} break;
|
Loading…
Reference in New Issue
Block a user