slackware-current/patches/source/qt5/profile.d/qt5.csh
Patrick J Volkerding 29c65b6804 Mon Mar 21 20:24:16 UTC 2022
patches/packages/bind-9.16.27-x86_64-1_slack15.0.txz:  Upgraded.
  Sorry folks, I had not meant to bump BIND to the newer branch. I've moved
  the other packages into /testing. Thanks to Nobby6 for pointing this out.
  This update fixes bugs and the following security issues:
  A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer()
  to be called recursively, which in turn left TCP connections hanging in the
  CLOSE_WAIT state blocking indefinitely when out-of-order processing was
  disabled.
  The rules for acceptance of records into the cache have been tightened to
  prevent the possibility of poisoning if forwarders send records outside
  the configured bailiwick.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
  (* Security fix *)
testing/packages/bind-9.18.1-x86_64-1_slack15.0.txz:  Moved.
2022-03-22 13:30:01 +01:00

27 lines
1.1 KiB
Tcsh

#!/bin/csh
# Environment path variables for the Qt package:
if ( ! $?QT5DIR ) then
# It's best to use the generic directory to avoid
# compiling in a version-containing path:
if ( -d /usr/lib@LIBDIRSUFFIX@/qt5 ) then
setenv QT5DIR /usr/lib@LIBDIRSUFFIX@/qt5
else
# Find the newest Qt directory and set $QT5DIR to that:
foreach qtd ( /usr/lib@LIBDIRSUFFIX@/qt5-* )
if ( -d $qtd ) then
setenv QT5DIR $qtd
endif
end
endif
endif
set path = ( $path $QT5DIR/bin )
# Unfortunately Chromium and derived projects (including QtWebEngine) seem
# to be suffering some bitrot when it comes to 32-bit support, so we are
# forced to disable the seccomp filter sandbox on 32-bit or else all of these
# applications crash. If anyone has a patch that gets these things running on
# 32-bit without this workaround, please let volkerdi or alienBOB know, or
# post your solution on LQ. Thanks. :-)
file /bin/cat | grep -wq 32-bit
if ( "$?" == "0" ) then
setenv QTWEBENGINE_CHROMIUM_FLAGS "--disable-seccomp-filter-sandbox"
endif