all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
blob a6c3253758eee5ca41b4d0996feac5b5b2275da2 1699 bytes (raw)
name: gnu/packages/patches/gnome-shell-CVE-2017-8288.patch 	 # note: path name is non-authoritative(*)

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
 
Fix CVE-2017-8288:

http://seclists.org/oss-sec/2017/q2/136

Patch copied from upstream source repository:

https://git.gnome.org/browse/gnome-shell/commit/?id=ff425d1db7082e2755d2a405af53861552acf2a1

From ff425d1db7082e2755d2a405af53861552acf2a1 Mon Sep 17 00:00:00 2001
From: Emilio Pozuelo Monfort <pochu27@gmail.com>
Date: Tue, 25 Apr 2017 17:27:42 +0200
Subject: extensionSystem: handle reloading broken extensions

Some extensions out there may fail to reload. When that happens,
we need to catch any exceptions so that we don't leave things in
a broken state that could lead to leaving extensions enabled in
the screen shield.

https://bugzilla.gnome.org/show_bug.cgi?id=781728
---
 js/ui/extensionSystem.js | 12 ++++++++++--
 1 file changed, 10 insertions(+), 2 deletions(-)

diff --git a/js/ui/extensionSystem.js b/js/ui/extensionSystem.js
index a4dc29e..fc352b8 100644
--- a/js/ui/extensionSystem.js
+++ b/js/ui/extensionSystem.js
@@ -282,12 +282,20 @@ function _onVersionValidationChanged() {
     // temporarily disable them all
     enabledExtensions = [];
     for (let uuid in ExtensionUtils.extensions)
-        reloadExtension(ExtensionUtils.extensions[uuid]);
+        try {
+            reloadExtension(ExtensionUtils.extensions[uuid]);
+        } catch(e) {
+            logExtensionError(uuid, e);
+        }
     enabledExtensions = getEnabledExtensions();
 
     if (Main.sessionMode.allowExtensions) {
         enabledExtensions.forEach(function(uuid) {
-            enableExtension(uuid);
+            try {
+                enableExtension(uuid);
+            } catch(e) {
+                logExtensionError(uuid, e);
+            }
         });
     }
 }
-- 
cgit v0.12


debug log:

solving a6c325375 ...
found a6c325375 in https://yhetil.org/guix/2mJLT7Z/wQdanXzCpACTLW@bec4dusrlz0aOI14CUJvM/

applying [1/1] https://yhetil.org/guix/2mJLT7Z/wQdanXzCpACTLW@bec4dusrlz0aOI14CUJvM/
diff --git a/gnu/packages/patches/gnome-shell-CVE-2017-8288.patch b/gnu/packages/patches/gnome-shell-CVE-2017-8288.patch
new file mode 100644
index 000000000..a6c325375

1:45: trailing whitespace.
 
1:57: trailing whitespace.
-- 
Checking patch gnu/packages/patches/gnome-shell-CVE-2017-8288.patch...
1:59: new blank line at EOF.
+
Applied patch gnu/packages/patches/gnome-shell-CVE-2017-8288.patch cleanly.
warning: 3 lines add whitespace errors.

index at:
100644 a6c3253758eee5ca41b4d0996feac5b5b2275da2	gnu/packages/patches/gnome-shell-CVE-2017-8288.patch

(*) Git path names are given by the tree(s) the blob belongs to.
    Blobs themselves have no identifier aside from the hash of its contents.^

Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.