summaryrefslogtreecommitdiff
path: root/user/okular/CVE-2020-9359.patch
blob: 34ff3e2ce3edc521ecbf703a33d64f75c483bf9c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
From 6a93a033b4f9248b3cd4d04689b8391df754e244 Mon Sep 17 00:00:00 2001
From: Albert Astals Cid <aacid@kde.org>
Date: Tue, 10 Mar 2020 23:07:24 +0100
Subject: [PATCH] Document::processAction: If the url points to a binary, don't
 run it

---
 core/document.cpp | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/core/document.cpp b/core/document.cpp
index 3215a1abc..0aa5b6980 100644
--- a/core/document.cpp
+++ b/core/document.cpp
@@ -4388,7 +4388,8 @@ void Document::processAction( const Action * action )
                 {
                     const QUrl realUrl = KIO::upUrl(d->m_url).resolved(url);
                     // KRun autodeletes
-                    new KRun( realUrl, d->m_widget );
+                    KRun *r = new KRun( realUrl, d->m_widget );
+                    r->setRunExecutables(false);
                 }
             }
             } break;
-- 
2.25.2