~trebelnik-stefina/cinnamon-test/+git/Cinnamon:3.8-maintenance

Last commit made on 2018-09-11
Get this branch:
git clone -b 3.8-maintenance https://git.launchpad.net/~trebelnik-stefina/cinnamon-test/+git/Cinnamon

Branch merges

Branch information

Name:
3.8-maintenance
Repository:
lp:~trebelnik-stefina/cinnamon-test/+git/Cinnamon

Recent commits

574d0d7... by Clement Lefebvre <email address hidden>

3.8.9

de682b7... by Clement Lefebvre <email address hidden>

Spices.py: Fix connection to server with certain connexions

Fixes https://github.com/linuxmint/Cinnamon/issues/5926

e87d0d1... by Jason Hicks

deskletManager: Fix launcher-list gsetting resetting on desklet snap grid width change

84d08be... by Jason Hicks

popupMenu: Fix undefined _delegate property warning (#7706)

Cjs-Message: 03:25:55.954: JS WARNING:
[/usr/share/cinnamon/js/ui/popupMenu.js 2048]: reference to undefined
property "_delegate"

9ba4434... by Michael Webster

menu applet: Make sure the menu is fully reset when the search entry
is cleared (thru any means) and don't let the favorites Del key handler
steal keystrokes from an active search.

this.lastSelectedCategory is initialized to null. Set our category to
a dummy 'search' when a search begins, so _select_category(null)
completes properly when the search is cleared, instead of comparing null
and returning early.

Fixes #7764

0cafeb6... by Michael Webster

cs_sound.py: Gracefully handle input streams that don't have a name,
ignore streams created by sound effects and a11y utilities, and don't
add the same source id more than once.

cbb94ab... by Clement Lefebvre <email address hidden>

3.8.8

7029c90... by Michael Webster

network applet: Initialize CinnamonNetworkApplet._updateFrequencySeconds
before using in _periodicUpdateIcon.

1e7f2aa... by Clement Lefebvre <email address hidden>

3.8.7

66e54f4... by Matthias Gerstner <email address hidden>

cinnamon-settings-users.py: fix symlink attack vulnerability

This script runs as root and allows to configure e.g. other user's icon
files. These icon files are written to the respective user's $HOME/.face
location. If an unprivileged user prepares a symlink pointing to an
arbitrary location then this location will be overwritten with the icon
content. This vulnerability thus allows to corrupt the system or other
user's files. The content is not attacker controlled, luckily.

This change introduces temporary privilege drops to the target user's
privileges before attempting to write the respective .face files. This
way the kernel can decide if permissions are okay or not.