Loading pkgs/kde/gear/kdeconnect-kde/default.nix +7 −0 Original line number Diff line number Diff line Loading @@ -10,6 +10,7 @@ wayland, wayland-protocols, libfakekey, fetchpatch, }: mkKdeDerivation { pname = "kdeconnect-kde"; Loading @@ -18,6 +19,12 @@ mkKdeDerivation { (replaceVars ./hardcode-sshfs-path.patch { sshfs = lib.getExe sshfs; }) # Fix CVE-2025-66270 (https://kde.org/info/security/advisory-20251128-1.txt) (fetchpatch { name = "CVE-2025-66270.patch"; url = "https://invent.kde.org/network/kdeconnect-kde/-/commit/4e53bcdd5d4c28bd9fefd114b807ce35d7b3373e.patch"; hash = "sha256-qtcXNJ5qL4xtZQ70R/wWVCzFGzXNltr6XTgs0fpkTi4="; }) ]; # Hardcoded as a QString, which is UTF-16 so Nix can't pick it up automatically Loading Loading
pkgs/kde/gear/kdeconnect-kde/default.nix +7 −0 Original line number Diff line number Diff line Loading @@ -10,6 +10,7 @@ wayland, wayland-protocols, libfakekey, fetchpatch, }: mkKdeDerivation { pname = "kdeconnect-kde"; Loading @@ -18,6 +19,12 @@ mkKdeDerivation { (replaceVars ./hardcode-sshfs-path.patch { sshfs = lib.getExe sshfs; }) # Fix CVE-2025-66270 (https://kde.org/info/security/advisory-20251128-1.txt) (fetchpatch { name = "CVE-2025-66270.patch"; url = "https://invent.kde.org/network/kdeconnect-kde/-/commit/4e53bcdd5d4c28bd9fefd114b807ce35d7b3373e.patch"; hash = "sha256-qtcXNJ5qL4xtZQ70R/wWVCzFGzXNltr6XTgs0fpkTi4="; }) ]; # Hardcoded as a QString, which is UTF-16 so Nix can't pick it up automatically Loading