…d the “arbitrary code execution from unsanitized input” bug that the Arch Linux Wiki mentions here for the xdg-user-dirs utility, by replacing the shell script with a C binary. Thanks to everyone who contributed to this release! Allan Day @aday GNOME Foundation Update, 2026-04-17…
…d the “arbitrary code execution from unsanitized input” bug that the Arch Linux Wiki mentions here for the xdg-user-dirs utility, by replacing the shell script with a C binary. Thanks to everyone who contributed to this release! Allan Day @aday GNOME Foundation Update, 2026-04-17…
…see RTT and interpret it as a spurious 0x0C, and ignore it. References [JCroft, Wikipedia] gives a different way of signalling 'Y', which does not coincide with any of the other symbols. This discrepancy between the current specification and the references may also result in both…
…see RTT and interpret it as a spurious 0x0C, and ignore it. References [JCroft, Wikipedia] gives a different way of signalling 'Y', which does not coincide with any of the other symbols. This discrepancy between the current specification and the references may also result in both…