libsolid4_4.14.38-0ubuntu3.1_i386.deb


Advertisement

Description

libsolid4 - Solid Library for KDE Platform

Property Value
Distribution Ubuntu 18.04 LTS (Bionic Beaver)
Repository Ubuntu Updates Universe i386
Package filename libsolid4_4.14.38-0ubuntu3.1_i386.deb
Package name libsolid4
Package version 4.14.38
Package release 0ubuntu3.1
Package architecture i386
Package type deb
Category universe/libs
Homepage http://solid.kde.org/
License -
Maintainer Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
Download size 291.39 KB
Installed size 1.29 MB
Solid is a device integration framework. It provides a way of querying and
interacting with hardware independently of the underlying operating system.
This package is part of the KDE Development Platform libraries module.

Alternatives

Package Version Architecture Repository
libsolid4_4.14.38-0ubuntu3.1_amd64.deb 4.14.38 amd64 Ubuntu Updates Universe
libsolid4_4.14.38-0ubuntu3_i386.deb 4.14.38 i386 Ubuntu Universe
libsolid4_4.14.38-0ubuntu3_amd64.deb 4.14.38 amd64 Ubuntu Universe
libsolid4 - - -

Requires

Name Value
libc6 >= 2.11
libgcc1 >= 1:3.0
libqt4-dbus >= 4:4.8.0
libqt4-xml >= 4:4.8.0
libqtcore4 >= 4:4.8.0
libqtgui4 >= 4:4.8.0
libstdc++6 >= 5
libudev1 >= 183
udev -

Download

Type URL
Mirror archive.ubuntu.com
Binary Package libsolid4_4.14.38-0ubuntu3.1_i386.deb
Source Package kde4libs

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install libsolid4 deb package:
    # sudo apt-get install libsolid4

Changelog

2019-08-12 - Paulo Flabiano Smorigo <pfsmorigo@canonical.com>
kde4libs (4:4.14.38-0ubuntu3.1) bionic-security; urgency=medium
* SECURITY UPDATE: malicious .desktop files (and others) would execute
code (LP: #1839432).
- debian/patches/CVE-2019-14744.patch: remove support for $(...) in
config keys with [$e] marker.
- CVE-2019-14744
2018-02-10 - Dimitri John Ledkov <xnox@ubuntu.com>
kde4libs (4:4.14.38-0ubuntu3) bionic; urgency=medium
* Build against libssl1.0-dev, as otherwise autopkgtests fail.
2017-12-02 - Rik Mills <rikmills@kubuntu.org>
kde4libs (4:4.14.38-0ubuntu2) bionic; urgency=medium
* Drop kdelibs5-plugins depends on katepart as nothing uses this now
2017-12-01 - Rik Mills <rikmills@kubuntu.org>
kde4libs (4:4.14.38-0ubuntu1) bionic; urgency=medium
* New upstream release (4.14.38)
* Refresh all patches
* Drop upstream_fix_build_with_cmake_3.9.diff no longer required
2017-08-20 - Rik Mills <rikmills@kubuntu.org>
kde4libs (4:4.14.34-0ubuntu2) artful; urgency=medium
* We only support x86 and KDE4 is heading for the bin soon, so skip
tests on other archictectures
2017-08-18 - José Manuel Santamaría Lema <panfaust@gmail.com>
kde4libs (4:4.14.34-0ubuntu1) artful; urgency=medium
[ José Manuel Santamaría Lema ]
* New upstream release (4.14.32)
* New upstream release (4.14.33)
* Use the build-needed restriction for testsuite instead of rebuilding
the package in debian/tests/testsuite; this change needs pkg-kde-tools
0.15.24ubuntu2~ or higher
* Add kubuntu_disable_failing_tests.diff
* Update symbols files
* Improve the way the 'testsuite' autopkgtest is executed:
- create HOME directory
- set locale as 'C'
- add tzdata to Depends
* New upstream release (4.14.34)
[ Rik Mills ]
* debian/patches: add upstream_fix_build_with_cmake_3.9.diff to fix
FTBFS with cmake 3.9
* Update symbols from build logs for GCC7
2017-05-13 - Rik Mills <rikmills@kubuntu.org>
kde4libs (4:4.14.30-0ubuntu2) artful; urgency=medium
* SECURITY UPDATE: Local privilege escalation (LP: #1689759)
- debian/patches/kauth-local-privilege-esc-CVE-2017-8422.patch
- Thanks to Sebastian Krahmer for reporting this issue,
Albert Astals Cid for fixing this issue.
- CVE-2017-8422
2017-03-10 - José Manuel Santamaría Lema <panfaust@gmail.com>
kde4libs (4:4.14.30-0ubuntu1) zesty; urgency=low
[ Darin Miller ]
* New upstream release (4.14.29)
[ José Manuel Santamaría Lema ]
* New upstream release (4.14.30)
* Drop kio-sanitize-url-to-FindProxyForURL.patch, applied upstream.
2017-03-04 - Rik Mills <rikmills@kubuntu.org>
kde4libs (4:4.14.28-0ubuntu3) zesty; urgency=medium
* SECURITY UPDATE:Information Leak when accessing https when using a
malicious PAC file
- debian/patches/kio-sanitize-url-to-FindProxyForURL.patch
- Thanks to Safebreach Labs researchers Safebreach Labs researchers
Itzik Kotler, Yonatan Fridburg and Amit Klein for reporting this
issue, Albert Astals Cid for fixing this issue.
- No CVE number.
- fixes (LP: #1668871)
2017-02-08 - Clive Johnston <clivejo@kubuntu.org>
kde4libs (4:4.14.28-0ubuntu2) zesty; urgency=medium
* Removing libjasper-dev as per Debian lead
- Closes: 818205 & LP: 1612835

See Also

Package Description
libsolr-java_3.6.2+dfsg-18~18.04_all.deb Enterprise search server based on Lucene - Java libraries
libsox-dev_14.4.2-3ubuntu0.18.04.1_i386.deb Development files for the SoX library
libsox-fmt-all_14.4.2-3ubuntu0.18.04.1_i386.deb All SoX format libraries
libsox-fmt-alsa_14.4.2-3ubuntu0.18.04.1_i386.deb SoX alsa format I/O library
libsox-fmt-ao_14.4.2-3ubuntu0.18.04.1_i386.deb SoX Libao format I/O library
libsox-fmt-base_14.4.2-3ubuntu0.18.04.1_i386.deb Minimal set of SoX format libraries
libsox-fmt-mp3_14.4.2-3ubuntu0.18.04.1_i386.deb SoX MP2 and MP3 format library
libsox-fmt-oss_14.4.2-3ubuntu0.18.04.1_i386.deb SoX OSS format I/O library
libsox-fmt-pulse_14.4.2-3ubuntu0.18.04.1_i386.deb SoX PulseAudio format I/O library
libsox3_14.4.2-3ubuntu0.18.04.1_i386.deb SoX library of audio effects and processing
libspring-aop-java_4.3.22-1~18.04_all.deb modular Java/J2EE application framework - AOP
libspring-beans-java_4.3.22-1~18.04_all.deb modular Java/J2EE application framework - Beans
libspring-context-java_4.3.22-1~18.04_all.deb modular Java/J2EE application framework - Context
libspring-context-support-java_4.3.22-1~18.04_all.deb modular Java/J2EE application framework - Context Support
libspring-core-java_4.3.22-1~18.04_all.deb modular Java/J2EE application framework - Core
Advertisement
Advertisement