summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Dmitry Shachnev [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
support ARMv4 architecture, needed for armel builds
Forwarded: no
Last-Update: 2016-07-01
Gbp-Pq: Name armv4.diff
Dmitry Shachnev [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
catch linker warnings in some config tests
Forwarded: https://codereview.qt-project.org/163214 (rejected)
Bug: https://bugs.debian.org/827935
Last-Update: 2019-03-02
Without this, qmake wrongly thinks that the tests succeed, for example:
./config.tests/unix/futimens/futimens.cpp:44: warning: futimens is not implemented and will always fail
test config.corelib.tests.futimens succeeded
Gbp-Pq: Name gnukfreebsd_linker_warnings.diff
Fathi Boudra [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
build ibase sql plugin against firebird
Forwarded: no
Last-Update: 2017-06-30
Gbp-Pq: Name link_fbclient.diff
Lisandro Damián Nicanor Pérez Meyer [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
remove non-used privacy-breach code
Forwarded: not-needed
Last-Update: 2015-02-18
This code makes Lintian unhappy. But we are really not using it, it only
gets inserted when building the online doc.
Anyways the best way to calm down Lintian is to simply remove it.
Gbp-Pq: Name remove_privacy_breaches.diff
Dmitry Shachnev [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
disable htmlinfo example which contains non-free files
Forwarded: not-needed
Last-Update: 2014-12-17
Gbp-Pq: Name no_htmlinfo_example.diff
Pino Toscano [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
Initial GNU/kFreeBSD support
Last-Update: 2015-06-03
Forwarded: no
- add a gnukfreebsd-g++ qmake mkspec, mostly copied from the hurd-g++ one
- properly use LD_LIBRARY_PATH on GNU/* systems
Gbp-Pq: Name gnukfreebsd.diff
Debian Qt/KDE Maintainers [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
QLibrary: fix deadlock caused by fix to QTBUG-39642
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
276fa8383a753576
Last-Update: 2020-04-17
Commit
ae6f73e8566fa76470937aca737141183929a5ec inserted a mutex around
the entire load_sys(). We had reasoned that deadlocks would only occur if
the object creation in instance() recursed into its own instance(),
which was already a bug. But we had forgotten that dlopen()/
LoadLibrary() executes initialization code from the module being loaded,
which could cause a recursion back into the same QPluginLoader or
QLibrary object. This recursion is benign because the module *is* loaded
and dlopen()/LoadLibrary() returns the same handle.
Gbp-Pq: Name fix_qlibrary_deadlock.diff
Debian Qt/KDE Maintainers [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
enable accessibility on Linux when org.a11y.Status IsEnabled is true
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
54886d7f81175ac6
Last-Update: 2020-04-16
Otherwise accessibility would only work when Orca is set to be started
in the session preference, and it would not work when running Orca or
compiz' zoom by hand.
The existing comment said that it was always true since gnome 3.6, but at
least in Debian 8's gnome 3.14, Debian 9's gnome 3.22, and Debian 10's
3.30 it is not always true, it is Orca which sets it on startup. Compiz's
focuspoll module also does so for people with low vision using zoom with
focus tracking.
Gbp-Pq: Name enable_a11y_on_linux.diff
Debian Qt/KDE Maintainers [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
add an expansion limit for entities
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
fd4be84d23a0db41
Last-Update: 2020-02-27
Recursively defined entities can easily exhaust all available
memory. Limit entity expansion to a default of 4096 characters to
avoid DoS attacks when a user loads untrusted content.
Added a setter and getter to allow modifying the expansion limit.
QXmlStreamReader does now by default limit the expansion of entities
to 4096 characters. Documents where a single entity expands to more
characters than the limit are not considered well formed. The limit
is there to avoid DoS attacks through recursively expanding entities
when loading untrusted content. The limit can be changed through the
QXmlStreamReader::setEntityExpansionLimit() method.
Gbp-Pq: Name CVE-2015-9541.diff
Dmitry Shachnev [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
qtbase-opensource-src (5.14.2+dfsg-4) unstable; urgency=medium
* Restore debian/patches/armv4.diff, it is still needed for clang
(see https://bugs.debian.org/963709#20 for details).
[dgit import unpatched qtbase-opensource-src 5.14.2+dfsg-4]
Dmitry Shachnev [Fri, 26 Jun 2020 16:47:18 +0000 (17:47 +0100)]
Import qtbase-opensource-src_5.14.2+dfsg-4.debian.tar.xz
[dgit import tarball qtbase-opensource-src 5.14.2+dfsg-4 qtbase-opensource-src_5.14.2+dfsg-4.debian.tar.xz]
Dmitry Shachnev [Sat, 18 Apr 2020 17:50:59 +0000 (18:50 +0100)]
Import qtbase-opensource-src_5.14.2+dfsg.orig.tar.xz
[dgit import orig qtbase-opensource-src_5.14.2+dfsg.orig.tar.xz]