summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Dmitry Shachnev [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
support ARMv4 architecture, needed for armel builds
Forwarded: no
Last-Update: 2016-07-01
Gbp-Pq: Name armv4.diff
Dmitry Shachnev [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
catch linker warnings in some config tests
Forwarded: https://codereview.qt-project.org/163214 (rejected)
Bug: https://bugs.debian.org/827935
Last-Update: 2019-03-02
Without this, qmake wrongly thinks that the tests succeed, for example:
./config.tests/unix/futimens/futimens.cpp:44: warning: futimens is not implemented and will always fail
test config.corelib.tests.futimens succeeded
Gbp-Pq: Name gnukfreebsd_linker_warnings.diff
Fathi Boudra [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
build ibase sql plugin against firebird
Forwarded: no
Last-Update: 2017-06-30
Gbp-Pq: Name link_fbclient.diff
Lisandro Damián Nicanor Pérez Meyer [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
remove non-used privacy-breach code
Forwarded: not-needed
Last-Update: 2015-02-18
This code makes Lintian unhappy. But we are really not using it, it only
gets inserted when building the online doc.
Anyways the best way to calm down Lintian is to simply remove it.
Gbp-Pq: Name remove_privacy_breaches.diff
Dmitry Shachnev [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
disable htmlinfo example which contains non-free files
Forwarded: not-needed
Last-Update: 2014-12-17
Gbp-Pq: Name no_htmlinfo_example.diff
Pino Toscano [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
Initial GNU/kFreeBSD support
Last-Update: 2015-06-03
Forwarded: no
- add a gnukfreebsd-g++ qmake mkspec, mostly copied from the hurd-g++ one
- properly use LD_LIBRARY_PATH on GNU/* systems
Gbp-Pq: Name gnukfreebsd.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
OpenSSL: handle SSL_shutdown's errors properly
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
8ddffc6ba4f38bb8
Last-Update: 2020-08-19
Do not call SSL_shutdown on a session that is in handshake state (SSL_in_init(s)
returns 1). Also, do not call SSL_shutdown if a session encountered a fatal
error (SSL_ERROR_SYSCALL or SSL_ERROR_SSL was found before). If SSL_shutdown
was unsuccessful (returned code != 1), we have to clear the error(s) it queued.
Unfortunately, SSL_in_init was a macro in OpenSSL 1.0.x. We have to
resolve SSL_state to implement SSL_in_init.
Gbp-Pq: Name CVE-2020-13962.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
fix buffer overflow in XBM parser
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
1616c71921b73b22
Last-Update: 2020-08-18
Gbp-Pq: Name CVE-2020-17507.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
clarify warning message about PIC/PIE
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
e2265965083343aa
Last-Update: 2020-07-08
Gbp-Pq: Name clarify_pic_message.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
qmake: stop using -isystem flag
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
a5dd0b4e68724ecd
Last-Update: 2020-06-29
Gbp-Pq: Name no_isystem.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
moc: handle include directives in enums
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
98cb33115089eebc
Last-Update: 2020-06-29
When including files, moc inserts a MOC_INCLUDE_BEGIN and
MOC_INCLUDE_END token into the token stream. Those are already handled
in the toplevel Moc::parse function, but parseEnum lacked support so
far.
Gbp-Pq: Name moc_handle_includes.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
QLibrary: fix deadlock caused by fix to QTBUG-39642
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
276fa8383a753576
Last-Update: 2020-04-17
Commit
ae6f73e8566fa76470937aca737141183929a5ec inserted a mutex around
the entire load_sys(). We had reasoned that deadlocks would only occur if
the object creation in instance() recursed into its own instance(),
which was already a bug. But we had forgotten that dlopen()/
LoadLibrary() executes initialization code from the module being loaded,
which could cause a recursion back into the same QPluginLoader or
QLibrary object. This recursion is benign because the module *is* loaded
and dlopen()/LoadLibrary() returns the same handle.
Gbp-Pq: Name fix_qlibrary_deadlock.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
enable accessibility on Linux when org.a11y.Status IsEnabled is true
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
54886d7f81175ac6
Last-Update: 2020-04-16
Otherwise accessibility would only work when Orca is set to be started
in the session preference, and it would not work when running Orca or
compiz' zoom by hand.
The existing comment said that it was always true since gnome 3.6, but at
least in Debian 8's gnome 3.14, Debian 9's gnome 3.22, and Debian 10's
3.30 it is not always true, it is Orca which sets it on startup. Compiz's
focuspoll module also does so for people with low vision using zoom with
focus tracking.
Gbp-Pq: Name enable_a11y_on_linux.diff
Debian Qt/KDE Maintainers [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
add an expansion limit for entities
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
fd4be84d23a0db41
Last-Update: 2020-02-27
Recursively defined entities can easily exhaust all available
memory. Limit entity expansion to a default of 4096 characters to
avoid DoS attacks when a user loads untrusted content.
Added a setter and getter to allow modifying the expansion limit.
QXmlStreamReader does now by default limit the expansion of entities
to 4096 characters. Documents where a single entity expands to more
characters than the limit are not considered well formed. The limit
is there to avoid DoS attacks through recursively expanding entities
when loading untrusted content. The limit can be changed through the
QXmlStreamReader::setEntityExpansionLimit() method.
Gbp-Pq: Name CVE-2015-9541.diff
Dmitry Shachnev [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
qtbase-opensource-src (5.14.2+dfsg-6) unstable; urgency=medium
* Backport upstream patch to fix buffer overflow in XBM parser
(CVE-2020-17507, closes: #968444).
* Backport upstream patch to handle SSL_shutdown's errors properly
(CVE-2020-13962).
* Update symbols files from buildds’ logs.
[dgit import unpatched qtbase-opensource-src 5.14.2+dfsg-6]
Dmitry Shachnev [Wed, 19 Aug 2020 17:40:32 +0000 (18:40 +0100)]
Import qtbase-opensource-src_5.14.2+dfsg-6.debian.tar.xz
[dgit import tarball qtbase-opensource-src 5.14.2+dfsg-6 qtbase-opensource-src_5.14.2+dfsg-6.debian.tar.xz]
Dmitry Shachnev [Sat, 18 Apr 2020 17:50:59 +0000 (18:50 +0100)]
Import qtbase-opensource-src_5.14.2+dfsg.orig.tar.xz
[dgit import orig qtbase-opensource-src_5.14.2+dfsg.orig.tar.xz]