QLibrary: fix deadlock caused by fix to QTBUG-39642
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
276fa8383a753576
Last-Update: 2020-04-17
Commit
ae6f73e8566fa76470937aca737141183929a5ec inserted a mutex around
the entire load_sys(). We had reasoned that deadlocks would only occur if
the object creation in instance() recursed into its own instance(),
which was already a bug. But we had forgotten that dlopen()/
LoadLibrary() executes initialization code from the module being loaded,
which could cause a recursion back into the same QPluginLoader or
QLibrary object. This recursion is benign because the module *is* loaded
and dlopen()/LoadLibrary() returns the same handle.
Gbp-Pq: Name fix_qlibrary_deadlock.diff
enable accessibility on Linux when org.a11y.Status IsEnabled is true
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
54886d7f81175ac6
Last-Update: 2020-04-16
Otherwise accessibility would only work when Orca is set to be started
in the session preference, and it would not work when running Orca or
compiz' zoom by hand.
The existing comment said that it was always true since gnome 3.6, but at
least in Debian 8's gnome 3.14, Debian 9's gnome 3.22, and Debian 10's
3.30 it is not always true, it is Orca which sets it on startup. Compiz's
focuspoll module also does so for people with low vision using zoom with
focus tracking.
Gbp-Pq: Name enable_a11y_on_linux.diff
add an expansion limit for entities
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
fd4be84d23a0db41
Last-Update: 2020-02-27
Recursively defined entities can easily exhaust all available
memory. Limit entity expansion to a default of 4096 characters to
avoid DoS attacks when a user loads untrusted content.
Added a setter and getter to allow modifying the expansion limit.
QXmlStreamReader does now by default limit the expansion of entities
to 4096 characters. Documents where a single entity expands to more
characters than the limit are not considered well formed. The limit
is there to avoid DoS attacks through recursively expanding entities
when loading untrusted content. The limit can be changed through the
QXmlStreamReader::setEntityExpansionLimit() method.
Gbp-Pq: Name CVE-2015-9541.diff