summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
QXmlStreamReader: Raise error on unexpected tokens
Origin: upstream, https://download.qt.io/official_releases/qt/5.15/CVE-2023-38197-qtbase-5.15.diff
Last-Update: 2023-07-15
QXmlStreamReader accepted multiple DOCTYPE elements, containing DTD
fragments in the XML prolog, and in the XML body.
Well-formed but invalid XML files - with multiple DTD fragments in
prolog and body, combined with recursive entity expansions - have
caused infinite loops in QXmlStreamReader.
This patch implements a token check in QXmlStreamReader.
A stream is allowed to start with an XML prolog. StartDocument
and DOCTYPE elements are only allowed in this prolog, which
may also contain ProcessingInstruction and Comment elements.
As soon as anything else is seen, the prolog ends.
After that, the prolog-specific elements are treated as unexpected.
Furthermore, the prolog can contain at most one DOCTYPE element.
Update the documentation to reflect the new behavior.
Add an autotest that checks the new error cases are correctly detected,
and no error is raised for legitimate input.
The original OSS-Fuzz files (see bug reports) are not included in this
patch for file size reasons. They have been tested manually. Each of
them has more than one DOCTYPE element, causing infinite loops in
recursive entity expansions. The newly implemented functionality
detects those invalid DTD fragments. By raising an error, it aborts
stream reading before an infinite loop occurs.
Thanks to OSS-Fuzz for finding this.
Gbp-Pq: Name CVE-2023-38197.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
QXmlStreamReader: make fastScanName() indicate parsing status to callers
Origin: upstream, commits
https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
1a423ce4372d18a7
https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
6326bec46a618c72
https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
bdc8dc51380d2ce4
https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
3bc3b8d69a291aa5
.
Based on KDE's backport:
https://invent.kde.org/qt/qt/qtbase/-/merge_requests/263
Last-Update: 2023-07-15
This fixes a crash while parsing an XML file with garbage data, the file
starts with '<' then garbage data:
- The loop in the parse() keeps iterating until it hits "case 262:",
which calls fastScanName()
- fastScanName() iterates over the text buffer scanning for the
attribute name (e.g. "xml:lang"), until it finds ':'
- Consider a Value val, fastScanName() is called on it, it would set
val.prefix to a number > val.len, then it would hit the 4096 condition
and return (returned 0, now it returns the equivalent of
std::null_opt), which means that val.len doesn't get modified, making
it smaller than val.prefix
- The code would try constructing an XmlStringRef with negative length,
which would hit an assert in one of QStringView's constructors
Add an assert to the XmlStringRef constructor.
Add unittest based on the file from the bug report.
Credit to OSS-Fuzz.
Gbp-Pq: Name CVE-2023-37369.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
fix capitalization error in auto-generated qdbusmacros.h include
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
dca0304c26012a57
Last-Update: 2023-05-13
Gbp-Pq: Name fix_qdbusmacros_h.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
OpenFile portal: do not use O_PATH fds
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
03cbcba7b2b0e42a
Last-Update: 2023-05-13
Using O_PATH requires correctly specifying whether the fd is writable or
not. Stating that the fd is writable without it actually being writable
results into rejection on xdg-desktop-portal side. Other implementations
like xdg-open or gtk have also moved away from O_PATH fds so this will
make a matching implementation and avoid possible rejections from xdp.
Gbp-Pq: Name dont_use_O_PATH.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
fix accessibility on XCB when running as root
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
db346e711c9af505
Bug: https://bugs.debian.org/
1033995
Last-Update: 2023-04-15
Accessibility actually works when running applications as root, but we
would never properly connect, since the enabledChanged signal would be
emitted from the constructor in this case. So after connecting the
signal, check the value by hand to make sure not to miss the
notification.
Only applications running as root would be affected, because all other
applications would go through the asynchronous pattern of getting the
bus address from dbus instead.
Gbp-Pq: Name a11y_root.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
QSQL/ODBC: fix regression (trailing NUL)
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
9020034b3b6a3a81
Last-Update: 2023-06-30
When we fixed the callers of toSQLTCHAR() to use the result's size()
instead of the input's (which differ, if sizeof(SQLTCHAR) != 2), we
exposed callers to the append(0), which changes the size() of the
result QVLA. Callers that don't rely on NUL-termination (all?) now saw
an additional training NUL.
Fix by not NUL-terminating, and changing the only user of SQL_NTS to
use an explicit length.
Gbp-Pq: Name sql_odbc_fix_unicode_check.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
SQL/ODBC: add another check to detect unicode availability in driver
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
f19320748d282b1e
Last-Update: 2023-06-30
Since ODBC does not have a direct way finding out if unicode is
supported by the underlying driver the ODBC plugin does some checks. As
a last resort a sql statement is executed which returns a string. But
even this may fail because the select statement has no FROM part which
is rejected by at least Oracle does not allow. Therefore add another
query which is correct for Oracle & DB2 as a workaround. The question
why the first three statements to check for unicode availability fail
is still open but can't be checked since I've no access to an oracle
database.
Gbp-Pq: Name sql_odbc_more_unicode_checks.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
Ssl: Copy the on-demand cert loading bool from default config
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
57ba6260c0801055
Last-Update: 2023-06-08
Otherwise individual sockets will still load system certificates when
a chain doesn't match against the configured CA certificates.
That's not intended behavior, since specifically setting the CA
certificates means you don't want the system certificates to be used.
This is potentially a breaking change because now, if you ever add a
CA to the default config, it will disable loading system certificates
on demand for all sockets. And the only way to re-enable it is to
create a null-QSslConfiguration and set it as the new default.
Gbp-Pq: Name CVE-2023-34410.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
QDnsLookup/Unix: make sure we don't overflow the buffer
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
7dba2c87619d558a
Last-Update: 2023-05-25
The DNS Records are variable length and encode their size in 16 bits
before the Record Data (RDATA). Ensure that both the RDATA and the
Record header fields before it fall inside the buffer we have.
Additionally reject any replies containing more than one query records.
Gbp-Pq: Name CVE-2023-33285.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
hsts: match header names case insensitively
Origin: upstream, https://download.qt.io/official_releases/qt/5.15/CVE-2023-32762-qtbase-5.15.diff
Last-Update: 2023-05-22
Header field names are always considered to be case-insensitive.
Gbp-Pq: Name CVE-2023-32762.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
fix buffer overflow in Qt SVG
Origin: upstream, https://download.qt.io/official_releases/qt/5.15/CVE-2023-32763-qtbase-5.15.diff
Last-Update: 2023-05-22
Adds qAddOverflow and qMulOverflow definitions to QFixed.
Gbp-Pq: Name CVE-2023-32763.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
do not set Qt::ToolTip flag for QShapedPixmapWindow
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
180b496b537089b8
Bug: https://bugreports.qt.io/browse/QTBUG-98048
Last-Update: 2023-05-20
This hint is not really needed in the first place and only causes
problems in some environments.
For example in KDE, the compositor animates changes in position and size
for all ToolTip windows. However, this is not wanted here because we use
this window as a thumbnail for a drag-and-drop operation.
Before this patch the dragged element would lag significantly behind the
cursor. Now it works as expected, i.e. the dragged element follows the
cursor immediately.
Gbp-Pq: Name qshapedpixmapwindow_no_tooltip.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
use wayland platform plugin on GNOME wayland sessions by default
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
dda7dab8274991e4
Last-Update: 2022-10-16
Qt wayland platform plugin has improved quite a lot and it is now pretty
much usable on Gnome. It also improves user experience a lot on HiDPI
displays.
Gbp-Pq: Name gnome_wayland.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
widgets: setTransientParent() when a QMenu is a window
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
493a85a9e4688744
Last-Update: 2022-10-16
On some platforms, such as X11 and Wayland with some compositors,
QMenu could be a popup window, which should be set a transient parent
to get relative position, which is requested by Wayland.
Added transientParentWindow() for QMenuPrivate like QDialogPrivate.
Gbp-Pq: Name qmenu_set_transient_parent.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
upstream fixes to support OpenSSL 3.0
Origin: upstream, commits
https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
3186ca3e3972cf46
https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
408656c6f9de326c
Last-Update: 2023-10-17
Gbp-Pq: Name openssl3.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
QPushButton/fusion style: don't ignore QIcon::On icon
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
e9ccdf4d84157173
Last-Update: 2021-08-10
The fusion style did ignore the QIcon::On icon because it reset
State_On to avoid the visual shift of a pressed button.
But it's not needed to reset this flag - the shift does not happen
because the fusion style does return 0 as offset for
PM_ButtonShiftHorizontal/PM_ButtonShiftVertical so no shifting will
happen.
Gbp-Pq: Name fusion_checkable_qpushbutton.diff
Debian Qt/KDE Maintainers [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
adjust QMimeDatabase implementation
Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=
0cbbba2aa5b47224
Last-Update: 2021-06-12
When multiple globs match, and the result from magic sniffing is
unrelated to any of those globs, globs have priority and one of them
should be picked up.
Gbp-Pq: Name mime_globs.diff
Dmitry Shachnev [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
qtbase-opensource-src (5.15.13+dfsg-2) unstable; urgency=medium
* Upload to unstable.
[ Lisandro Damián Nicanor Pérez Meyer ]
* Remove myself from Uploaders.
[dgit import unpatched qtbase-opensource-src 5.15.13+dfsg-2]
Dmitry Shachnev [Tue, 21 May 2024 07:53:43 +0000 (10:53 +0300)]
Import qtbase-opensource-src_5.15.13+dfsg-2.debian.tar.xz
[dgit import tarball qtbase-opensource-src 5.15.13+dfsg-2 qtbase-opensource-src_5.15.13+dfsg-2.debian.tar.xz]
Dmitry Shachnev [Sat, 9 Mar 2024 11:24:14 +0000 (14:24 +0300)]
Import qtbase-opensource-src_5.15.13+dfsg.orig.tar.xz
[dgit import orig qtbase-opensource-src_5.15.13+dfsg.orig.tar.xz]