qt4-x11.git
5 years ago_trust_dpkg-arch_over_uname-m
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
_trust_dpkg-arch_over_uname-m

qt-bugs@ issue : N180631
Trolltech task ID : 181882

qt-bugs@ issue : N180631
Trolltech task ID : 181882

Gbp-Pq: Name 07_trust_dpkg-arch_over_uname-m.diff

5 years agoset sane timestamps when generating header symlinks for non-existing headers
Modestas Vainius [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
set sane timestamps when generating header symlinks for non-existing headers

Forwarded: no
Origin: vendor
Last-Update: 2010-12-05

This is particularly important for QtCore/QtConfig symlink because typically
qconfig.h does not exist when syncqt is run by ./configure. So instead of
assigning a modification timestamp equal to the epoch (00:00 January 1, 1970
GMT.) for the symlink, just use current time().

Gbp-Pq: Name 02_syncqt_sane_timestamp_for_nonexisting_headers.diff

5 years agomake states and appchooser demos buildable
Fathi Boudra [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
make states and appchooser demos buildable

Bug-Debian: http://bugs.debian.org/616500
Last-Update: 2011-03-05

Last-Update: 2011-03-05
Gbp-Pq: Name buildable_appchooser_states_demos.patch

5 years agosend Q_ASSERT, qDebug, qWarning and qFatal messages to syslog
Thiago Macieira [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
send Q_ASSERT, qDebug, qWarning and qFatal messages to syslog

Forwarded: not-needed

Author: Thiago Macieira <thiago@kde.org>
Gbp-Pq: Name qtdebug_syslog.patch

5 years ago[PATCH 05/16] When tabs are inserted or removed in a QTabBar, QTabBarPrivate::refresh...
Robert Knight [Sun, 20 Apr 2008 14:28:31 +0000 (16:28 +0200)]
[PATCH 05/16] When tabs are inserted or removed in a QTabBar, QTabBarPrivate::refresh() is called to update the layout.  If the tabbar widget is hidden, this just sets a boolean variable (layoutDirty) and returns, so the parent widget's layout is not notified about the possible geometry change.

Prior to Qt 4.4 this was not a problem because the geometry was
recalculated in QTabBar::sizeHint() if the layoutDirty variable was
set.  In Qt 4.4 however the layout caches size hint information in
QWidgetItemV2.  Since the cache information is not invalidated, the
layout may end up using out-of-date size hint information to compute
the widget size.

If the QTabBar is empty when QTabBar::sizeHint() is called, it will
return a size with a height of 0, which will be kept in the cache and
so the tab bar will never be shown.

This patch fixes the problem by calling updateGeometry() whenever the
tab bar's layout is refreshed.

qt-bugs@ issue : 208185
Trolltech task ID : 208349
bugs.kde.org number : 159014

Gbp-Pq: Name 0225-invalidate-tabbar-geometry-on-refresh.patch

5 years ago[PATCH 02/16] This patch makes override-redirect windows (popup menu, dropdown menu...
Lubos Lunak [Tue, 2 Oct 2007 14:08:32 +0000 (16:08 +0200)]
[PATCH 02/16] This patch makes override-redirect windows (popup menu, dropdown menu, tooltip, combobox, etc.) also have more window properties like WM_CLASS, so they can be used when compositing.

qt-bugs@ issue : none
bugs.kde.org number : none

Gbp-Pq: Name 0195-compositing-properties.diff

5 years agofix buffer overflow in XBM parser
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
fix buffer overflow in XBM parser

Origin: upstream, https://code.qt.io/cgit/qt/qtbase.git/commit/?id=1616c71921b73b22
Last-Update: 2020-08-18

Gbp-Pq: Name CVE-2020-17507.patch

5 years ago[PATCH] bmp image handler: check for out of range image size
Eirik Aavitsland [Tue, 4 Sep 2018 09:08:06 +0000 (11:08 +0200)]
[PATCH] bmp image handler: check for out of range image size

Make the decoder fail early to avoid spending time and memory on
attempting to decode a corrupt image file.

Change-Id: I874e04f3b43122d73f8e58c7a5bcc4a741b68264
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19873.patch

5 years ago[PATCH] Fix crash in qppmhandler for certain malformed image files
Eirik Aavitsland [Thu, 2 Aug 2018 11:11:20 +0000 (13:11 +0200)]
[PATCH] Fix crash in qppmhandler for certain malformed image files

The ppm format specifies that the maximum color value field must be
less than 65536. The handler did not enforce this, leading to
potentional overflow when the value was used in 16 bits context.

Task-number: QTBUG-69449
Change-Id: Iea7a7e0f8953ec1ea8571e215687d12a9d77e11c
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19872.patch

5 years ago[PATCH] TGA handler: check for out of range image size
Eirik Aavitsland [Fri, 24 Aug 2018 10:03:00 +0000 (12:03 +0200)]
[PATCH] TGA handler: check for out of range image size

Make the decoder fail early to avoid spending time and memory on
attempting to decode a corrupt image file.

Change-Id: Iac35e72de743f412a65d11c58fe7faa275dc4e41
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19871.patch

5 years ago[PATCH] Check for QImage allocation failure in qgifhandler
Eirik Aavitsland [Fri, 3 Aug 2018 11:25:15 +0000 (13:25 +0200)]
[PATCH] Check for QImage allocation failure in qgifhandler

Since image files easily can be (or corrupt files claim to be) huge,
it is worth checking for out of memory situations.

Change-Id: I635a3ec6852288079fdec4e14cf7e776fe59e9e0
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19870.patch

5 years ago[PATCH] Fix crash when parsing malformed url reference
Eirik Aavitsland [Mon, 9 Jul 2018 08:45:22 +0000 (10:45 +0200)]
[PATCH] Fix crash when parsing malformed url reference

The parsing did not check for end of input.

Change-Id: I56a478877d242146395977b767511425d2b8ced1
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19869.patch

5 years ago[PATCH] Fix possible heap corruption in QXmlStream
Allan Sandfeld Jensen [Mon, 13 Aug 2018 13:29:16 +0000 (15:29 +0200)]
[PATCH] Fix possible heap corruption in QXmlStream

The value of 'tos' at the check might already be on the last element,
so triggering stack expansion on the second last element is too late.

Change-Id: Ib3ab2662d4d27a71effe9e988b9e172923af2908
Reviewed-by: Richard J. Moore <rich@kde.org>
Reviewed-by: Thiago Macieira <thiago.macieira@intel.com>
Gbp-Pq: Name CVE-2018-15518.patch

5 years agoReplace timestamps from qhelpgenerator by a fixed date
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
Replace timestamps from qhelpgenerator by a fixed date

In order to make qhelpgenerator output reproducible, we need a way to get
deterministic embedded timestaps.  Backport the patch from qttools5 [1] to
make qch files reproducible by replacing the current time by a fixed date.
 [1] https://codereview.qt-project.org/#/c/106296/
Author: Eduard Sanou <dhole@openmailbox.org>

Gbp-Pq: Name replace_timestamps_with_fixed_date_in_qhelpgenerator.patch

5 years agoIntroduce a plugin system for QSystemTrayIcon.
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
Introduce a plugin system for QSystemTrayIcon.

Forwarded: no

Designed to be used with sni-qt (https://launchpad.net/sni-qt)
Introduce a plugin system for QSystemTrayIcon. Designed to be used with sni-qt
(https://launchpad.net/sni-qt)

Gbp-Pq: Name plugin_system_for_systemtray.patch

5 years ago[PATCH] Add qatomic support for AArch64 (aka arm64).
Lisandro Damián Nicanor Pérez Meyer [Sat, 15 Mar 2014 18:40:49 +0000 (15:40 -0300)]
[PATCH] Add qatomic support for AArch64 (aka arm64).

Patch by Mark Salter <msalter@redhat.com>
licensed under BSD:

<https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735488#195>

This patch is known to not be the most correct way
to implement them, as it seems to be possible to do it in a faster way,
but should work non the less until we can provide something better.

Change-Id: Ib392b27dc54691fd4c2ea9896240ad71fb8128cc

Gbp-Pq: Name aarch64_arm64_qatomic_support.patch

5 years ago[PATCH] Better handling of invalid font tables
Eskil Abrahamsen Blomfeldt [Fri, 10 Jul 2015 11:22:32 +0000 (13:22 +0200)]
[PATCH] Better handling of invalid font tables

Specifically when reading files with broken cmap tables, we could
get some undeterministic results. We handle this more gracefully
by verifying that the offsets are sane and bailing out early if not.
This replaces the current pattern throughout the font engine for
consistency.

This is a back-port of 4a1e5dbade4bab55f39bd368480dcca9a11e4b38
from Qt 5.

Change-Id: If4172b9ef0808801c8e27ffaad962535afe572ed
Reviewed-by: Thiago Macieira <thiago.macieira@intel.com>
Reviewed-by: Lars Knoll <lars.knoll@theqtcompany.com>
Gbp-Pq: Name Better-handling-of-invalid-font-tables.patch

5 years agoxmlpatterns_stack_overflow_fix
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
xmlpatterns_stack_overflow_fix

commit d1b17740ed4d9b1e3c3ad5898bb8259969dc77df
Author: Kamil Rojewski <kamil.rojewski@gmail.com>
Date:   Wed Aug 13 10:38:38 2014 +0200

    fix for stack overflow

    Recursion in item mapping iterator caused a stack
    overflow for large datasets.

    Task-number: QTBUG-40153
    Change-Id: I693798de0ecfd3a920a3dd270172ce7ec3c13d8d
Reviewed-by: Jędrzej Nowacki <jedrzej.nowacki@digia.com>
Gbp-Pq: Name xmlpatterns_stack_overflow_fix.diff

5 years ago[PATCH] Don't crash on broken GIF images
Lars Knoll [Thu, 24 Apr 2014 13:33:27 +0000 (15:33 +0200)]
[PATCH] Don't crash on broken GIF images

Broken GIF images could set invalid width and height
values inside the image, leading to Qt creating a null
QImage for it. In that case we need to abort decoding
the image and return an error.

Initial patch by Rich Moore.

Backport of Id82a4036f478bd6e49c402d6598f57e7e5bb5e1e from Qt 5

Task-number: QTBUG-38367
Change-Id: I0680740018aaa8356d267b7af3f01fac3697312a
Security-advisory: CVE-2014-0190

Gbp-Pq: Name dont_crash_on_broken_gif_images.patch

5 years ago[PATCH] Fix logic for figuring out what ConfigureNotify positions can be trusted
Owen W. Taylor [Mon, 17 Oct 2011 21:27:43 +0000 (17:27 -0400)]
[PATCH] Fix logic for figuring out what ConfigureNotify positions can be trusted

When reading ahead in the queue for ConfigureNotify events, it's necessary
to look for intermediate ReparentNotify events as well, since they will
determine whether the position in the event can be trusted or not.

Bug: https://bugreports.qt.nokia.com/browse/QTBUG-21900

Gbp-Pq: Name QTBUG-21900_Buttons_in_Qt_applications_not_clickable_when_run_under_gnome-shell.patch

5 years agosupport reading of default value for startDragDistance property
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
support reading of default value for startDragDistance property

from QT_USE_DRAG_DISTANCE environment variable.
See also http://bugreports.qt.nokia.com/browse/QTBUG-12594
Author: Joonas Tanskanen <joonas.tanskanen@sasken.com>

Gbp-Pq: Name Add_support_for_QT_USE_DRAG_DISTANCE_env_var.patch

5 years agoqt4-x11 (4:4.8.7+dfsg-11+deb9u1) stretch-security; urgency=medium
Adrian Bunk [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
qt4-x11 (4:4.8.7+dfsg-11+deb9u1) stretch-security; urgency=medium

  * Non-maintainer upload by the LTS team.
  * CVE-2018-15518: Double-free or corruption in QXmlStreamReader
    during parsing of a specially crafted illegal XML document.
  * CVE-2018-19869: A malformed SVG image causes a segmentation fault.
  * CVE-2018-19870: A malformed GIF image causes a NULL pointer
    dereference in QGifHandler resulting in a segmentation fault.
  * CVE-2018-19871: Uncontrolled Resource Consumption in QTgaFile.
  * CVE-2018-19872: A malformed PPM image causes a crash.
  * CVE-2018-19873: QBmpHandler segfault on malformed BMP file.
  * CVE-2020-17507: Buffer over-read in the XBM parser.

[dgit import unpatched qt4-x11 4:4.8.7+dfsg-11+deb9u1]

5 years agoImport qt4-x11_4.8.7+dfsg-11+deb9u1.debian.tar.xz
Adrian Bunk [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
Import qt4-x11_4.8.7+dfsg-11+deb9u1.debian.tar.xz

[dgit import tarball qt4-x11 4:4.8.7+dfsg-11+deb9u1 qt4-x11_4.8.7+dfsg-11+deb9u1.debian.tar.xz]

10 years agoImport qt4-x11_4.8.7+dfsg.orig.tar.xz
Lisandro Damián Nicanor Pérez Meyer [Tue, 26 May 2015 12:18:39 +0000 (13:18 +0100)]
Import qt4-x11_4.8.7+dfsg.orig.tar.xz

[dgit import orig qt4-x11_4.8.7+dfsg.orig.tar.xz]