summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Eirik Aavitsland [Thu, 2 Aug 2018 11:11:20 +0000 (13:11 +0200)]
[PATCH] Fix crash in qppmhandler for certain malformed image files
The ppm format specifies that the maximum color value field must be
less than 65536. The handler did not enforce this, leading to
potentional overflow when the value was used in 16 bits context.
Task-number: QTBUG-69449
Change-Id: Iea7a7e0f8953ec1ea8571e215687d12a9d77e11c
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19872.patch
Eirik Aavitsland [Fri, 24 Aug 2018 10:03:00 +0000 (12:03 +0200)]
[PATCH] TGA handler: check for out of range image size
Make the decoder fail early to avoid spending time and memory on
attempting to decode a corrupt image file.
Change-Id: Iac35e72de743f412a65d11c58fe7faa275dc4e41
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19871.patch
Eirik Aavitsland [Fri, 3 Aug 2018 11:25:15 +0000 (13:25 +0200)]
[PATCH] Check for QImage allocation failure in qgifhandler
Since image files easily can be (or corrupt files claim to be) huge,
it is worth checking for out of memory situations.
Change-Id: I635a3ec6852288079fdec4e14cf7e776fe59e9e0
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19870.patch
Eirik Aavitsland [Mon, 9 Jul 2018 08:45:22 +0000 (10:45 +0200)]
[PATCH] Fix crash when parsing malformed url reference
The parsing did not check for end of input.
Change-Id: I56a478877d242146395977b767511425d2b8ced1
Reviewed-by: Lars Knoll <lars.knoll@qt.io>
Gbp-Pq: Name CVE-2018-19869.patch
Allan Sandfeld Jensen [Mon, 13 Aug 2018 13:29:16 +0000 (15:29 +0200)]
[PATCH] Fix possible heap corruption in QXmlStream
The value of 'tos' at the check might already be on the last element,
so triggering stack expansion on the second last element is too late.
Change-Id: Ib3ab2662d4d27a71effe9e988b9e172923af2908
Reviewed-by: Richard J. Moore <rich@kde.org>
Reviewed-by: Thiago Macieira <thiago.macieira@intel.com>
Gbp-Pq: Name CVE-2018-15518.patch
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
Replace timestamps from qhelpgenerator by a fixed date
In order to make qhelpgenerator output reproducible, we need a way to get
deterministic embedded timestaps. Backport the patch from qttools5 [1] to
make qch files reproducible by replacing the current time by a fixed date.
[1] https://codereview.qt-project.org/#/c/106296/
Author: Eduard Sanou <dhole@openmailbox.org>
Gbp-Pq: Name replace_timestamps_with_fixed_date_in_qhelpgenerator.patch
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
Introduce a plugin system for QSystemTrayIcon.
Forwarded: no
Designed to be used with sni-qt (https://launchpad.net/sni-qt)
Introduce a plugin system for QSystemTrayIcon. Designed to be used with sni-qt
(https://launchpad.net/sni-qt)
Gbp-Pq: Name plugin_system_for_systemtray.patch
Lisandro Damián Nicanor Pérez Meyer [Sat, 15 Mar 2014 18:40:49 +0000 (15:40 -0300)]
[PATCH] Add qatomic support for AArch64 (aka arm64).
Patch by Mark Salter <msalter@redhat.com>
licensed under BSD:
<https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735488#195>
This patch is known to not be the most correct way
to implement them, as it seems to be possible to do it in a faster way,
but should work non the less until we can provide something better.
Change-Id: Ib392b27dc54691fd4c2ea9896240ad71fb8128cc
Gbp-Pq: Name aarch64_arm64_qatomic_support.patch
Eskil Abrahamsen Blomfeldt [Fri, 10 Jul 2015 11:22:32 +0000 (13:22 +0200)]
[PATCH] Better handling of invalid font tables
Specifically when reading files with broken cmap tables, we could
get some undeterministic results. We handle this more gracefully
by verifying that the offsets are sane and bailing out early if not.
This replaces the current pattern throughout the font engine for
consistency.
This is a back-port of
4a1e5dbade4bab55f39bd368480dcca9a11e4b38
from Qt 5.
Change-Id: If4172b9ef0808801c8e27ffaad962535afe572ed
Reviewed-by: Thiago Macieira <thiago.macieira@intel.com>
Reviewed-by: Lars Knoll <lars.knoll@theqtcompany.com>
Gbp-Pq: Name Better-handling-of-invalid-font-tables.patch
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
xmlpatterns_stack_overflow_fix
commit
d1b17740ed4d9b1e3c3ad5898bb8259969dc77df
Author: Kamil Rojewski <kamil.rojewski@gmail.com>
Date: Wed Aug 13 10:38:38 2014 +0200
fix for stack overflow
Recursion in item mapping iterator caused a stack
overflow for large datasets.
Task-number: QTBUG-40153
Change-Id: I693798de0ecfd3a920a3dd270172ce7ec3c13d8d
Reviewed-by: Jędrzej Nowacki <jedrzej.nowacki@digia.com>
Gbp-Pq: Name xmlpatterns_stack_overflow_fix.diff
Lars Knoll [Thu, 24 Apr 2014 13:33:27 +0000 (15:33 +0200)]
[PATCH] Don't crash on broken GIF images
Broken GIF images could set invalid width and height
values inside the image, leading to Qt creating a null
QImage for it. In that case we need to abort decoding
the image and return an error.
Initial patch by Rich Moore.
Backport of Id82a4036f478bd6e49c402d6598f57e7e5bb5e1e from Qt 5
Task-number: QTBUG-38367
Change-Id: I0680740018aaa8356d267b7af3f01fac3697312a
Security-advisory: CVE-2014-0190
Gbp-Pq: Name dont_crash_on_broken_gif_images.patch
Owen W. Taylor [Mon, 17 Oct 2011 21:27:43 +0000 (17:27 -0400)]
[PATCH] Fix logic for figuring out what ConfigureNotify positions can be trusted
When reading ahead in the queue for ConfigureNotify events, it's necessary
to look for intermediate ReparentNotify events as well, since they will
determine whether the position in the event can be trusted or not.
Bug: https://bugreports.qt.nokia.com/browse/QTBUG-21900
Gbp-Pq: Name QTBUG-21900_Buttons_in_Qt_applications_not_clickable_when_run_under_gnome-shell.patch
Debian Qt/KDE Maintainers [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
support reading of default value for startDragDistance property
from QT_USE_DRAG_DISTANCE environment variable.
See also http://bugreports.qt.nokia.com/browse/QTBUG-12594
Author: Joonas Tanskanen <joonas.tanskanen@sasken.com>
Gbp-Pq: Name Add_support_for_QT_USE_DRAG_DISTANCE_env_var.patch
Adrian Bunk [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
qt4-x11 (4:4.8.7+dfsg-11+deb9u1) stretch-security; urgency=medium
* Non-maintainer upload by the LTS team.
* CVE-2018-15518: Double-free or corruption in QXmlStreamReader
during parsing of a specially crafted illegal XML document.
* CVE-2018-19869: A malformed SVG image causes a segmentation fault.
* CVE-2018-19870: A malformed GIF image causes a NULL pointer
dereference in QGifHandler resulting in a segmentation fault.
* CVE-2018-19871: Uncontrolled Resource Consumption in QTgaFile.
* CVE-2018-19872: A malformed PPM image causes a crash.
* CVE-2018-19873: QBmpHandler segfault on malformed BMP file.
* CVE-2020-17507: Buffer over-read in the XBM parser.
[dgit import unpatched qt4-x11 4:4.8.7+dfsg-11+deb9u1]
Adrian Bunk [Sun, 20 Sep 2020 19:01:50 +0000 (20:01 +0100)]
Import qt4-x11_4.8.7+dfsg-11+deb9u1.debian.tar.xz
[dgit import tarball qt4-x11 4:4.8.7+dfsg-11+deb9u1 qt4-x11_4.8.7+dfsg-11+deb9u1.debian.tar.xz]
Lisandro Damián Nicanor Pérez Meyer [Tue, 26 May 2015 12:18:39 +0000 (13:18 +0100)]
Import qt4-x11_4.8.7+dfsg.orig.tar.xz
[dgit import orig qt4-x11_4.8.7+dfsg.orig.tar.xz]