Package: qtbase-opensource-src / 5.15.2+dfsg-9+deb11u1
Metadata
Package | Version | Patches format |
---|---|---|
qtbase-opensource-src | 5.15.2+dfsg-9+deb11u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
xcb_screens_uaf.patch | (download) |
src/plugins/platforms/xcb/qxcbconnection_screens.cpp |
6 4 + 2 - 0 ! |
avoid use-after-free in qxcbconnection::initializescreens() |
qnam_connect_memory_leak.diff | (download) |
src/network/access/qnetworkreplyhttpimpl.cpp |
12 11 + 1 - 0 ! |
qnam: work around qobject finicky orphan cleanup details |
gcc_11_limits.diff | (download) |
src/corelib/global/qendian.h |
2 2 + 0 - 0 ! |
include <limits> to fix some gcc 11 build issues |
qiodevice_readline_memory.diff | (download) |
src/corelib/io/qiodevice.cpp |
6 4 + 2 - 0 ! |
fix allocated memory of qbytearray returned by qiodevice::readline |
mime_globs.diff | (download) |
src/corelib/mimetypes/qmimedatabase.cpp |
11 7 + 4 - 0 ! |
adjust qmimedatabase implementation When multiple globs match, and the result from magic sniffing is unrelated to any of those globs, globs have priority and one of them should be picked up. |
fix invalid pointer return with QGridLayout.diff | (download) |
src/widgets/kernel/qgridlayout.cpp |
6 3 + 3 - 0 ! |
[patch] fix invalid pointer return with qgridlayout::itemat(-1) QGridLayout::takeAt() and QLayoutItem *itemAt() only check the upper bound. If the index < 0, these function will return invalid pointer. Fixes: QTBUG-91261 Pick-to: 5.15 6.0 6.1 |
CVE 2024 25580.diff | (download) |
src/gui/util/qktxhandler.cpp |
138 109 + 29 - 0 ! |
--- |
CVE 2023 32763.diff | (download) |
src/gui/painting/qfixed_p.h |
9 9 + 0 - 0 ! |
fix buffer overflow in qt svg Adds qAddOverflow and qMulOverflow definitions to QFixed. |
CVE 2022 25255.diff | (download) |
src/corelib/io/qprocess_unix.cpp |
28 15 + 13 - 0 ! |
qprocess: ensure we don't accidentally execute something from cwd Unless "." (or the empty string) is in $PATH, we're not supposed to find executables in the current directory. This is how the Unix shells behave and we match their behavior. It's also the behavior Qt had prior to 5.9 (commit 28666d167aa8e602c0bea25ebc4d51b55005db13). On Windows, searching the current directory is the norm, so we keep that behavior. . This commit does not add an explicit check for an empty return from QStandardPaths::findExecutable(). Instead, we allow that empty string to go all the way to execve(2), which will fail with ENOENT. We could catch it early, before fork(2), but why add code for the error case? . See https://kde.org/info/security/advisory-20220131-1.txt |
CVE 2023 24607.diff | (download) |
src/plugins/sqldrivers/odbc/qsql_odbc.cpp |
206 118 + 88 - 0 ! |
fix denial-of-service in qt sql odbc driver plugin |
sql_odbc_fix_unicode_check.diff | (download) |
src/plugins/sqldrivers/odbc/qsql_odbc.cpp |
1 0 + 1 - 0 ! |
qsql/odbc: fix regression (trailing nul) When we fixed the callers of toSQLTCHAR() to use the result's size() |
sql_odbc_more_unicode_checks.diff | (download) |
src/plugins/sqldrivers/odbc/qsql_odbc.cpp |
13 12 + 1 - 0 ! |
sql/odbc: add another check to detect unicode availability in driver Since ODBC does not have a direct way finding out if unicode is supported by the underlying driver the ODBC plugin does some checks. As a last resort a sql statement is executed which returns a string. But even this may fail because the select statement has no FROM part which is rejected by at least Oracle does not allow. Therefore add another query which is correct for Oracle & DB2 as a workaround. The question why the first three statements to check for unicode availability fail is still open but can't be checked since I've no access to an oracle database. |
CVE 2023 32762.diff | (download) |
src/network/access/qhsts.cpp |
4 2 + 2 - 0 ! |
--- |
CVE 2023 51714.diff | (download) |
src/network/access/http2/hpacktable.cpp |
7 5 + 2 - 0 ! |
[patch] hpack: fix incorrect integer overflow check This code never worked: For the comparison with max() - 32 to trigger, on 32-bit platforms (or Qt 5) signed interger overflow would have had to happen in the addition of the two sizes. The compiler can therefore remove the overflow check as dead code. On Qt 6 and 64-bit platforms, the signed integer addition would be very unlikely to overflow, but the following truncation to uint32 would yield the correct result only in a narrow 32-value window just below UINT_MAX, if even that. Fix by using the proper tool, qAddOverflow. Manual conflict resolutions: - qAddOverflow doesn't exist in Qt 5, use private add_overflow predecessor API instead |
CVE 2023 37369.diff | (download) |
src/corelib/serialization/qxmlstream.cpp |
40 28 + 12 - 0 ! |
--- |
CVE 2023 38197.diff | (download) |
src/corelib/serialization/qxmlstream.cpp |
144 136 + 8 - 0 ! |
--- |
CVE 2023 34410.diff | (download) |
src/network/ssl/qsslsocket.cpp |
5 5 + 0 - 0 ! |
--- |
CVE 2023 33285.diff | (download) |
src/network/kernel/qdnslookup_unix.cpp |
31 25 + 6 - 0 ! |
qdnslookup/unix: make sure we don't overflow the buffer The DNS Records are variable length and encode their size in 16 bits before the Record Data (RDATA). Ensure that both the RDATA and the Record header fields before it fall inside the buffer we have. . Additionally reject any replies containing more than one query records. |
gnukfreebsd.diff | (download) |
mkspecs/features/qt_functions.prf |
2 2 + 0 - 0 ! |
initial gnu/kfreebsd support - add a gnukfreebsd-g++ qmake mkspec, mostly copied from the hurd-g++ one - properly use LD_LIBRARY_PATH on GNU/* systems |
no_htmlinfo_example.diff | (download) |
examples/xml/xml.pro |
3 1 + 2 - 0 ! |
disable htmlinfo example which contains non-free files |
remove_privacy_breaches.diff | (download) |
doc/global/template/scripts/main.js |
5 0 + 5 - 0 ! |
remove non-used privacy-breach code This code makes Lintian unhappy. But we are really not using it, it only gets inserted when building the online doc. Anyways the best way to calm down Lintian is to simply remove it. |
link_fbclient.diff | (download) |
src/plugins/sqldrivers/configure.json |
2 1 + 1 - 0 ! |
build ibase sql plugin against firebird |
gnukfreebsd_linker_warnings.diff | (download) |
src/corelib/configure.json |
3 3 + 0 - 0 ! |
catch linker warnings in some config tests Without this, qmake wrongly thinks that the tests succeed, for example: . ./config.tests/unix/futimens/futimens.cpp:44: warning: futimens is not implemented and will always fail test config.corelib.tests.futimens succeeded |
armv4.diff | (download) |
src/corelib/global/qprocessordetection.h |
5 5 + 0 - 0 ! |
support armv4 architecture, needed for armel builds |
nonlinux_utime.diff | (download) |
qmake/library/ioutils.cpp |
2 1 + 1 - 0 ! |
guard utime_now/utime_omit usages |
qdoc_default_incdirs.diff | (download) |
mkspecs/features/qt_docs.prf |
4 4 + 0 - 0 ! |
pass default include directories to qdoc |
path_max.diff | (download) |
src/corelib/io/qfilesystemengine_unix.cpp |
4 4 + 0 - 0 ! |
avoid unconditional path_max usage Use a "safe" size in case PATH_MAX is not defined; in the end, this should not be used, as a allocating realpath() will be used instead. |
qstorageinfo_linux.diff | (download) |
src/corelib/io/qstorageinfo_unix.cpp |
2 2 + 0 - 0 ! |
limit linux-only code with q_os_linux The QStorageInfo/QStorageIterator implementation used for Linux is used also on Hurd, as it uses an interface provided by GNU libc. QStorageIterator::device() tries to use PATH_MAX (unavailable on the Hurd) to lookup a /dev/block/ path, which exists on Linux only; hence, perform that check within a Q_OS_LINUX block. |
cross_build_mysql.diff | (download) |
src/plugins/sqldrivers/configure.json |
1 1 + 0 - 0 ! |
call pkgconfig in order to be able to cross build qtbase with mysql. Qt's build system calls mysql_config... which won't work in a cross build environment like Debian's, as it will throw an exec format error. . In order to solve this call pkgconfig and use mysqlclient.pc. |