Debian Patches

Status for qt6-base/6.4.2+dfsg-11~bpo11+1

Patch Description Author Forwarded Bugs Origin Last update
cve-2023-34410-57ba626.diff [PATCH] Ssl: Copy the on-demand cert loading bool from default config
Otherwise individual sockets will still load system certificates when
a chain doesn't match against the configured CA certificates.
That's not intended behavior, since specifically setting the CA
certificates means you don't want the system certificates to be used.

Follow-up to/amends ada2c573c1a25f8d96577734968fe317ddfa292a

This is potentially a breaking change because now, if you ever add a
CA to the default config, it will disable loading system certificates
on demand for all sockets. And the only way to re-enable it is to
create a null-QSslConfiguration and set it as the new default.
Mrten Nordheim <marten.nordheim@qt.io> no 2023-05-25
cve-2023-34410-ada2c57.diff [PATCH] Schannel: Reject certificate not signed by a configured CA certificate
Not entirely clear why, but when building the certificate chain for a
peer the system certificate store is searched for root certificates.
General expectation is that after calling
`sslConfiguration.setCaCertificates()` the system certificates will
not be taken into consideration.

To work around this behavior, we do a manual check that the root of the
chain is part of the configured CA certificates.
Mrten Nordheim <marten.nordheim@qt.io> no 2023-05-10
cve-2023-32762.diff no
cve-2023-32763.diff no
cve-2023-33285.diff diff --git a/src/network/kernel/qdnslookup_unix.cpp b/src/network/kernel/qdnslookup_unix.cpp
index 75f7c6c440..de0113494f 100644
no
upstream_Add-HPPA-detection.patch [PATCH] Add HPPA detection
- detect the HPPA architecture (PA-RISC) and define Q_PROCESSOR_HPPA
- set the right machine type in QElfParser for HPPA ELF files
Pino Toscano <toscano.pino@tiscali.it> no 2022-10-06
upstream_Add-M68k-detection.patch [PATCH] Add M68k detection
- detect the M68k architecture (Motorola 68000) and define
Q_PROCESSOR_M68K
- set the right machine type in QElfParser for M68k ELF files
Pino Toscano <toscano.pino@tiscali.it> no 2022-10-06
cve-2023-24607.patch Fix CVE-2023-24607 CVE-2023-24607 can trigger a DOS with a specifically crafted string,
see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031871.
This patch https://codereview.qt-project.org/c/qt/qtbase/+/456216,
https://codereview.qt-project.org/c/qt/qtbase/+/457637 and
https://codereview.qt-project.org/c/qt/qtbase/+/457937
See: https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
not-needed
remove_privacy_breaches.diff remove non-used privacy-breach code This code makes Lintian unhappy. But we are really not using it, it only
gets inserted when building the online doc.
Anyways the best way to calm down Lintian is to simply remove it.
Lisandro Damin Nicanor Prez Meyer <lisandro@debian.org> not-needed 2015-02-18
build_path_embedded_qtbuildinternalsextra_cmake.patch [PATCH] cmake/QtBuildInternalsExtra.cmake.in: Patch out embedded build path.

The original build path should not be needed in the shipped package,
and causes reproducibility issues when built in different paths.

https://reproducible-builds.org/docs/build-path/
Vagrant Cascadian <vagrant@reproducible-builds.org> no 2022-02-25
cross.patch no
force_shared_libzstd.patch force the usage of the shared libzstd library. The library provides both versions, and the original code prefers the static
version over the shared, while on Debian it should always use the shared
version.
Lisandro Damin Nicanor Prez Meyer <lisandro@debian.org> not-needed upstream
armel-noyield.patch Don't use yield on CPUs that might not support it no

All known versions for source package 'qt6-base'

Links