Severity: normal
Usertags: unblock

Please unblock package qt4-x11

The most important thing for this unblock request is the patch
disable-SSL-compression-by-default.patch that allows the CRIME attack.

Then we added two more patches, backported from upstream:

- fix_jit_crash_on_x86_64.patch avoids 32-bit branch offset overflows.
- add_missing_map_noreserve.patch. Adds a missing flag to an mmap call
  which causes crashes in systems with few ammounts of RAM.

Finally, we Build-conflict against libqtwebkit-dev, closing #689265.

As a side note, there is already another pre-approval bug for qt4-x11,
#687666. This upload will simplify the debdiff of the aforementioned bug,
which I'll update later.

Thanks in advance, Lisandro.

unblock qt4-x11/4:4.8.2+dfsg-4

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (101, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.21+edid (SMP w/2 CPU cores)
Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash


Reply via email to