Please unblock package qt4-x11
The most important thing for this unblock request is the patch
disable-SSL-compression-by-default.patch that allows the CRIME attack.
Then we added two more patches, backported from upstream:
- fix_jit_crash_on_x86_64.patch avoids 32-bit branch offset overflows.
- add_missing_map_noreserve.patch. Adds a missing flag to an mmap call
which causes crashes in systems with few ammounts of RAM.
Finally, we Build-conflict against libqtwebkit-dev, closing #689265.
As a side note, there is already another pre-approval bug for qt4-x11,
#687666. This upload will simplify the debdiff of the aforementioned bug,
which I'll update later.
Thanks in advance, Lisandro.
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (990, 'unstable'), (500, 'testing'), (101, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.2.21+edid (SMP w/2 CPU cores)
Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash