Package: release.debian.org Severity: normal User: release.debian....@packages.debian.org Usertags: unblock
Please unblock package qt4-x11 The most important thing for this unblock request is the patch disable-SSL-compression-by-default.patch that allows the CRIME attack. Then we added two more patches, backported from upstream: - fix_jit_crash_on_x86_64.patch avoids 32-bit branch offset overflows. - add_missing_map_noreserve.patch. Adds a missing flag to an mmap call which causes crashes in systems with few ammounts of RAM. Finally, we Build-conflict against libqtwebkit-dev, closing #689265. As a side note, there is already another pre-approval bug for qt4-x11, #687666. This upload will simplify the debdiff of the aforementioned bug, which I'll update later. Thanks in advance, Lisandro. unblock qt4-x11/4:4.8.2+dfsg-4 -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (101, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.21+edid (SMP w/2 CPU cores) Locale: LANG=es_AR.UTF-8, LC_CTYPE=es_AR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org