ChangeLog
----------------
Fix crash when applying rendered effects to virtual clips.
Add h264/aac, wmv2, ffv1 and mjpeg encodings to ffmpeg_encoder.
Fix memory leak in new style gdkpixbuf converter.
Fix frame seek bug in avformat decoder with non-zero start time.
Autoscroll "Show details" when encoding.
Work around a gtk+ crash bug in GtkTextView with lots of text.
Show missing libraries in ffmpeg_encoder.
Show time remaining estimate for encoding for most encoder formats.
OK / Cancel in the file chooser should immediately cancel any preview
(regression).
Add "Use current clip values" button when entering multitrack.
Fix memory leak in pulseaudio input analysis.
Minor GUI improvements.
- Upgrade all linux-c6- to CentOS 6.7
- Cleanups
PR: 205846
Submitted by: xmj
In Collaboration with: allanjude, netchild, xmj
Exp-run: antoine
Sponsored by: Perceivon Hosting Inc.
Differential Revision: D3428
We'd like to thanks for all the feedback and comments.
Changelog:
2.4.8:
Fix hang in merge in Clip Editor (regression).
Fix rendering error in multitrack (wrong clip number).
2.4.7:
Fix regression in "Insert Silence".
Fix background colour for notebook tabs in multitack (gtk+ 3.x)
Fix crash when entering Preferences dialog (GType error).
Reshow timeline after hiding it.
Update current time when clicking on timeline header in Multitrack
(regression).
Trivial compiler fix for gtk+ 2.x
This is the latest stable release at time of writing.
Release announcement: http://blog.qt.io/blog/2015/07/01/qt-5-5-released/
New features in Qt 5.5: https://wiki.qt.io/New_Features_in_Qt_5.5
As usual, huge thanks to Tobias Berner (tcberner@gmail.com) for all his work
on these ports in kde@'s experimental area51 repository. He's the one who
started the update and did a lot of the initial work on Qt 5.5. Ralf Nolden
(nolden@kde.org) has contributed the initial version of most of our new Qt5
ports.
Also thanks to Yuri Victorovich (yuri@rawbw.com) for contributing PR 205805
with his own patch for the 5.5.1 update. Some of his changes there prompted
additional fixes and changes present in the final patch generated from our
experimental repository.
New ports:
- comms/qt5-connectivity, comms/qt5-sensors, devel/qt5-location,
graphics/qt5-3d, net/qt5-enginio, x11-toolkits/qt5-canvas3d,
x11-toolkits/qt5-uiplugin.
General changes in all Qt5 ports:
- All Qt5 ports are now built with -Wl,--as-needed to avoid overlinking,
which is a problem with qmake-based because the libraries passed to the
linker come from the modules .pri files and many are not necessary.
- With this change, several ports had their USE_QT5 lines adjusted to
explicitly include some libraries that were pulled in implicitly, and to
exclude libraries no longer required with -Wl,--as-needed.
Changes in specific ports:
- devel/qt5: Drop the SQL_PLUGINS and TOOLS options and depend on all Qt5
ports by default. It makes the Makefile much simpler, and those options
were already on by default.
- devel/qt5-core: The clang+base libstdc++ workaround has been expanded and
more C++11 features have been disabled when that combination is used by a
port (basically, FreeBSD 9 with USES=compiler:c++11-lang). The disabled
features have explanations for why they were disabled in the patched
header itself.
- devel/qt5-designer: uiplugins has been split out following a similar
change upstream. By depending on qt5-uiplugin, qt5-uitools avoids having
to depend on the big qt5-designer port.
- multimedia/qt5-multimedia: The port now uses GStreamer 1.0 instead of
0.10.
- net/qt5-network: The port now depends on libproxy for proxy settings.
Using libproxy allows proxy settings to be read from different sources,
and also allows .pac files to work with Qt.
- www/qt5-webkit: The port now uses GStreamer 1.0 instead of 0.10.
PR: 205805
PR: 206435
Both mentioned CVE IDs refer to vulnerabilities where a remote attacker
can read arbitrary files by using the subfile protocol in an HTTP Live
Streaming (HLS) M3U8 file. Building with 2.8.5 fixes those.
MFH: 2016Q1
Security: CVE-2016-1897
CVE-2016-1898
Both mentioned CVE IDs refer to vulnerabilities where a remote attacker
can read arbitrary files by using the subfile protocol in an HTTP Live
Streaming (HLS) M3U8 file. The new release fixes those in the process.
PR: 206282
Reported by: sasamotikomi@gmail.com
MFH: 2016Q1
Security: CVE-2016-1897
CVE-2016-1898
- Disable mythlogserver as recommended from upstream
- Remove own distfile mirror and trust in githubs codeload
- Pet portlint (whitespace)
PR: 204647
Submitted by: lucylangthorne55@gmail.com