libde265 (1.0.11-0+deb11u4) bullseye-security; urgency=high
authorAndreas Henriksson <andreas@fatal.se>
Thu, 23 Apr 2026 10:45:20 +0000 (12:45 +0200)
committerAndreas Henriksson <andreas@fatal.se>
Thu, 23 Apr 2026 10:45:20 +0000 (12:45 +0200)
commit921382d652a83f56decebedfb9d4cce185eac701
treeb1bbf75808f7a17c696355885de034566c199ed4
parentcc37937cb8c6ac7d52c99756a9ae206c0d089f05
parent7d4efdab417db90ca78f841fa34c3f76de2df25c
libde265 (1.0.11-0+deb11u4) bullseye-security; urgency=high

  * Non-maintainer upload by the LTS Security Team.
  * CVE-2023-51792: check validity of conformance window parameters
  * CVE-2026-33164 + CVE-2026-33165: fix reallocation of metadata array...
    ... when ctb size changes (Closes: #1131468, #1131469)

[dgit import unpatched libde265 1.0.11-0+deb11u4]
30 files changed:
debian/.gitlab-ci.yml
debian/changelog
debian/control
debian/copyright
debian/gbp.conf
debian/libde265-0.install
debian/libde265-0.symbols
debian/libde265-dev.docs
debian/libde265-dev.install
debian/libde265-examples.install
debian/not-installed
debian/patches/0013-check-validity-of-conformance-window-parameters-fixe.patch
debian/patches/0014-fix-reallocation-of-metadata-array-when-ctb-size-cha.patch
debian/patches/CVE-2023-27102.patch
debian/patches/CVE-2023-27103.patch
debian/patches/CVE-2023-43887.patch
debian/patches/CVE-2023-47471.patch
debian/patches/CVE-2023-49465.patch
debian/patches/CVE-2023-49467.patch
debian/patches/CVE-2023-49468.patch
debian/patches/disable_tools.patch
debian/patches/only_export_decoder_api.patch
debian/patches/recycle_sps_if_possible.patch
debian/patches/reject_reference_pics_from_different_sps.patch
debian/patches/series
debian/patches/use_sps_from_the_image.patch
debian/rules
debian/source/format
debian/upstream/metadata
debian/watch