libde265 (1.0.11-0+deb11u1) bullseye-security; urgency=high
authorTobias Frost <tobi@debian.org>
Sat, 4 Feb 2023 16:18:48 +0000 (16:18 +0000)
committerTobias Frost <tobi@debian.org>
Sat, 4 Feb 2023 16:18:48 +0000 (16:18 +0000)
commit3a69ba83cde94db2fdd29bcec3fa6c959fd018d3
treefd7a8d5d66c121d8fa686a9400f4d59abec12c81
parent245b1e1696d108b6e832e9358e05daffe9ba44a9
parentd5c277b2d50f6db0301bc87d90350acba1cd4297
libde265 (1.0.11-0+deb11u1) bullseye-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Import package 1.0.11-1 from sid, new upstream version 1.0.11, to fix:
    - CVE-2020-21594 (Closes: #1029396)
    - CVE-2020-21595, CVE-2020-21597, CVE-2020-21599, CVE-2020-21601,
      CVE-2020-21603, CVE-2020-21604, CVE-2020-21605, CVE-2020-21606
      (Closes: #1014999)
    - CVE-2020-21596 (Closes: #1029397)
    - CVE-2020-21598, CVE-2020-21600, CVE-2020-21602 (Closes: #1004963)
    - CVE-2021-35452, CVE-2021-36408, CVE-2021-36409, CVE-2021-36410,
      CVE-2021-36411, CVE-2022-1253 (Closes: #1014977)
    - CVE-2022-43243, CVE-2022-43248, CVE-2022-43253 (Closes: #1025816)
    - CVE-2022-43235, CVE-2022-43236, CVE-2022-43237, CVE-2022-43238,
      CVE-2022-43239, CVE-2022-43240, CVE-2022-43241, CVE-2022-43242,
      CVE-2022-43244, CVE-2022-43250, CVE-2022-43252 (Closes: #1027179)
    - CVE-2022-43245 CVE-2022-43249 (Closes: #1029357)
    - CVE-2022-47655

[dgit import unpatched libde265 1.0.11-0+deb11u1]
21 files changed:
debian/.gitlab-ci.yml
debian/changelog
debian/control
debian/copyright
debian/gbp.conf
debian/libde265-0.install
debian/libde265-0.symbols
debian/libde265-dev.docs
debian/libde265-dev.install
debian/libde265-examples.install
debian/not-installed
debian/patches/disable_tools.patch
debian/patches/only_export_decoder_api.patch
debian/patches/recycle_sps_if_possible.patch
debian/patches/reject_reference_pics_from_different_sps.patch
debian/patches/series
debian/patches/use_sps_from_the_image.patch
debian/rules
debian/source/format
debian/upstream/metadata
debian/watch