libde265 (1.0.11-0+deb10u6) buster-security; urgency=high
authorThorsten Alteholz <debian@alteholz.de>
Fri, 29 Dec 2023 22:03:02 +0000 (23:03 +0100)
committerThorsten Alteholz <debian@alteholz.de>
Fri, 29 Dec 2023 22:03:02 +0000 (23:03 +0100)
commit4e9e6ca88b710c417d2e09bb718463e21f2616bb
treeb9eff9e1e521786d658859494d7dc84cbe7302c7
parent10456198466b71268c52b3c3d1b9a93cd5bab42a
parent01e4af404ec5f76aaf6d8141f0f2eeecb866fac6
libde265 (1.0.11-0+deb10u6) buster-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2023-49465
    heap-buffer-overflow in derive_spatial_luma_vector_prediction()
  * CVE-2023-49467
    heap-buffer-overflow in derive_combined_bipredictive_merging_candidates()
  * CVE-2023-49468
    global buffer overflow in read_coding_unit()

[dgit import unpatched libde265 1.0.11-0+deb10u6]
28 files changed:
debian/.gitlab-ci.yml
debian/changelog
debian/compat
debian/control
debian/copyright
debian/libde265-0.install
debian/libde265-0.symbols
debian/libde265-dev.docs
debian/libde265-dev.install
debian/libde265-examples.install
debian/not-installed
debian/patches/CVE-2023-27102.patch
debian/patches/CVE-2023-27103.patch
debian/patches/CVE-2023-43887.patch
debian/patches/CVE-2023-47471.patch
debian/patches/CVE-2023-49465.patch
debian/patches/CVE-2023-49467.patch
debian/patches/CVE-2023-49468.patch
debian/patches/disable_tools.patch
debian/patches/only_export_decoder_api.patch
debian/patches/recycle_sps_if_possible.patch
debian/patches/reject_reference_pics_from_different_sps.patch
debian/patches/series
debian/patches/use_sps_from_the_image.patch
debian/rules
debian/source/format
debian/upstream/metadata
debian/watch