ubuntu/+source/openjpeg2:applied/debian/buster

Last commit made on 2021-06-19
Get this branch:
git clone -b applied/debian/buster https://git.launchpad.net/ubuntu/+source/openjpeg2
Members of git-ubuntu import can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/debian/buster
Repository:
lp:ubuntu/+source/openjpeg2

Recent commits

7940b84... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

2.3.0-2+deb10u2 (patches applied)

Imported using git-ubuntu import.

2c78d18... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

CVE-2020-6851.patch

No DEP3 Subject or Description header found

Gbp-Pq: CVE-2020-6851.patch.

f205932... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] opj_tcd_init_tile(): avoid integer overflow

Gbp-Pq: CVE-2020-8112.patch.

b083542... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] opj_decompress: fix double-free on input directory with mix

Gbp-Pq: CVE-2020-15389.patch.

24ac1f7... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] Encoder: avoid global buffer overflow on irreversible

Gbp-Pq: CVE-2020-27824.patch.

da4861b... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] pi.c: avoid out of bounds access with POC (fixes #1302)

Gbp-Pq: CVE-2020-27845.patch.

6de4d40... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] opj_t2_encode_packet(): avoid out of bound access of #1297,

Gbp-Pq: CVE-2020-27843.patch.

36f8eb7... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] opj_t2_encode_packet(): avoid out of bound access of #1294,

Gbp-Pq: CVE-2020-27842.patch.

d16e1b9... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] pi.c: avoid out of bounds access with POC (refs

Gbp-Pq: CVE-2020-27841.patch.

d5e871c... by =?utf-8?q?Moritz_M=C3=BChlenhoff?= <email address hidden>

[PATCH] pngtoimage(): fix wrong computation of x1,y1 if -d option is

Gbp-Pq: CVE-2020-27823.patch.