Debian Patches

Status for flac/1.3.3-2+deb11u2

Patch Description Author Forwarded Bugs Origin Last update
Revert-man-Makefile-Fail-more-gracefully.patch [PATCH] Revert "man/Makefile : Fail more gracefully."
This reverts commit 023f06f6cbc316127ca1a4fb4178ef344a413bd5.
Fabian Greffrath <fabian@greffrath.com> no 2013-06-06
privacy-breach-logo.patch Fix "privacy-breach-logo" lintian error. Fabian Greffrath <fabian+debian@greffrath.com> no
0001-remove-build-path-from-generated-FLAC.tag-file.patch [PATCH] remove build path from generated FLAC.tag file
Use sed to update paths to point to locations in /usr/include rather than
locations in the source directory at build time.
Dafydd Harries <daf@rhydd.org> no 2016-12-03
0020-libFLAC-bitreader.c-Fix-out-of-bounds-read.patch [PATCH 20/63] libFLAC/bitreader.c: Fix out-of-bounds read Erik de Castro Lopo <erikd@mega-nerd.com> no 2019-10-07
0021-CVE-2021-0561.patch [PATCH] libFlac: Exit at EOS in verify mode
When verify mode is enabled, once decoder flags end of stream,
encode processing is considered complete.

CVE-2021-0561
Neelkamal Semwal <neelkamal.semwal@ittiam.com> no 2020-12-18
0022-CVE-2020-22219.patch [PATCH] Add and use _nofree variants of safe_realloc functions
Parts of the code use realloc like

x = safe_realloc(x, somesize);

when this is the case, the safe_realloc variant used must free the
old memory block in case it fails, otherwise it will leak. However,
there are also instances in the code where handling is different:

if (0 == (x = safe_realloc(y, somesize)))
return false

in this case, y should not be freed, as y is not set to NULL we
could encounter double frees. Here the safe_realloc_nofree
functions are used.
Martijn van Beurden <mvanb1@gmail.com> no 2022-08-03

All known versions for source package 'flac'

Links