Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
0001_version.patch | Modify the VERSION file. Follow DOCS/tech/binary-packaging.txt instructions and adjust the version since we modify the source. . Official releases always have a VERSION file and get-orig-source generates one too. |
Miguel A. Colón Vélez <debian.micove@gmail.com> | not-needed | |||
0002_mplayer_debug_printf.patch | in case of crash, suggest installing package mplayer-dbgsym for debugging symbols | Reinhard Tartler <siretart@tauware.de> | not-needed | |||
0100_svn37857_CVE-2016-4352.patch | Validate image size in demux_gif Fixes crash with -vo null and overflow.gif Reported by Gustavo Grieco |
no | debian | upstream, commit:37857 | ||
0201_PATH_MAX_HURD.patch | Fix FTBFS in GNU/Hurd. - PATH_MAX does not have to be defined and is not define in GNU/Hurd. - O_NDELAY is deprecated and not defined in Hurd unless _BSD_SOURCE is defined. . Hardcoding PATH_MAX is ugly but if it's not defined then "anything" is a valid limit as long as it does not break malloc. It would be better if it used dynamically allocated memory instead of 4096 but someone can provide an improved patch for that. |
Miguel A. Colón Vélez <debian.micove@gmail.com> | invalid | 2016-05-25 | ||
0202_glibc-2.27.patch | Fix FTBFS with glibc 2.27 on i386 cpudetect.c uses the non-standard "struct sigcontext" in its SIGILL handler. As of glibc 2.27, this is not defined in strict standards compliant mode. . Fix by defining _GNU_SOURCE in cpudetect.c. |
James Cowgill <jcowgill@debian.org> | yes | debian upstream | ||
0203_generic-arch-fallback.patch | Fallback to the "generic" architecture if cpu detection fails Should fix FTBFS on m68k and riscv. | James Cowgill <jcowgill@debian.org> | yes | debian upstream | ||
CVE-2022-38850_CVE-2022-38851_CVE-2022-38855_CVE-2022-38858_CVE-2022-38860_CVE-2022-38861_CVE-2022-38863_CVE-2022-38864_CVE-2022-38865_CVE-2022-38866.patch | Backports of the following commits: d19ea1ce173e95c31b0e8acbe471ea26c292be2b (CVE-2022-38850) [PATCH] vd.c: sanity-check aspect adjustment 58db9292a414ebf13a2cacdb3ffa967fb9036935 (CVE-2022-38851) PATCH] asfheader.c: Fix CHECKDEC macro. 2f6e69e59e2614acdde5505b049c48f80a3d0eb7 (CVE-2022-38855) [PATCH] demux_mov.c: Add bounds checks to debug prints. 92e0d0b1a04dfdd4ac741e0d07005e3ece2c92ca (CVE-2022-38858) [PATCH] demux_mov.c: robustness fixes. 62fe0c63cf4fba91efd29bbc85309280e1a99a47 (CVE-2022-38860) [PATCH] demux_avi.c: check that sh->wf exists before using it. 2622e7fbe3605a2f3b4f74900197fefeedc0d2e1 (CVE-2022-38861) [PATCH] mp_image.c: fix allocation size for formats with odd width. b5e745b4bfab2835103a060094fae3c6cc1ba17d (CVE-2022-38863) [PATCH] mpeg_hdr.c: Allocate 0xff initialized padding. 36546389ef9fb6b0e0540c5c3f212534c34b0e94 (CVE-2022-38864) [PATCH] mpeg_hdr.c: Fix unescape code. 33d9295663c37a37216633d7e3f07e7155da6144 (CVE-2022-38865) [PATCH] demux_avi.c: Fixup invalid audio block size. 373517da3bb5781726565eb3114a2697b13f00f2 (CVE-2022-38866) [PATCH] aviheader.c: Fix allocation size for vprp |
no |