Package: exiv2 / 0.27.3-3+deb11u2
Metadata
Package | Version | Patches format |
---|---|---|
exiv2 | 0.27.3-3+deb11u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
xmpsdk integer typedef x64.patch | (download) |
xmpsdk/include/XMP_Const.h |
16 0 + 16 - 0 ! |
xmpsdk-integer-typedef-x64 unconditionally use <stdint.h> to define known bit-width types. =================================================================== |
fix man page table formatting.patch | (download) |
man/man1/exiv2.1 |
34 17 + 17 - 0 ! |
fix man page table width and separation |
fcf protection only on x86.diff | (download) |
cmake/compilerFlags.cmake |
5 4 + 1 - 0 ! |
use -fcf-protection only on x86 architectures It does not exist elsewhere. |
CVE 2021 31291.patch | (download) |
src/jp2image.cpp |
5 3 + 2 - 0 ! |
[patch] fix out of buffer access in #1529 |
CVE 2021 3482.patch | (download) |
src/jp2image.cpp |
9 6 + 3 - 0 ! |
[patch] fix_1522_jp2image_exif_asan |
CVE 2021 29458.patch | (download) |
src/crwimage_int.cpp |
8 6 + 2 - 0 ! |
[patch 1/5] fix incorrect delete. |
CVE 2021 29463.patch | (download) |
src/webpimage.cpp |
41 30 + 11 - 0 ! |
[patch] improve bound checking in webpimage::dowritemetadata() |
CVE 2021 29464.patch | (download) |
src/jp2image.cpp |
20 12 + 8 - 0 ! |
[patch] better bounds checking in jp2image::encodejp2header() |
CVE 2021 29470.patch | (download) |
src/jp2image.cpp |
3 3 + 0 - 0 ! |
[patch 1/2] add more bounds checks in jp2image::encodejp2header |
CVE 2021 29623.patch | (download) |
src/webpimage.cpp |
6 3 + 3 - 0 ! |
[patch] use readorthrow to check error conditions of iio.read(). (cherry picked from commit 0f9eb74c44c908e170a64cab590949d53749af8e) |
CVE 2021 32815.patch | (download) |
src/crwimage_int.cpp |
9 6 + 3 - 0 ! |
[patch 1/4] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m |
CVE 2021 34334.patch | (download) |
src/crwimage_int.cpp |
8 6 + 2 - 0 ! |
[patch 1/2] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p |
CVE 2021 34335.patch | (download) |
include/exiv2/value.hpp |
6 3 + 3 - 0 ! |
[patch 1/3] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984 |
CVE 2021 29473.patch | (download) |
src/jp2image.cpp |
1 1 + 0 - 0 ! |
[patch 1/2] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-7569-phvm-vwc2 |
CVE 2021 37615.patch | (download) |
src/pentaxmn_int.cpp |
35 22 + 13 - 0 ! |
[patch 1/2] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w |
CVE 2021 37618.patch | (download) |
src/jp2image.cpp |
2 2 + 0 - 0 ! |
[patch 1/2] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2 (cherry picked from commit 655495847bc39170bc4c06f9727483874fdc9c93) |
CVE 2021 37619.patch | (download) |
src/jp2image.cpp |
2 1 + 1 - 0 ! |
[patch] fix incorrect loop condition (#1752) |
CVE 2021 37620.patch | (download) |
samples/addmoddel.cpp |
2 1 + 1 - 0 ! |
[patch 1/3] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728 |
CVE 2021 37621.patch | (download) |
src/image.cpp |
3 3 + 0 - 0 ! |
[patch 1/2] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg |
CVE 2021 37622.patch | (download) |
src/jpgimage.cpp |
4 1 + 3 - 0 ! |
[patch 1/3] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv (cherry picked from commit 61cb1a1ca15282bee76c33eb9abdb416ac366471) |
CVE 2021 37623.patch | (download) |
src/jpgimage.cpp |
3 2 + 1 - 0 ! |
[patch 1/2] regression test for https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq |
fix gtest 1.11.patch | (download) |
unitTests/test_slice.cpp |
6 3 + 3 - 0 ! |
[patch] fix build with gtest 1.11 INSTANTIATE_TYPED_TEST_CASE_P requires a non-empty prefix now |