[SCM] libav/master: add missing post 0.8 patches
siretart at users.alioth.debian.org
siretart at users.alioth.debian.org
Mon Mar 5 18:25:49 UTC 2012
The following commit has been merged in the master branch:
commit 186c6574446e1009f454df363247a34c00d8aa34
Author: Reinhard Tartler <siretart at tauware.de>
Date: Mon Mar 5 19:25:25 2012 +0100
add missing post 0.8 patches
diff --git a/debian/patches/post-0.8/0001-lavc-add-avcodec_is_open.patch b/debian/patches/post-0.8/0001-lavc-add-avcodec_is_open.patch
index 284268c..5b49154 100644
--- a/debian/patches/post-0.8/0001-lavc-add-avcodec_is_open.patch
+++ b/debian/patches/post-0.8/0001-lavc-add-avcodec_is_open.patch
@@ -1,7 +1,7 @@
From 350d06d63fc758d047c050e0835f540277799f60 Mon Sep 17 00:00:00 2001
From: Anton Khirnov <anton at khirnov.net>
Date: Thu, 8 Dec 2011 06:57:44 +0100
-Subject: [PATCH 01/80] lavc: add avcodec_is_open().
+Subject: [PATCH 01/83] lavc: add avcodec_is_open().
It allows to check whether an AVCodecContext is open in a documented
way. Right now the undocumented way this check is done in lavf/lavc is
@@ -124,5 +124,5 @@ index 22ee13b..3733a50 100644
for(i=0;i<ic->nb_streams;i++) {
st = ic->streams[i];
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0002-lavc-make-avcodec_close-work-properly-on-unopened-co.patch b/debian/patches/post-0.8/0002-lavc-make-avcodec_close-work-properly-on-unopened-co.patch
index 0d8a646..04b37bd 100644
--- a/debian/patches/post-0.8/0002-lavc-make-avcodec_close-work-properly-on-unopened-co.patch
+++ b/debian/patches/post-0.8/0002-lavc-make-avcodec_close-work-properly-on-unopened-co.patch
@@ -1,7 +1,7 @@
From bafd38a352126385ec0dcea51017229373b1c2f3 Mon Sep 17 00:00:00 2001
From: Anton Khirnov <anton at khirnov.net>
Date: Sun, 29 Jan 2012 12:17:30 +0100
-Subject: [PATCH 02/80] lavc: make avcodec_close() work properly on unopened
+Subject: [PATCH 02/83] lavc: make avcodec_close() work properly on unopened
codecs.
I.e. free the priv_data and other stuff allocated in
@@ -74,5 +74,5 @@ index b097c9b..b2bd702 100644
av_opt_free(avctx);
av_freep(&avctx->priv_data);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0003-lavc-set-AVCodecContext.codec-in-avcodec_get_context.patch b/debian/patches/post-0.8/0003-lavc-set-AVCodecContext.codec-in-avcodec_get_context.patch
index c9ab486..b658307 100644
--- a/debian/patches/post-0.8/0003-lavc-set-AVCodecContext.codec-in-avcodec_get_context.patch
+++ b/debian/patches/post-0.8/0003-lavc-set-AVCodecContext.codec-in-avcodec_get_context.patch
@@ -1,7 +1,7 @@
From 571a4cf273a84b6f7f38697b462e667d4f0fddc4 Mon Sep 17 00:00:00 2001
From: Anton Khirnov <anton at khirnov.net>
Date: Sat, 28 Jan 2012 19:15:15 +0100
-Subject: [PATCH 03/80] lavc: set AVCodecContext.codec in
+Subject: [PATCH 03/83] lavc: set AVCodecContext.codec in
avcodec_get_context_defaults3().
This way, if the AVCodecContext is allocated for a specific codec, the
@@ -110,5 +110,5 @@ index 3733a50..f2d5502 100644
/* force thread count to 1 since the h264 decoder will not extract SPS
* and PPS to extradata during multi-threaded decoding */
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0004-qdm2-Check-data-block-size-for-bytes-to-bits-overflo.patch b/debian/patches/post-0.8/0004-qdm2-Check-data-block-size-for-bytes-to-bits-overflo.patch
index 1aa1ecc..d3cafbd 100644
--- a/debian/patches/post-0.8/0004-qdm2-Check-data-block-size-for-bytes-to-bits-overflo.patch
+++ b/debian/patches/post-0.8/0004-qdm2-Check-data-block-size-for-bytes-to-bits-overflo.patch
@@ -1,7 +1,7 @@
From e364f507183634a9134eea0e004c8ae448e54469 Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Wed, 25 Jan 2012 15:27:11 -0800
-Subject: [PATCH 04/80] qdm2: Check data block size for bytes to bits
+Subject: [PATCH 04/83] qdm2: Check data block size for bytes to bits
overflow.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -30,5 +30,5 @@ index 91c47a8..6acb7d8 100644
s->fft_order = av_log2(s->fft_size) + 1;
s->fft_frame_size = 2 * s->fft_size; // complex has two floats
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0005-libavcodec-Don-t-crash-in-avcodec_encode_audio-if-ti.patch b/debian/patches/post-0.8/0005-libavcodec-Don-t-crash-in-avcodec_encode_audio-if-ti.patch
index a3b8dbc..10d00af 100644
--- a/debian/patches/post-0.8/0005-libavcodec-Don-t-crash-in-avcodec_encode_audio-if-ti.patch
+++ b/debian/patches/post-0.8/0005-libavcodec-Don-t-crash-in-avcodec_encode_audio-if-ti.patch
@@ -1,7 +1,7 @@
From fc89f15497c2b5b78a992c98eaba9fca7cc82f8f Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Martin=20Storsj=C3=B6?= <martin at martin.st>
Date: Thu, 26 Jan 2012 21:37:38 +0200
-Subject: [PATCH 05/80] libavcodec: Don't crash in avcodec_encode_audio if
+Subject: [PATCH 05/83] libavcodec: Don't crash in avcodec_encode_audio if
time_base isn't set
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
@@ -41,5 +41,5 @@ index 5109bf8..f64bff8 100644
ret = ff_thread_init(avctx);
if (ret < 0) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0006-swscale-fix-V-plane-memory-location-in-bilinear-unsc.patch b/debian/patches/post-0.8/0006-swscale-fix-V-plane-memory-location-in-bilinear-unsc.patch
index 5e6107e..59bbbdc 100644
--- a/debian/patches/post-0.8/0006-swscale-fix-V-plane-memory-location-in-bilinear-unsc.patch
+++ b/debian/patches/post-0.8/0006-swscale-fix-V-plane-memory-location-in-bilinear-unsc.patch
@@ -1,7 +1,7 @@
From a2c8db1b792670f8987c0580bb71ca0f29708d8b Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 7 Feb 2012 11:33:20 -0800
-Subject: [PATCH 06/80] swscale: fix V plane memory location in
+Subject: [PATCH 06/83] swscale: fix V plane memory location in
bilinear/unscaled RGB/YUYV case.
Fixes bug 221.
@@ -95,5 +95,5 @@ index e38f58b..5db166b 100644
"paddw %%mm5, %%mm4 \n\t" /* uvbuf0[eax+2048] + uvbuf1[eax+2048]*/\
"psrlw $8, %%mm3 \n\t" \
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0007-h264-disallow-constrained-intra-prediction-modes-for.patch b/debian/patches/post-0.8/0007-h264-disallow-constrained-intra-prediction-modes-for.patch
index 9e84f4a..48c1d57 100644
--- a/debian/patches/post-0.8/0007-h264-disallow-constrained-intra-prediction-modes-for.patch
+++ b/debian/patches/post-0.8/0007-h264-disallow-constrained-intra-prediction-modes-for.patch
@@ -1,7 +1,7 @@
From 4c7879775e81ccca8f0f1d2a7b70524ee47b16ca Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 9 Feb 2012 22:57:01 -0800
-Subject: [PATCH 07/80] h264: disallow constrained intra prediction modes for
+Subject: [PATCH 07/83] h264: disallow constrained intra prediction modes for
luma.
Conversion of the luma intra prediction mode to one of the constrained
@@ -121,5 +121,5 @@ index 3cd95ba..5cc57a7 100644
return 0;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0008-ws_snd1-Fix-wrong-samples-count-and-crash.patch b/debian/patches/post-0.8/0008-ws_snd1-Fix-wrong-samples-count-and-crash.patch
index ebe7c6b..a5b22ae 100644
--- a/debian/patches/post-0.8/0008-ws_snd1-Fix-wrong-samples-count-and-crash.patch
+++ b/debian/patches/post-0.8/0008-ws_snd1-Fix-wrong-samples-count-and-crash.patch
@@ -1,7 +1,7 @@
From 697a45d861b7cd6a96718383a44f41348487f844 Mon Sep 17 00:00:00 2001
From: Michael Niedermayer <michaelni at gmx.at>
Date: Sun, 25 Dec 2011 00:10:27 +0100
-Subject: [PATCH 08/80] ws_snd1: Fix wrong samples count and crash.
+Subject: [PATCH 08/83] ws_snd1: Fix wrong samples count and crash.
Signed-off-by: Michael Niedermayer <michaelni at gmx.at>
(cherry picked from commit 9fb7a5af97d8c084c3af2566070d09eae0ab49fc)
@@ -30,5 +30,5 @@ index b2d086e..15eb6f8 100644
default: smp = count + 1; break;
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0009-atrac3-Fix-crash-in-tonal-component-decoding.patch b/debian/patches/post-0.8/0009-atrac3-Fix-crash-in-tonal-component-decoding.patch
index 5290b0f..1404615 100644
--- a/debian/patches/post-0.8/0009-atrac3-Fix-crash-in-tonal-component-decoding.patch
+++ b/debian/patches/post-0.8/0009-atrac3-Fix-crash-in-tonal-component-decoding.patch
@@ -1,7 +1,7 @@
From f43b6e2b1ed47a1254a5d44c700a7fad5e9784be Mon Sep 17 00:00:00 2001
From: Michael Niedermayer <michaelni at gmx.at>
Date: Sat, 17 Dec 2011 03:18:58 +0100
-Subject: [PATCH 09/80] atrac3: Fix crash in tonal component decoding.
+Subject: [PATCH 09/83] atrac3: Fix crash in tonal component decoding.
Add a check to avoid writing past the end of the channel_unit.components[]
array.
@@ -33,5 +33,5 @@ index 6dec6a3..107c6ff 100644
max_coded_values = SAMPLES_PER_FRAME - pComponent[component_count].pos;
coded_values = coded_values_per_component + 1;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0010-shorten-Use-separate-pointers-for-the-allocated-memo.patch b/debian/patches/post-0.8/0010-shorten-Use-separate-pointers-for-the-allocated-memo.patch
index 9d0df23..9c166a3 100644
--- a/debian/patches/post-0.8/0010-shorten-Use-separate-pointers-for-the-allocated-memo.patch
+++ b/debian/patches/post-0.8/0010-shorten-Use-separate-pointers-for-the-allocated-memo.patch
@@ -1,7 +1,7 @@
From 6fc3287b9ccece290c5881b92948772bbf72e68c Mon Sep 17 00:00:00 2001
From: Michael Niedermayer <michaelni at gmx.at>
Date: Sun, 25 Dec 2011 12:28:50 +0100
-Subject: [PATCH 10/80] shorten: Use separate pointers for the allocated
+Subject: [PATCH 10/83] shorten: Use separate pointers for the allocated
memory for decoded samples.
Fixes invalid free() if any of the buffers are not allocated due to either
@@ -62,5 +62,5 @@ index eb67df7..83777fb 100644
}
av_freep(&s->bitstream);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0011-golomb-avoid-infinite-loop-on-all-zero-input-or-end-.patch b/debian/patches/post-0.8/0011-golomb-avoid-infinite-loop-on-all-zero-input-or-end-.patch
index ee85a73..019348e 100644
--- a/debian/patches/post-0.8/0011-golomb-avoid-infinite-loop-on-all-zero-input-or-end-.patch
+++ b/debian/patches/post-0.8/0011-golomb-avoid-infinite-loop-on-all-zero-input-or-end-.patch
@@ -1,7 +1,7 @@
From e1f2a6a32b86fef0916338e21851c9b4f499f706 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 14 Feb 2012 11:50:57 -0800
-Subject: [PATCH 11/80] golomb: avoid infinite loop on all-zero input (or end
+Subject: [PATCH 11/83] golomb: avoid infinite loop on all-zero input (or end
of buffer).
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -36,5 +36,5 @@ index 503aa14..e19064c 100644
CLOSE_READER(re, gb);
return ret - 1;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0012-get_bits-add-HAVE_BITS_REMAINING-macro.patch b/debian/patches/post-0.8/0012-get_bits-add-HAVE_BITS_REMAINING-macro.patch
index 3ace825..b811a31 100644
--- a/debian/patches/post-0.8/0012-get_bits-add-HAVE_BITS_REMAINING-macro.patch
+++ b/debian/patches/post-0.8/0012-get_bits-add-HAVE_BITS_REMAINING-macro.patch
@@ -1,7 +1,7 @@
From 25b4ed053f0e4c48b4b4afdcf84306bbd7752314 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 22 Feb 2012 12:09:33 -0800
-Subject: [PATCH 12/80] get_bits: add HAVE_BITS_REMAINING macro.
+Subject: [PATCH 12/83] get_bits: add HAVE_BITS_REMAINING macro.
(cherry picked from commit b44b41633f110e9d938165e0f79c9d32191fc135)
@@ -48,5 +48,5 @@ index 1668600..ee47441 100644
#define SKIP_BITS(name, gb, num) do { \
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0013-golomb-use-HAVE_BITS_REMAINING-macro-to-prevent-infl.patch b/debian/patches/post-0.8/0013-golomb-use-HAVE_BITS_REMAINING-macro-to-prevent-infl.patch
index 16345eb..fb113c8 100644
--- a/debian/patches/post-0.8/0013-golomb-use-HAVE_BITS_REMAINING-macro-to-prevent-infl.patch
+++ b/debian/patches/post-0.8/0013-golomb-use-HAVE_BITS_REMAINING-macro-to-prevent-infl.patch
@@ -1,7 +1,7 @@
From e43bd4fa58b8e72eedad9a1c160b12bf8915d45e Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 12:54:37 -0800
-Subject: [PATCH 13/80] golomb: use HAVE_BITS_REMAINING() macro to prevent
+Subject: [PATCH 13/83] golomb: use HAVE_BITS_REMAINING() macro to prevent
infloop on EOF.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -27,5 +27,5 @@ index e19064c..0deab87 100644
CLOSE_READER(re, gb);
return ret - 1;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0014-flac-fix-infinite-loops-on-all-zero-input-or-end-of-.patch b/debian/patches/post-0.8/0014-flac-fix-infinite-loops-on-all-zero-input-or-end-of-.patch
index 3fc3c9e..b0d5caa 100644
--- a/debian/patches/post-0.8/0014-flac-fix-infinite-loops-on-all-zero-input-or-end-of-.patch
+++ b/debian/patches/post-0.8/0014-flac-fix-infinite-loops-on-all-zero-input-or-end-of-.patch
@@ -1,7 +1,7 @@
From 6dcbbdc0116a50370d66f0f20d74a70d56568382 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 15 Feb 2012 09:52:11 -0800
-Subject: [PATCH 14/80] flac: fix infinite loops on all-zero input or
+Subject: [PATCH 14/83] flac: fix infinite loops on all-zero input or
end-of-stream.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -49,5 +49,5 @@ index 0deab87..1712540 100644
UPDATE_CACHE(re, gb);
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0015-rv20-prevent-calling-ff_h263_decode_mba-with-unset-h.patch b/debian/patches/post-0.8/0015-rv20-prevent-calling-ff_h263_decode_mba-with-unset-h.patch
index 04c18f5..bcde3ba 100644
--- a/debian/patches/post-0.8/0015-rv20-prevent-calling-ff_h263_decode_mba-with-unset-h.patch
+++ b/debian/patches/post-0.8/0015-rv20-prevent-calling-ff_h263_decode_mba-with-unset-h.patch
@@ -1,7 +1,7 @@
From ba418ad4005a2cc2f18cdfa089d0bcd55225b30e Mon Sep 17 00:00:00 2001
From: Janne Grunau <janne-libav at jannau.net>
Date: Tue, 24 Jan 2012 21:50:50 +0100
-Subject: [PATCH 15/80] rv20: prevent calling ff_h263_decode_mba() with unset
+Subject: [PATCH 15/83] rv20: prevent calling ff_h263_decode_mba() with unset
height/width
Prevents a crash of VLC during playback of a invalid matroska file,
@@ -30,5 +30,5 @@ index 1d78c92..ccc0944 100644
mb_pos = ff_h263_decode_mba(s);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0016-wma-Clip-WMA1-and-WMA2-frame-length-to-11-bits.patch b/debian/patches/post-0.8/0016-wma-Clip-WMA1-and-WMA2-frame-length-to-11-bits.patch
index 7d09537..7129680 100644
--- a/debian/patches/post-0.8/0016-wma-Clip-WMA1-and-WMA2-frame-length-to-11-bits.patch
+++ b/debian/patches/post-0.8/0016-wma-Clip-WMA1-and-WMA2-frame-length-to-11-bits.patch
@@ -1,7 +1,7 @@
From ad0ee682b3cf663eb319020086f64da11d17dd82 Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Tue, 24 Jan 2012 18:43:43 -0800
-Subject: [PATCH 16/80] wma: Clip WMA1 and WMA2 frame length to 11 bits.
+Subject: [PATCH 16/83] wma: Clip WMA1 and WMA2 frame length to 11 bits.
The MDCT buffers in the decoder are only sized for up to 11 bits. The
reverse engineered documentation for WMA1/2 headers say that that for
@@ -33,5 +33,5 @@ index 4cdffcd..d82fde7 100644
} else if (sample_rate <= 96000) {
frame_len_bits = 12;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0017-aac-fix-infinite-loop-on-end-of-frame-with-sequence-.patch b/debian/patches/post-0.8/0017-aac-fix-infinite-loop-on-end-of-frame-with-sequence-.patch
index 9d1d02f..71cd402 100644
--- a/debian/patches/post-0.8/0017-aac-fix-infinite-loop-on-end-of-frame-with-sequence-.patch
+++ b/debian/patches/post-0.8/0017-aac-fix-infinite-loop-on-end-of-frame-with-sequence-.patch
@@ -1,7 +1,7 @@
From 683213230e6978302109253a48610a6b069ea43d Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Wed, 22 Feb 2012 11:05:42 -0800
-Subject: [PATCH 17/80] aac: fix infinite loop on end-of-frame with sequence
+Subject: [PATCH 17/83] aac: fix infinite loop on end-of-frame with sequence
of 1-bits.
Based-on-work-by: Ronald S. Bultje <rsbultje at gmail.com>
@@ -52,5 +52,5 @@ index ca1a876..2b9b45c 100644
band_type [idx] = sect_band_type;
band_type_run_end[idx++] = sect_end;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0018-matroskadec-Pad-AAC-extradata.patch b/debian/patches/post-0.8/0018-matroskadec-Pad-AAC-extradata.patch
index 5ac1bd6..08c9f4c 100644
--- a/debian/patches/post-0.8/0018-matroskadec-Pad-AAC-extradata.patch
+++ b/debian/patches/post-0.8/0018-matroskadec-Pad-AAC-extradata.patch
@@ -1,7 +1,7 @@
From be0b3137d02e2e19bd470f2de888bdeb281b0214 Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Wed, 25 Jan 2012 14:34:21 -0800
-Subject: [PATCH 18/80] matroskadec: Pad AAC extradata.
+Subject: [PATCH 18/83] matroskadec: Pad AAC extradata.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -27,5 +27,5 @@ index e5fbd43..5b91944 100644
return AVERROR(ENOMEM);
extradata[0] = (profile << 3) | ((sri&0x0E) >> 1);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0019-matroska-don-t-overwrite-string-values-until-read-al.patch b/debian/patches/post-0.8/0019-matroska-don-t-overwrite-string-values-until-read-al.patch
index 5e21a94..6ac2b3f 100644
--- a/debian/patches/post-0.8/0019-matroska-don-t-overwrite-string-values-until-read-al.patch
+++ b/debian/patches/post-0.8/0019-matroska-don-t-overwrite-string-values-until-read-al.patch
@@ -1,7 +1,7 @@
From 183e0eb5b9a8780b9879bd78b20ad9156d756a01 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 24 Feb 2012 16:12:18 -0800
-Subject: [PATCH 19/80] matroska: don't overwrite string values until
+Subject: [PATCH 19/83] matroska: don't overwrite string values until
read/alloc was succesful.
This prevents certain tags with a default value assigned to them (as per
@@ -50,5 +50,5 @@ index 5b91944..1987b50 100644
return 0;
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0020-lavf-prevent-infinite-loops-while-flushing-in-avform.patch b/debian/patches/post-0.8/0020-lavf-prevent-infinite-loops-while-flushing-in-avform.patch
index 80f0a87..709ef77 100644
--- a/debian/patches/post-0.8/0020-lavf-prevent-infinite-loops-while-flushing-in-avform.patch
+++ b/debian/patches/post-0.8/0020-lavf-prevent-infinite-loops-while-flushing-in-avform.patch
@@ -1,7 +1,7 @@
From d16653c3d437ff7843c111d9fffa3e8c3e186db7 Mon Sep 17 00:00:00 2001
From: Janne Grunau <janne-libav at jannau.net>
Date: Wed, 18 Jan 2012 10:59:32 +0100
-Subject: [PATCH 20/80] lavf: prevent infinite loops while flushing in
+Subject: [PATCH 20/83] lavf: prevent infinite loops while flushing in
avformat_find_stream_info
If no data was seen for a stream decoder are returning 0 when fed with
@@ -67,5 +67,5 @@ index f2d5502..e6b4f40 100644
ret = 0;
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0021-smacker-Sanity-check-huffman-tables-found-in-the-hea.patch b/debian/patches/post-0.8/0021-smacker-Sanity-check-huffman-tables-found-in-the-hea.patch
index ab93796..d14797a 100644
--- a/debian/patches/post-0.8/0021-smacker-Sanity-check-huffman-tables-found-in-the-hea.patch
+++ b/debian/patches/post-0.8/0021-smacker-Sanity-check-huffman-tables-found-in-the-hea.patch
@@ -1,7 +1,7 @@
From 04597e25952d399a350062c1824587c230cdd5b4 Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Wed, 25 Jan 2012 16:12:42 -0800
-Subject: [PATCH 21/80] smacker: Sanity check huffman tables found in the
+Subject: [PATCH 21/83] smacker: Sanity check huffman tables found in the
headers.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -85,5 +85,5 @@ index 0c7c405..4714fa0 100644
static int decode_header_trees(SmackVContext *smk) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0022-vc1-prevent-null-pointer-dereference-on-broken-files.patch b/debian/patches/post-0.8/0022-vc1-prevent-null-pointer-dereference-on-broken-files.patch
index c7b78ea..3452768 100644
--- a/debian/patches/post-0.8/0022-vc1-prevent-null-pointer-dereference-on-broken-files.patch
+++ b/debian/patches/post-0.8/0022-vc1-prevent-null-pointer-dereference-on-broken-files.patch
@@ -1,7 +1,7 @@
From d19e3e19d67b50cb5614ead2e0f125678e1c257d Mon Sep 17 00:00:00 2001
From: Janne Grunau <janne-libav at jannau.net>
Date: Wed, 25 Jan 2012 15:49:54 +0100
-Subject: [PATCH 22/80] vc1: prevent null pointer dereference on broken files
+Subject: [PATCH 22/83] vc1: prevent null pointer dereference on broken files
CC: libav-stable at libav.org
(cherry picked from commit 510ef04a461b3b54a762c6141ad880cbed85981f)
@@ -25,5 +25,5 @@ index fa95273..0425a87 100644
if (i != n_slices)
s->gb = slices[i].gb;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0023-tta-error-out-if-samplerate-is-zero.patch b/debian/patches/post-0.8/0023-tta-error-out-if-samplerate-is-zero.patch
index 0444a23..174411c 100644
--- a/debian/patches/post-0.8/0023-tta-error-out-if-samplerate-is-zero.patch
+++ b/debian/patches/post-0.8/0023-tta-error-out-if-samplerate-is-zero.patch
@@ -1,7 +1,7 @@
From 7046ae55932f8fae83269871847cea9fd84c23f5 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 10 Feb 2012 10:51:43 -0800
-Subject: [PATCH 23/80] tta: error out if samplerate is zero.
+Subject: [PATCH 23/83] tta: error out if samplerate is zero.
Prevents a division by zero later on.
@@ -29,5 +29,5 @@ index 4656ce1..c8daff2 100644
switch(s->bps) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0024-swscale-enforce-a-minimum-filtersize.patch b/debian/patches/post-0.8/0024-swscale-enforce-a-minimum-filtersize.patch
index 4e33d9b..db63892 100644
--- a/debian/patches/post-0.8/0024-swscale-enforce-a-minimum-filtersize.patch
+++ b/debian/patches/post-0.8/0024-swscale-enforce-a-minimum-filtersize.patch
@@ -1,7 +1,7 @@
From b68470707bf2e010136c6debd25051afdf198466 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Sat, 11 Feb 2012 08:42:28 -0800
-Subject: [PATCH 24/80] swscale: enforce a minimum filtersize.
+Subject: [PATCH 24/83] swscale: enforce a minimum filtersize.
At very small dimensions, this calculation could lead to zero-sized
filters, which leads to uninitialized output, zero-sized allocations,
@@ -32,5 +32,5 @@ index b49f924..9d72196 100644
FF_ALLOC_OR_GOTO(NULL, filter, dstW*sizeof(*filter)*filterSize, fail);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0025-swscale-fix-overflows-in-filterPos-calculation-for-l.patch b/debian/patches/post-0.8/0025-swscale-fix-overflows-in-filterPos-calculation-for-l.patch
index 5c4d108..ac79ad0 100644
--- a/debian/patches/post-0.8/0025-swscale-fix-overflows-in-filterPos-calculation-for-l.patch
+++ b/debian/patches/post-0.8/0025-swscale-fix-overflows-in-filterPos-calculation-for-l.patch
@@ -1,7 +1,7 @@
From cd9bdc639588067732b53bb47a01f7b9b902b9ef Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 22 Feb 2012 16:46:31 -0800
-Subject: [PATCH 25/80] swscale: fix overflows in filterPos[] calculation for
+Subject: [PATCH 25/83] swscale: fix overflows in filterPos[] calculation for
large sizes.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -60,5 +60,5 @@ index 9d72196..2d7029e 100644
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0026-swscale-take-first-lastline-over-underflows-into-acc.patch b/debian/patches/post-0.8/0026-swscale-take-first-lastline-over-underflows-into-acc.patch
index ebe9aee..5b58920 100644
--- a/debian/patches/post-0.8/0026-swscale-take-first-lastline-over-underflows-into-acc.patch
+++ b/debian/patches/post-0.8/0026-swscale-take-first-lastline-over-underflows-into-acc.patch
@@ -1,7 +1,7 @@
From 0c60d5c59fe05de80fc45e097c61b6f5487431de Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 22 Feb 2012 16:48:38 -0800
-Subject: [PATCH 26/80] swscale: take first/lastline over/underflows into
+Subject: [PATCH 26/83] swscale: take first/lastline over/underflows into
account for MMX.
Fixes crashes for extremely large resizes (several 100-fold).
@@ -65,5 +65,5 @@ index 867a9f1..0853e12 100644
int s= APCK_SIZE / 8;
for (i=0; i<vLumFilterSize; i+=2) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0027-vc1-prevent-using-last_frame-as-a-reference-for-I-P-.patch b/debian/patches/post-0.8/0027-vc1-prevent-using-last_frame-as-a-reference-for-I-P-.patch
index 7a07464..12655c2 100644
--- a/debian/patches/post-0.8/0027-vc1-prevent-using-last_frame-as-a-reference-for-I-P-.patch
+++ b/debian/patches/post-0.8/0027-vc1-prevent-using-last_frame-as-a-reference-for-I-P-.patch
@@ -1,7 +1,7 @@
From 5bcd47cf63cb719e1c650d08cdfb7f4ede351367 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 14 Feb 2012 12:40:19 -0800
-Subject: [PATCH 27/80] vc1: prevent using last_frame as a reference for I/P
+Subject: [PATCH 27/83] vc1: prevent using last_frame as a reference for I/P
first frame.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -50,5 +50,5 @@ index 0425a87..3869d92 100644
s->current_picture.f.motion_val[1][s->block_index[0] + v->blocks_off][1] = ty;
uvmx = (tx + ((tx & 3) == 3)) >> 1;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0028-cook-prevent-div-by-zero-if-channels-is-zero.patch b/debian/patches/post-0.8/0028-cook-prevent-div-by-zero-if-channels-is-zero.patch
index e2c6cb6..0be3408 100644
--- a/debian/patches/post-0.8/0028-cook-prevent-div-by-zero-if-channels-is-zero.patch
+++ b/debian/patches/post-0.8/0028-cook-prevent-div-by-zero-if-channels-is-zero.patch
@@ -1,7 +1,7 @@
From cfd7d166e2ae68302329c059afa7c4778a70e9b5 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 12:10:33 -0800
-Subject: [PATCH 28/80] cook: prevent div-by-zero if channels is zero.
+Subject: [PATCH 28/83] cook: prevent div-by-zero if channels is zero.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -28,5 +28,5 @@ index d2ed819..dc4c2ab 100644
/* Initialize RNG. */
av_lfg_init(&q->random_state, 0);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0029-als-prevent-infinite-loop-in-zero_remaining.patch b/debian/patches/post-0.8/0029-als-prevent-infinite-loop-in-zero_remaining.patch
index 1968a6d..5568889 100644
--- a/debian/patches/post-0.8/0029-als-prevent-infinite-loop-in-zero_remaining.patch
+++ b/debian/patches/post-0.8/0029-als-prevent-infinite-loop-in-zero_remaining.patch
@@ -1,7 +1,7 @@
From 5ab9294a8db5b3a796871e403b1a779a413a494c Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 12:28:26 -0800
-Subject: [PATCH 29/80] als: prevent infinite loop in zero_remaining().
+Subject: [PATCH 29/83] als: prevent infinite loop in zero_remaining().
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -26,5 +26,5 @@ index dc4961c..26496bf 100644
if (count)
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0030-huffyuv-error-out-on-bit-overrun.patch b/debian/patches/post-0.8/0030-huffyuv-error-out-on-bit-overrun.patch
index 8eb1ecb..32815c0 100644
--- a/debian/patches/post-0.8/0030-huffyuv-error-out-on-bit-overrun.patch
+++ b/debian/patches/post-0.8/0030-huffyuv-error-out-on-bit-overrun.patch
@@ -1,7 +1,7 @@
From 27558bd87e7e67b83ddefb9176f1729c2291c7a0 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 15:00:47 -0800
-Subject: [PATCH 30/80] huffyuv: error out on bit overrun.
+Subject: [PATCH 30/83] huffyuv: error out on bit overrun.
On EOF, get_bits() will continuously return 0, causing an infinite
loop.
@@ -29,5 +29,5 @@ index 57b5f32..efa87de 100644
return -1;
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0031-mp3on4-require-a-minimum-framesize.patch b/debian/patches/post-0.8/0031-mp3on4-require-a-minimum-framesize.patch
index 7f74ef7..674b7b9 100644
--- a/debian/patches/post-0.8/0031-mp3on4-require-a-minimum-framesize.patch
+++ b/debian/patches/post-0.8/0031-mp3on4-require-a-minimum-framesize.patch
@@ -1,7 +1,7 @@
From 95a9d44dc3121a93c68087dddd7b9b49d34bf930 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 15:20:27 -0800
-Subject: [PATCH 31/80] mp3on4: require a minimum framesize.
+Subject: [PATCH 31/83] mp3on4: require a minimum framesize.
If bufsize < headersize, init_get_bits() will be called with a negative
number, causing it to fail and any subsequent call to get_bits() will
@@ -32,5 +32,5 @@ index a83b162..860c0c3 100644
if (ff_mpa_check_header(header) < 0) // Bad header, discard block
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0032-aiff-don-t-skip-block_align-0-check-on-COMM-after-SS.patch b/debian/patches/post-0.8/0032-aiff-don-t-skip-block_align-0-check-on-COMM-after-SS.patch
index 975842d..d2f24e9 100644
--- a/debian/patches/post-0.8/0032-aiff-don-t-skip-block_align-0-check-on-COMM-after-SS.patch
+++ b/debian/patches/post-0.8/0032-aiff-don-t-skip-block_align-0-check-on-COMM-after-SS.patch
@@ -1,7 +1,7 @@
From 5c365dc9792a6a91637498e2ee1fdcb90c9c7640 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 15:51:27 -0800
-Subject: [PATCH 32/80] aiff: don't skip block_align==0 check on
+Subject: [PATCH 32/83] aiff: don't skip block_align==0 check on
COMM-after-SSND files.
This prevents SIGFPEs when using block_align for divisions.
@@ -35,5 +35,5 @@ index 0e69d02..88e1e68 100644
avpriv_set_pts_info(st, 64, 1, st->codec->sample_rate);
st->start_time = 0;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0033-asf-prevent-packet_size_left-from-going-negative-if-.patch b/debian/patches/post-0.8/0033-asf-prevent-packet_size_left-from-going-negative-if-.patch
index 5dca8c5..4fd1fa2 100644
--- a/debian/patches/post-0.8/0033-asf-prevent-packet_size_left-from-going-negative-if-.patch
+++ b/debian/patches/post-0.8/0033-asf-prevent-packet_size_left-from-going-negative-if-.patch
@@ -1,7 +1,7 @@
From f947e965beb858b67ab6e49f9e24e8d12d9b5a7d Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 12:21:18 -0800
-Subject: [PATCH 33/80] asf: prevent packet_size_left from going negative if
+Subject: [PATCH 33/83] asf: prevent packet_size_left from going negative if
hdrlen > pktlen.
This prevents failed assertions further down in the packet processing
@@ -35,5 +35,5 @@ index 91d285e..eb93f14 100644
if (packet_length < asf->hdr.min_pktsize)
padsize += asf->hdr.min_pktsize - packet_length;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0034-mjpegb-don-t-return-0-at-the-end-of-frame-decoding.patch b/debian/patches/post-0.8/0034-mjpegb-don-t-return-0-at-the-end-of-frame-decoding.patch
index ad11022..7ee75c2 100644
--- a/debian/patches/post-0.8/0034-mjpegb-don-t-return-0-at-the-end-of-frame-decoding.patch
+++ b/debian/patches/post-0.8/0034-mjpegb-don-t-return-0-at-the-end-of-frame-decoding.patch
@@ -1,7 +1,7 @@
From bba43a1ea07392f14c508aeff2ee13a4cfc425b5 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 16:27:36 -0800
-Subject: [PATCH 34/80] mjpegb: don't return 0 at the end of frame decoding.
+Subject: [PATCH 34/83] mjpegb: don't return 0 at the end of frame decoding.
Return 0 indicates "please return the same data again", i.e. it causes
an infinite loop. Instead, return that we consumed the buffer if we
@@ -39,5 +39,5 @@ index 4ad17ab..9f71f50 100644
AVCodec ff_mjpegb_decoder = {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0035-wma-don-t-return-0-on-invalid-packets.patch b/debian/patches/post-0.8/0035-wma-don-t-return-0-on-invalid-packets.patch
index c6eea37..8f0d0e1 100644
--- a/debian/patches/post-0.8/0035-wma-don-t-return-0-on-invalid-packets.patch
+++ b/debian/patches/post-0.8/0035-wma-don-t-return-0-on-invalid-packets.patch
@@ -1,7 +1,7 @@
From fe710f2074a711b5b07b76fe9ecf11b4068b32ef Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 16:57:00 -0800
-Subject: [PATCH 35/80] wma: don't return 0 on invalid packets.
+Subject: [PATCH 35/83] wma: don't return 0 on invalid packets.
Return 0 means "please return the same data again", i.e. it causes an
infinite loop. Instead, return an error.
@@ -35,5 +35,5 @@ index 5600f9b..afc0658 100644
init_get_bits(&s->gb, buf, buf_size*8);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0036-vc1parse-call-vc1_init_common.patch b/debian/patches/post-0.8/0036-vc1parse-call-vc1_init_common.patch
index c3a1b03..132abfe 100644
--- a/debian/patches/post-0.8/0036-vc1parse-call-vc1_init_common.patch
+++ b/debian/patches/post-0.8/0036-vc1parse-call-vc1_init_common.patch
@@ -1,7 +1,7 @@
From 8011a29fa8875aa4de54199bdfcd4e5331d532dd Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 14:18:22 -0800
-Subject: [PATCH 36/80] vc1parse: call vc1_init_common().
+Subject: [PATCH 36/83] vc1parse: call vc1_init_common().
The parser uses VLC tables initialized in vc1_common_init(), therefore
we should call this function on parser init also.
@@ -68,5 +68,5 @@ index 3869d92..3e84464 100644
ff_vc1dsp_init(&v->vc1dsp);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0037-avplay-fix-threads-option.patch b/debian/patches/post-0.8/0037-avplay-fix-threads-option.patch
index 04691da..37be3cb 100644
--- a/debian/patches/post-0.8/0037-avplay-fix-threads-option.patch
+++ b/debian/patches/post-0.8/0037-avplay-fix-threads-option.patch
@@ -1,7 +1,7 @@
From 62beae313a4f91e8ff4e8dc0b2ec78baaa804b32 Mon Sep 17 00:00:00 2001
From: Janne Grunau <janne-libav at jannau.net>
Date: Tue, 21 Feb 2012 16:34:08 +0100
-Subject: [PATCH 37/80] avplay: fix -threads option
+Subject: [PATCH 37/83] avplay: fix -threads option
The AVOptions based default to threads auto in 2473a45c8
works only if avplay does not use custom option handling
@@ -60,5 +60,5 @@ index 432afc1..57fb864 100644
{ "exitonkeydown", OPT_BOOL | OPT_EXPERT, { (void*)&exit_on_keydown }, "exit on key down", "" },
{ "exitonmousedown", OPT_BOOL | OPT_EXPERT, { (void*)&exit_on_mousedown }, "exit on mouse down", "" },
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0038-rmdec-when-using-INT4-deinterleaving-error-out-if-su.patch b/debian/patches/post-0.8/0038-rmdec-when-using-INT4-deinterleaving-error-out-if-su.patch
index 449cc58..edc30cd 100644
--- a/debian/patches/post-0.8/0038-rmdec-when-using-INT4-deinterleaving-error-out-if-su.patch
+++ b/debian/patches/post-0.8/0038-rmdec-when-using-INT4-deinterleaving-error-out-if-su.patch
@@ -1,7 +1,7 @@
From 0312969b9ea7fa7027bca665bfded88690c4caa0 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 21 Feb 2012 10:36:27 -0800
-Subject: [PATCH 38/80] rmdec: when using INT4 deinterleaving, error out if
+Subject: [PATCH 38/83] rmdec: when using INT4 deinterleaving, error out if
sub_packet_h <= 1.
We read sub_packet_h / 2 packets per line of data (during deinterleaving),
@@ -30,5 +30,5 @@ index 75e4833..3d92253 100644
return AVERROR_INVALIDDATA;
break;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0039-truemotion2-error-out-if-the-huffman-tree-has-no-nod.patch b/debian/patches/post-0.8/0039-truemotion2-error-out-if-the-huffman-tree-has-no-nod.patch
index 2becd0d..41cb1a6 100644
--- a/debian/patches/post-0.8/0039-truemotion2-error-out-if-the-huffman-tree-has-no-nod.patch
+++ b/debian/patches/post-0.8/0039-truemotion2-error-out-if-the-huffman-tree-has-no-nod.patch
@@ -1,7 +1,7 @@
From 8e3dc37bc01950915dcdab473fc2694fc3670a54 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 22 Feb 2012 12:19:52 -0800
-Subject: [PATCH 39/80] truemotion2: error out if the huffman tree has no
+Subject: [PATCH 39/83] truemotion2: error out if the huffman tree has no
nodes.
This prevents crashers and errors further down when reading nodes in the
@@ -30,5 +30,5 @@ index 4045342..29d2e4d 100644
return -1;
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0040-swf-check-return-values-for-av_get-new_packet.patch b/debian/patches/post-0.8/0040-swf-check-return-values-for-av_get-new_packet.patch
index f9ac52f..4d33f5d 100644
--- a/debian/patches/post-0.8/0040-swf-check-return-values-for-av_get-new_packet.patch
+++ b/debian/patches/post-0.8/0040-swf-check-return-values-for-av_get-new_packet.patch
@@ -1,7 +1,7 @@
From 4f48417fe768a2d0d1852489463530a9a889fe76 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 23 Feb 2012 11:53:27 -0800
-Subject: [PATCH 40/80] swf: check return values for av_get/new_packet().
+Subject: [PATCH 40/83] swf: check return values for av_get/new_packet().
Prevents crashers when using the packet if allocation failed.
@@ -62,5 +62,5 @@ index 1fc301b..6966176 100644
if (AV_RB32(pkt->data) == 0xffd8ffd9 ||
AV_RB32(pkt->data) == 0xffd9ffd8) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0041-tiff-Prevent-overreads-in-the-type_sizes-array.patch b/debian/patches/post-0.8/0041-tiff-Prevent-overreads-in-the-type_sizes-array.patch
index 801a421..c2719ea 100644
--- a/debian/patches/post-0.8/0041-tiff-Prevent-overreads-in-the-type_sizes-array.patch
+++ b/debian/patches/post-0.8/0041-tiff-Prevent-overreads-in-the-type_sizes-array.patch
@@ -1,7 +1,7 @@
From 424b6edd1944cf02261109edb5913417cf8e5dfb Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Thu, 23 Feb 2012 10:47:50 -0800
-Subject: [PATCH 41/80] tiff: Prevent overreads in the type_sizes array.
+Subject: [PATCH 41/83] tiff: Prevent overreads in the type_sizes array.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -46,5 +46,5 @@ index a88d0f9..6810f81 100644
if(buf && (buf < start || buf > end_buf)){
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0042-mjpeg-abort-decoding-if-packet-is-too-large.patch b/debian/patches/post-0.8/0042-mjpeg-abort-decoding-if-packet-is-too-large.patch
index 66c845b..a65d457 100644
--- a/debian/patches/post-0.8/0042-mjpeg-abort-decoding-if-packet-is-too-large.patch
+++ b/debian/patches/post-0.8/0042-mjpeg-abort-decoding-if-packet-is-too-large.patch
@@ -1,7 +1,7 @@
From bf6d1a1ca792e4207e5d9b71c5020befb2296ae3 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 23 Feb 2012 12:22:40 -0800
-Subject: [PATCH 42/80] mjpeg: abort decoding if packet is too large.
+Subject: [PATCH 42/83] mjpeg: abort decoding if packet is too large.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -28,5 +28,5 @@ index 2ae502d..49d334b 100644
av_log(avctx, AV_LOG_DEBUG, "marker=%x avail_size_in_buf=%td\n",
start_code, buf_end - buf_ptr);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0043-lcl-error-out-if-uncompressed-input-buffer-is-smalle.patch b/debian/patches/post-0.8/0043-lcl-error-out-if-uncompressed-input-buffer-is-smalle.patch
index 2ec19a3..e327ae7 100644
--- a/debian/patches/post-0.8/0043-lcl-error-out-if-uncompressed-input-buffer-is-smalle.patch
+++ b/debian/patches/post-0.8/0043-lcl-error-out-if-uncompressed-input-buffer-is-smalle.patch
@@ -1,7 +1,7 @@
From 19f4943d12968a6dfb7c2915da191489dc614b87 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 23 Feb 2012 16:09:36 -0800
-Subject: [PATCH 43/80] lcl: error out if uncompressed input buffer is smaller
+Subject: [PATCH 43/83] lcl: error out if uncompressed input buffer is smaller
than framesize.
This prevents crashes when trying to read beyond the end of the buffer
@@ -52,5 +52,5 @@ index b66a3ce..5b18418 100644
av_log(avctx, AV_LOG_ERROR, "BUG! Unknown MSZH compression in frame decoder.\n");
return -1;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0044-kgv1-use-avctx-get-release_buffer.patch b/debian/patches/post-0.8/0044-kgv1-use-avctx-get-release_buffer.patch
index 51c6b5e..b690f8e 100644
--- a/debian/patches/post-0.8/0044-kgv1-use-avctx-get-release_buffer.patch
+++ b/debian/patches/post-0.8/0044-kgv1-use-avctx-get-release_buffer.patch
@@ -1,7 +1,7 @@
From e537dc230b2e123be8aebdaeee5a7d7787328b0b Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 29 Dec 2011 09:07:32 -0800
-Subject: [PATCH 44/80] kgv1: use avctx->get/release_buffer().
+Subject: [PATCH 44/83] kgv1: use avctx->get/release_buffer().
Also fixes crashes on corrupt bitstreams.
@@ -160,5 +160,5 @@ index 2d6fa73..4526bf9 100644
.long_name = NULL_IF_CONFIG_SMALL("Kega Game Video"),
};
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0045-kgv1-release-reference-picture-on-size-change.patch b/debian/patches/post-0.8/0045-kgv1-release-reference-picture-on-size-change.patch
index 4d4e360..07dc6d6 100644
--- a/debian/patches/post-0.8/0045-kgv1-release-reference-picture-on-size-change.patch
+++ b/debian/patches/post-0.8/0045-kgv1-release-reference-picture-on-size-change.patch
@@ -1,7 +1,7 @@
From a0473085f3e2300908b1bf7ecf2ed7177eef0d4f Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 24 Feb 2012 16:27:53 -0800
-Subject: [PATCH 45/80] kgv1: release reference picture on size change.
+Subject: [PATCH 45/83] kgv1: release reference picture on size change.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -30,5 +30,5 @@ index 4526bf9..c4c3dac 100644
maxcnt = w * h;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0046-fraps-release-reference-buffer-on-pix_fmt-change.patch b/debian/patches/post-0.8/0046-fraps-release-reference-buffer-on-pix_fmt-change.patch
index cd859c1..f82ba1b 100644
--- a/debian/patches/post-0.8/0046-fraps-release-reference-buffer-on-pix_fmt-change.patch
+++ b/debian/patches/post-0.8/0046-fraps-release-reference-buffer-on-pix_fmt-change.patch
@@ -1,7 +1,7 @@
From 0d30e2c6f28dc0ae1bcb9bb40b26aedb5b5ce731 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 24 Feb 2012 14:11:04 -0800
-Subject: [PATCH 46/80] fraps: release reference buffer on pix_fmt change.
+Subject: [PATCH 46/83] fraps: release reference buffer on pix_fmt change.
Prevents crash when trying to copy from a non-existing plane in e.g.
a RGB32 reference image to a YUV420P target image
@@ -73,5 +73,5 @@ index 1444eda..d887cde 100644
f->reference = 1;
f->buffer_hints = FF_BUFFER_HINTS_VALID |
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0047-rm-prevent-infinite-loops-for-index-parsing.patch b/debian/patches/post-0.8/0047-rm-prevent-infinite-loops-for-index-parsing.patch
index c1b2b83..91d63a1 100644
--- a/debian/patches/post-0.8/0047-rm-prevent-infinite-loops-for-index-parsing.patch
+++ b/debian/patches/post-0.8/0047-rm-prevent-infinite-loops-for-index-parsing.patch
@@ -1,7 +1,7 @@
From abe35728786d79cd8230dffe41205b28ad6b7678 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 22 Feb 2012 11:33:24 -0800
-Subject: [PATCH 47/80] rm: prevent infinite loops for index parsing.
+Subject: [PATCH 47/83] rm: prevent infinite loops for index parsing.
Specifically, prevent jumping back in the file for the next index, since
this can lead to infinite loops where we jump between indexes referring
@@ -57,5 +57,5 @@ index 3d92253..405162e 100644
return 0;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0048-Fix-parser-not-to-clobber-has_b_frames-when-extradat.patch b/debian/patches/post-0.8/0048-Fix-parser-not-to-clobber-has_b_frames-when-extradat.patch
index 86dda35..56f794b 100644
--- a/debian/patches/post-0.8/0048-Fix-parser-not-to-clobber-has_b_frames-when-extradat.patch
+++ b/debian/patches/post-0.8/0048-Fix-parser-not-to-clobber-has_b_frames-when-extradat.patch
@@ -1,7 +1,7 @@
From 0f839cff6bf4569393cd0594f0f300af1c488723 Mon Sep 17 00:00:00 2001
From: Reinhard Tartler <siretart at tauware.de>
Date: Sun, 26 Feb 2012 10:50:45 +0100
-Subject: [PATCH 48/80] Fix parser not to clobber has_b_frames when extradata
+Subject: [PATCH 48/83] Fix parser not to clobber has_b_frames when extradata
is set.
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
@@ -52,5 +52,5 @@ index bcaa04a..48215c5 100644
}
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0049-vorbis-fix-overflows-in-floor1-vector-and-inverse-db.patch b/debian/patches/post-0.8/0049-vorbis-fix-overflows-in-floor1-vector-and-inverse-db.patch
index 7a3d85e..a92a9a0 100644
--- a/debian/patches/post-0.8/0049-vorbis-fix-overflows-in-floor1-vector-and-inverse-db.patch
+++ b/debian/patches/post-0.8/0049-vorbis-fix-overflows-in-floor1-vector-and-inverse-db.patch
@@ -1,7 +1,7 @@
From 2510e1476e9a8bfcca0fe4e85a1380482aed0ab3 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 10 Jan 2012 17:01:26 -0800
-Subject: [PATCH 49/80] vorbis: fix overflows in floor1[] vector and inverse
+Subject: [PATCH 49/83] vorbis: fix overflows in floor1[] vector and inverse
db table index.
(cherry picked from commit 24947d4988012f1f0fd467c83418615adc11c3e8)
@@ -112,5 +112,5 @@ index bb69fed..22a2cf7 100644
av_dlog(NULL, " Decoded floor(%d) = %u / val %u\n",
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0050-Indeo3-fix-crashes-on-corrupt-bitstreams.patch b/debian/patches/post-0.8/0050-Indeo3-fix-crashes-on-corrupt-bitstreams.patch
index f8e436f..a1b0aa1 100644
--- a/debian/patches/post-0.8/0050-Indeo3-fix-crashes-on-corrupt-bitstreams.patch
+++ b/debian/patches/post-0.8/0050-Indeo3-fix-crashes-on-corrupt-bitstreams.patch
@@ -1,7 +1,7 @@
From 9dbd437da2bafbec540e38cb51bc7ce2b0101ee5 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 10:22:28 -0800
-Subject: [PATCH 50/80] Indeo3: fix crashes on corrupt bitstreams.
+Subject: [PATCH 50/83] Indeo3: fix crashes on corrupt bitstreams.
Splits at borders of cells are invalid, since it leaves one of the
cells with a width/height of zero. Also, propagate errors on buffer
@@ -57,5 +57,5 @@ index d2b01f4..55b4ec7 100644
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0051-oma-don-t-read-beyond-end-of-leaf_table.patch b/debian/patches/post-0.8/0051-oma-don-t-read-beyond-end-of-leaf_table.patch
index 64a8c1c..9c1b94d 100644
--- a/debian/patches/post-0.8/0051-oma-don-t-read-beyond-end-of-leaf_table.patch
+++ b/debian/patches/post-0.8/0051-oma-don-t-read-beyond-end-of-leaf_table.patch
@@ -1,7 +1,7 @@
From 71a939fee47d8b59ba1258b481322d16378e556f Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 11:35:36 -0800
-Subject: [PATCH 51/80] oma: don't read beyond end of leaf_table.
+Subject: [PATCH 51/83] oma: don't read beyond end of leaf_table.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -26,5 +26,5 @@ index 0beed71..cc37397 100644
AV_WL64(buf, leaf_table[i]);
AV_WL64(&buf[8], leaf_table[i+1]);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0052-mjpegbdec-Fix-overflow-in-SOS.patch b/debian/patches/post-0.8/0052-mjpegbdec-Fix-overflow-in-SOS.patch
index ff7c80c..80823eb 100644
--- a/debian/patches/post-0.8/0052-mjpegbdec-Fix-overflow-in-SOS.patch
+++ b/debian/patches/post-0.8/0052-mjpegbdec-Fix-overflow-in-SOS.patch
@@ -1,7 +1,7 @@
From 083a8a00373b12dc06b8ae4c49eec61fb5e55f4b Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Wed, 25 Jan 2012 13:39:24 -0800
-Subject: [PATCH 52/80] mjpegbdec: Fix overflow in SOS.
+Subject: [PATCH 52/83] mjpegbdec: Fix overflow in SOS.
Based in part by a fix from Michael Niedermayer <michaelni at gmx.at>
@@ -41,5 +41,5 @@ index 9f71f50..10c5add 100644
s->start_code = SOS;
if (ff_mjpeg_decode_sos(s, NULL, NULL) < 0 &&
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0053-avutil-make-intfloat-api-public.patch b/debian/patches/post-0.8/0053-avutil-make-intfloat-api-public.patch
index ca1ea79..f9d84f5 100644
--- a/debian/patches/post-0.8/0053-avutil-make-intfloat-api-public.patch
+++ b/debian/patches/post-0.8/0053-avutil-make-intfloat-api-public.patch
@@ -1,7 +1,7 @@
From a1556d37b85328fda3c4010bc2f49e1a93273128 Mon Sep 17 00:00:00 2001
From: Paul B Mahol <onemda at gmail.com>
Date: Sun, 29 Jan 2012 20:09:22 +0000
-Subject: [PATCH 53/80] avutil: make intfloat api public
+Subject: [PATCH 53/83] avutil: make intfloat api public
The functions are already av_ prefixed and intfloat header is already provided.
Install libavutil/intfloat.h
@@ -62,5 +62,5 @@ index f0be5c1..0e62b4a 100644
#define LIBAVUTIL_VERSION_INT AV_VERSION_INT(LIBAVUTIL_VERSION_MAJOR, \
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0054-lavf-add-functions-for-accessing-the-fourcc-CodecID-.patch b/debian/patches/post-0.8/0054-lavf-add-functions-for-accessing-the-fourcc-CodecID-.patch
index d4bdd84..19d9733 100644
--- a/debian/patches/post-0.8/0054-lavf-add-functions-for-accessing-the-fourcc-CodecID-.patch
+++ b/debian/patches/post-0.8/0054-lavf-add-functions-for-accessing-the-fourcc-CodecID-.patch
@@ -1,7 +1,7 @@
From 2ad77c60ef862baa2afcdcb7e6f43dedabab38ef Mon Sep 17 00:00:00 2001
From: Anton Khirnov <anton at khirnov.net>
Date: Fri, 27 Jan 2012 13:33:09 +0100
-Subject: [PATCH 54/80] lavf: add functions for accessing the fourcc<->CodecID
+Subject: [PATCH 54/83] lavf: add functions for accessing the fourcc<->CodecID
mapping tables.
Fixes bug 212.
@@ -253,5 +253,5 @@ index cd774fb..009a60b 100644
#define LIBAVFORMAT_VERSION_INT AV_VERSION_INT(LIBAVFORMAT_VERSION_MAJOR, \
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0055-asf-error-out-on-ridiculously-large-minpktsize-value.patch b/debian/patches/post-0.8/0055-asf-error-out-on-ridiculously-large-minpktsize-value.patch
index 76a44ff..b0b3b8d 100644
--- a/debian/patches/post-0.8/0055-asf-error-out-on-ridiculously-large-minpktsize-value.patch
+++ b/debian/patches/post-0.8/0055-asf-error-out-on-ridiculously-large-minpktsize-value.patch
@@ -1,7 +1,7 @@
From 1c63d613721f9fb05dcf1646d00aabf5f63695eb Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Fri, 17 Feb 2012 12:21:22 -0800
-Subject: [PATCH 55/80] asf: error out on ridiculously large minpktsize
+Subject: [PATCH 55/83] asf: error out on ridiculously large minpktsize
values.
They cause various issues further down in demuxing.
@@ -40,5 +40,5 @@ index eb93f14..1fbe79b 100644
asf_read_stream_properties(s, gsize);
} else if (!ff_guidcmp(&g, &ff_asf_comment_header)) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0056-asf-don-t-seek-back-on-EOF.patch b/debian/patches/post-0.8/0056-asf-don-t-seek-back-on-EOF.patch
index 958b209..abfd79a 100644
--- a/debian/patches/post-0.8/0056-asf-don-t-seek-back-on-EOF.patch
+++ b/debian/patches/post-0.8/0056-asf-don-t-seek-back-on-EOF.patch
@@ -1,7 +1,7 @@
From 40ccc811461c2c5f7999200315f9e2a563807147 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 16:13:46 -0800
-Subject: [PATCH 56/80] asf: don't seek back on EOF.
+Subject: [PATCH 56/83] asf: don't seek back on EOF.
Seeking back on EOF will reset the EOF flag, causing us to re-enter
the loop to find the next marker in the ASF file, thus potentially
@@ -30,5 +30,5 @@ index 1fbe79b..969ab28 100644
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0057-vp56-error-out-on-invalid-stream-dimensions.patch b/debian/patches/post-0.8/0057-vp56-error-out-on-invalid-stream-dimensions.patch
index bf836a8..5214c60 100644
--- a/debian/patches/post-0.8/0057-vp56-error-out-on-invalid-stream-dimensions.patch
+++ b/debian/patches/post-0.8/0057-vp56-error-out-on-invalid-stream-dimensions.patch
@@ -1,7 +1,7 @@
From b2dcac7141a2fb72074679efbefcb4d8bef24c41 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 23 Feb 2012 11:19:33 -0800
-Subject: [PATCH 57/80] vp56: error out on invalid stream dimensions.
+Subject: [PATCH 57/83] vp56: error out on invalid stream dimensions.
Prevents crashes when playing corrupt vp5/6 streams.
@@ -56,5 +56,5 @@ index 9433983..e4783c6 100644
if (separated_coeff || !s->filter_header) {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0058-swscale-fix-another-integer-overflow.patch b/debian/patches/post-0.8/0058-swscale-fix-another-integer-overflow.patch
index db7c18a..3254158 100644
--- a/debian/patches/post-0.8/0058-swscale-fix-another-integer-overflow.patch
+++ b/debian/patches/post-0.8/0058-swscale-fix-another-integer-overflow.patch
@@ -1,7 +1,7 @@
From 5f896773e07126dd66f5b83e604e99adb30617cb Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 18:21:31 -0800
-Subject: [PATCH 58/80] swscale: fix another integer overflow.
+Subject: [PATCH 58/83] swscale: fix another integer overflow.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -26,5 +26,5 @@ index 2d7029e..51bc384 100644
((c->vChrFilterPos[chrI] + c->vChrFilterSize - 1)<<c->chrSrcVSubSample));
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0059-qtrle-return-error-on-decode_init-failure.patch b/debian/patches/post-0.8/0059-qtrle-return-error-on-decode_init-failure.patch
index 48b9fb1..6888934 100644
--- a/debian/patches/post-0.8/0059-qtrle-return-error-on-decode_init-failure.patch
+++ b/debian/patches/post-0.8/0059-qtrle-return-error-on-decode_init-failure.patch
@@ -1,7 +1,7 @@
From e904e9b7204b6ebd3433dd49a6c978ffb293cbdc Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 19:00:39 -0800
-Subject: [PATCH 59/80] qtrle: return error on decode_init() failure.
+Subject: [PATCH 59/83] qtrle: return error on decode_init() failure.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -26,5 +26,5 @@ index 0c74798..6e7b3c2 100644
s->frame.data[0] = NULL;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0060-rpza-error-out-on-buffer-overreads.patch b/debian/patches/post-0.8/0060-rpza-error-out-on-buffer-overreads.patch
index 78fb061..51c305f 100644
--- a/debian/patches/post-0.8/0060-rpza-error-out-on-buffer-overreads.patch
+++ b/debian/patches/post-0.8/0060-rpza-error-out-on-buffer-overreads.patch
@@ -1,7 +1,7 @@
From 4493af756b8f8346b1e7671b487afc34c72bc16e Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 17:04:33 -0800
-Subject: [PATCH 60/80] rpza: error out on buffer overreads.
+Subject: [PATCH 60/83] rpza: error out on buffer overreads.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -35,5 +35,5 @@ index 7350ef2..59c3a7b 100644
for (pixel_y = 0; pixel_y < 4; pixel_y++) {
for (pixel_x = 0; pixel_x < 4; pixel_x++){
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0061-vmnc-return-error-on-decode_init-failure.patch b/debian/patches/post-0.8/0061-vmnc-return-error-on-decode_init-failure.patch
index b73d433..022c092 100644
--- a/debian/patches/post-0.8/0061-vmnc-return-error-on-decode_init-failure.patch
+++ b/debian/patches/post-0.8/0061-vmnc-return-error-on-decode_init-failure.patch
@@ -1,7 +1,7 @@
From 1dd1ee00d54ba2a9f5d8ae2e82a22891300b6807 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 19:00:48 -0800
-Subject: [PATCH 61/80] vmnc: return error on decode_init() failure.
+Subject: [PATCH 61/83] vmnc: return error on decode_init() failure.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -25,5 +25,5 @@ index a72c507..ca0ba82 100644
return 0;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0062-huffyuv-do-not-abort-on-unknown-pix_fmt-instead-retu.patch b/debian/patches/post-0.8/0062-huffyuv-do-not-abort-on-unknown-pix_fmt-instead-retu.patch
index a9bab2f..f92439e 100644
--- a/debian/patches/post-0.8/0062-huffyuv-do-not-abort-on-unknown-pix_fmt-instead-retu.patch
+++ b/debian/patches/post-0.8/0062-huffyuv-do-not-abort-on-unknown-pix_fmt-instead-retu.patch
@@ -1,7 +1,7 @@
From a63f3f714c014b3fcaffd45943bc089167b3fe61 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 1 Mar 2012 09:41:22 -0800
-Subject: [PATCH 62/80] huffyuv: do not abort on unknown pix_fmt; instead,
+Subject: [PATCH 62/83] huffyuv: do not abort on unknown pix_fmt; instead,
return an error.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -27,5 +27,5 @@ index efa87de..412fe4b 100644
alloc_temp(s);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0063-h264-error-out-on-invalid-bitdepth.patch b/debian/patches/post-0.8/0063-h264-error-out-on-invalid-bitdepth.patch
index 3a1845e..877c8ac 100644
--- a/debian/patches/post-0.8/0063-h264-error-out-on-invalid-bitdepth.patch
+++ b/debian/patches/post-0.8/0063-h264-error-out-on-invalid-bitdepth.patch
@@ -1,7 +1,7 @@
From 750f5baf3036d5a4c488a60d1cd6e872e4a871c4 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 1 Mar 2012 11:56:05 -0800
-Subject: [PATCH 63/80] h264: error out on invalid bitdepth.
+Subject: [PATCH 63/83] h264: error out on invalid bitdepth.
Fixes invalid reads while initializing the dequant tables, which uses
the bit depth to determine the QP table size.
@@ -65,5 +65,5 @@ index e92acbd..449c634 100644
h->mb_mbaff = 0;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0064-avutil-add-AVERROR_UNKNOWN.patch b/debian/patches/post-0.8/0064-avutil-add-AVERROR_UNKNOWN.patch
index cf87784..7d94c26 100644
--- a/debian/patches/post-0.8/0064-avutil-add-AVERROR_UNKNOWN.patch
+++ b/debian/patches/post-0.8/0064-avutil-add-AVERROR_UNKNOWN.patch
@@ -1,7 +1,7 @@
From 7f3f85544ca7804fde2210c129a4458536330dc6 Mon Sep 17 00:00:00 2001
From: Justin Ruggles <justin.ruggles at gmail.com>
Date: Fri, 24 Feb 2012 23:27:14 -0500
-Subject: [PATCH 64/80] avutil: add AVERROR_UNKNOWN
+Subject: [PATCH 64/83] avutil: add AVERROR_UNKNOWN
Useful to return instead of -1 when the cause of the error is unknown,
typically from an external library.
@@ -72,5 +72,5 @@ index 2db65cb..11bcc5c 100644
/**
* Put a description of the AVERROR code errnum in errbuf.
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0065-lcl-return-negative-error-codes-on-decode_init-error.patch b/debian/patches/post-0.8/0065-lcl-return-negative-error-codes-on-decode_init-error.patch
index 5e38a1d..978c3e4 100644
--- a/debian/patches/post-0.8/0065-lcl-return-negative-error-codes-on-decode_init-error.patch
+++ b/debian/patches/post-0.8/0065-lcl-return-negative-error-codes-on-decode_init-error.patch
@@ -1,7 +1,7 @@
From 7e88df99e1d26accc56b0da52d271a57995ecde7 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 29 Feb 2012 17:50:28 -0800
-Subject: [PATCH 65/80] lcl: return negative error codes on decode_init()
+Subject: [PATCH 65/83] lcl: return negative error codes on decode_init()
errors.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -80,5 +80,5 @@ index 5b18418..679824c 100644
}
#endif
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0066-rv10-20-Fix-a-buffer-overread-caused-by-losing-track.patch b/debian/patches/post-0.8/0066-rv10-20-Fix-a-buffer-overread-caused-by-losing-track.patch
index 2013850..e8a2df9 100644
--- a/debian/patches/post-0.8/0066-rv10-20-Fix-a-buffer-overread-caused-by-losing-track.patch
+++ b/debian/patches/post-0.8/0066-rv10-20-Fix-a-buffer-overread-caused-by-losing-track.patch
@@ -1,7 +1,7 @@
From 19da1a39e861968c27504b67d481d32339669e2a Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Thu, 1 Mar 2012 14:07:22 -0800
-Subject: [PATCH 66/80] rv10/20: Fix a buffer overread caused by losing track
+Subject: [PATCH 66/83] rv10/20: Fix a buffer overread caused by losing track
of the remaining buffer size.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -40,5 +40,5 @@ index ccc0944..d7d7ed2 100644
AVCodec ff_rv10_decoder = {
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0067-wmadec-Verify-bitstream-size-makes-sense-before-call.patch b/debian/patches/post-0.8/0067-wmadec-Verify-bitstream-size-makes-sense-before-call.patch
index 8bb0741..f9c4d47 100644
--- a/debian/patches/post-0.8/0067-wmadec-Verify-bitstream-size-makes-sense-before-call.patch
+++ b/debian/patches/post-0.8/0067-wmadec-Verify-bitstream-size-makes-sense-before-call.patch
@@ -1,7 +1,7 @@
From fecd7468fcbf9115afdd8bf3dc3d08da0975e4d8 Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Fri, 27 Jan 2012 14:24:07 -0800
-Subject: [PATCH 67/80] wmadec: Verify bitstream size makes sense before
+Subject: [PATCH 67/83] wmadec: Verify bitstream size makes sense before
calling init_get_bits.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -26,5 +26,5 @@ index afc0658..b9fc21f 100644
len = pos & 7;
if (len > 0)
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0068-wma-fix-invalid-buffer-size-assumptions-causing-rand.patch b/debian/patches/post-0.8/0068-wma-fix-invalid-buffer-size-assumptions-causing-rand.patch
index 225682e..ac61749 100644
--- a/debian/patches/post-0.8/0068-wma-fix-invalid-buffer-size-assumptions-causing-rand.patch
+++ b/debian/patches/post-0.8/0068-wma-fix-invalid-buffer-size-assumptions-causing-rand.patch
@@ -1,7 +1,7 @@
From b863979c0f36b565857c49cf6297810e22a9ba10 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 1 Mar 2012 16:19:51 -0800
-Subject: [PATCH 68/80] wma: fix invalid buffer size assumptions causing
+Subject: [PATCH 68/83] wma: fix invalid buffer size assumptions causing
random overreads.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -69,5 +69,5 @@ index b9fc21f..37feca1 100644
if (len > 0)
skip_bits(&s->gb, len);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0069-matroska-check-buffer-size-for-RM-style-byte-reorder.patch b/debian/patches/post-0.8/0069-matroska-check-buffer-size-for-RM-style-byte-reorder.patch
index 6a7bed7..ef88b58 100644
--- a/debian/patches/post-0.8/0069-matroska-check-buffer-size-for-RM-style-byte-reorder.patch
+++ b/debian/patches/post-0.8/0069-matroska-check-buffer-size-for-RM-style-byte-reorder.patch
@@ -1,7 +1,7 @@
From 9686a2c2cfdb103784bd9153042da4f9656b56c6 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 1 Mar 2012 17:01:22 -0800
-Subject: [PATCH 69/80] matroska: check buffer size for RM-style byte
+Subject: [PATCH 69/83] matroska: check buffer size for RM-style byte
reordering.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -53,5 +53,5 @@ index 1987b50..59e0e1f 100644
if (++track->audio.sub_packet_cnt >= h) {
if (st->codec->codec_id == CODEC_ID_SIPR)
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0070-amrwb-error-out-early-if-mode-is-invalid.patch b/debian/patches/post-0.8/0070-amrwb-error-out-early-if-mode-is-invalid.patch
index 7e20b1a..f302e12 100644
--- a/debian/patches/post-0.8/0070-amrwb-error-out-early-if-mode-is-invalid.patch
+++ b/debian/patches/post-0.8/0070-amrwb-error-out-early-if-mode-is-invalid.patch
@@ -1,7 +1,7 @@
From de2656ec2518cae65a2b2823470a3ebe15934ba9 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 1 Mar 2012 13:51:21 -0800
-Subject: [PATCH 70/80] amrwb: error out early if mode is invalid.
+Subject: [PATCH 70/83] amrwb: error out early if mode is invalid.
Prevents using the invalid mode as an index in a static array, which
would generate invalid reads.
@@ -52,5 +52,5 @@ index 6ea5d22..0ebaf47 100644
ff_amr_bit_reorder((uint16_t *) &ctx->frame, sizeof(AMRWBFrame),
buf + header_size, amr_bit_orderings_by_mode[ctx->fr_cur_mode]);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0071-amrwb-remove-duplicate-arguments-from-extrapolate_is.patch b/debian/patches/post-0.8/0071-amrwb-remove-duplicate-arguments-from-extrapolate_is.patch
index ebfe75c..99500b9 100644
--- a/debian/patches/post-0.8/0071-amrwb-remove-duplicate-arguments-from-extrapolate_is.patch
+++ b/debian/patches/post-0.8/0071-amrwb-remove-duplicate-arguments-from-extrapolate_is.patch
@@ -1,7 +1,7 @@
From 78d4f8cc56554e5d19c3f5688902278c3b795a04 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Thu, 1 Mar 2012 15:44:25 -0800
-Subject: [PATCH 71/80] amrwb: remove duplicate arguments from
+Subject: [PATCH 71/83] amrwb: remove duplicate arguments from
extrapolate_isf().
Prevents warnings because the dst and src overlap (are the same) in the
@@ -90,5 +90,5 @@ index 0ebaf47..b9ae9ec 100644
e_isf[LP_ORDER_16k - 1] *= 2.0;
ff_acelp_lsf2lspd(e_isp, e_isf, LP_ORDER_16k);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0072-mpegts-Pad-the-packet-buffer-in-handle_packet.patch b/debian/patches/post-0.8/0072-mpegts-Pad-the-packet-buffer-in-handle_packet.patch
index 56249d8..cb5d65a 100644
--- a/debian/patches/post-0.8/0072-mpegts-Pad-the-packet-buffer-in-handle_packet.patch
+++ b/debian/patches/post-0.8/0072-mpegts-Pad-the-packet-buffer-in-handle_packet.patch
@@ -1,7 +1,7 @@
From 3f7e90cf0c12d739c5b9cd548c1916f23d691185 Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Fri, 2 Mar 2012 10:13:07 -0800
-Subject: [PATCH 72/80] mpegts: Pad the packet buffer in handle_packet().
+Subject: [PATCH 72/83] mpegts: Pad the packet buffer in handle_packet().
This allows it to be used with get_bits without the thread of overreads.
@@ -36,5 +36,5 @@ index 15688a9..85e0952 100644
if (ts->stop_parse>0)
break;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0073-mpegts-Do-not-call-read_sl_header-when-no-bytes-rema.patch b/debian/patches/post-0.8/0073-mpegts-Do-not-call-read_sl_header-when-no-bytes-rema.patch
index 42ebed7..b05ded2 100644
--- a/debian/patches/post-0.8/0073-mpegts-Do-not-call-read_sl_header-when-no-bytes-rema.patch
+++ b/debian/patches/post-0.8/0073-mpegts-Do-not-call-read_sl_header-when-no-bytes-rema.patch
@@ -1,7 +1,7 @@
From b7c8fff80351249d448b93608bfac832c1ee3b4b Mon Sep 17 00:00:00 2001
From: Alex Converse <alex.converse at gmail.com>
Date: Fri, 2 Mar 2012 10:12:11 -0800
-Subject: [PATCH 73/80] mpegts: Do not call read_sl_header() when no bytes
+Subject: [PATCH 73/83] mpegts: Do not call read_sl_header() when no bytes
remain in the buffer.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -27,5 +27,5 @@ index 85e0952..cc36e65 100644
pes->pes_header_size += sl_header_bytes;
p += sl_header_bytes;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0074-wmaenc-require-a-large-enough-output-buffer-to-preve.patch b/debian/patches/post-0.8/0074-wmaenc-require-a-large-enough-output-buffer-to-preve.patch
index 679b1ae..3b99ca2 100644
--- a/debian/patches/post-0.8/0074-wmaenc-require-a-large-enough-output-buffer-to-preve.patch
+++ b/debian/patches/post-0.8/0074-wmaenc-require-a-large-enough-output-buffer-to-preve.patch
@@ -1,7 +1,7 @@
From 2e341bc99af72f1ae7c9812985635cbfeeb50269 Mon Sep 17 00:00:00 2001
From: Justin Ruggles <justin.ruggles at gmail.com>
Date: Fri, 2 Mar 2012 16:33:33 -0500
-Subject: [PATCH 74/80] wmaenc: require a large enough output buffer to
+Subject: [PATCH 74/83] wmaenc: require a large enough output buffer to
prevent overwrites
The maximum theoretical frame size is around 17000 bytes. Although in
@@ -33,5 +33,5 @@ index c762a72..a9053bb 100644
total_gain= 128;
for(i=64; i; i>>=1){
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0075-wmaenc-limit-block_align-to-MAX_CODED_SUPERFRAME_SIZ.patch b/debian/patches/post-0.8/0075-wmaenc-limit-block_align-to-MAX_CODED_SUPERFRAME_SIZ.patch
index 98c0091..8e68f2e 100644
--- a/debian/patches/post-0.8/0075-wmaenc-limit-block_align-to-MAX_CODED_SUPERFRAME_SIZ.patch
+++ b/debian/patches/post-0.8/0075-wmaenc-limit-block_align-to-MAX_CODED_SUPERFRAME_SIZ.patch
@@ -1,7 +1,7 @@
From 073891e8758d5b4ed9034b340fa24c687792e8f6 Mon Sep 17 00:00:00 2001
From: Justin Ruggles <justin.ruggles at gmail.com>
Date: Fri, 2 Mar 2012 16:10:00 -0500
-Subject: [PATCH 75/80] wmaenc: limit block_align to MAX_CODED_SUPERFRAME_SIZE
+Subject: [PATCH 75/83] wmaenc: limit block_align to MAX_CODED_SUPERFRAME_SIZE
This is near the theoretical limit for wma frame size and is the most that
our decoder can handle. Allowing higher bit rates will just end up padding
@@ -37,5 +37,5 @@ index a9053bb..bc17f5b 100644
avctx->frame_size= s->frame_len;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0076-wmaenc-limit-allowed-sample-rate-to-48kHz.patch b/debian/patches/post-0.8/0076-wmaenc-limit-allowed-sample-rate-to-48kHz.patch
index 6e612d6..b54c4ab 100644
--- a/debian/patches/post-0.8/0076-wmaenc-limit-allowed-sample-rate-to-48kHz.patch
+++ b/debian/patches/post-0.8/0076-wmaenc-limit-allowed-sample-rate-to-48kHz.patch
@@ -1,7 +1,7 @@
From 6a073aa7a734d4fbad77071e9f8ee0fe75a17fae Mon Sep 17 00:00:00 2001
From: Justin Ruggles <justin.ruggles at gmail.com>
Date: Fri, 2 Mar 2012 16:27:57 -0500
-Subject: [PATCH 76/80] wmaenc: limit allowed sample rate to 48kHz
+Subject: [PATCH 76/83] wmaenc: limit allowed sample rate to 48kHz
ff_wma_init() allows up to 50kHz, but this generates an exponent band
size table that requires 65 bands. The code assumes 25 bands in many
@@ -34,5 +34,5 @@ index bc17f5b..5135b98 100644
av_log(avctx, AV_LOG_ERROR, "bitrate too low: got %i, need 24000 or higher\n",
avctx->bit_rate);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0077-wmaenc-fix-m-s-stereo-encoding-for-the-first-frame.patch b/debian/patches/post-0.8/0077-wmaenc-fix-m-s-stereo-encoding-for-the-first-frame.patch
index eb3a6bd..e11c7a4 100644
--- a/debian/patches/post-0.8/0077-wmaenc-fix-m-s-stereo-encoding-for-the-first-frame.patch
+++ b/debian/patches/post-0.8/0077-wmaenc-fix-m-s-stereo-encoding-for-the-first-frame.patch
@@ -1,7 +1,7 @@
From 1128b10247739900174991b4e013429a1b8ceaa4 Mon Sep 17 00:00:00 2001
From: Justin Ruggles <justin.ruggles at gmail.com>
Date: Fri, 2 Mar 2012 17:11:25 -0500
-Subject: [PATCH 77/80] wmaenc: fix m/s stereo encoding for the first frame
+Subject: [PATCH 77/83] wmaenc: fix m/s stereo encoding for the first frame
We need to set ms_stereo in encode_init() in order to avoid incorrectly
encoding the first frame as non-m/s while flagging it as m/s. Fixes an
@@ -64,5 +64,5 @@ index 622b6fc..43b19b7 100644
+stddev:12246.35 PSNR: 14.57 MAXDIFF:65521 bytes: 1064960/ 1058400
+stddev: 2068.08 PSNR: 30.02 MAXDIFF:27650 bytes: 1056768/ 1058400
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0078-h264-prevent-overreads-in-intra-PCM-decoding.patch b/debian/patches/post-0.8/0078-h264-prevent-overreads-in-intra-PCM-decoding.patch
index 52f1009..dc1d67f 100644
--- a/debian/patches/post-0.8/0078-h264-prevent-overreads-in-intra-PCM-decoding.patch
+++ b/debian/patches/post-0.8/0078-h264-prevent-overreads-in-intra-PCM-decoding.patch
@@ -1,7 +1,7 @@
From cd17195d1c0e0f7385946506a5ad2510cf44471b Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Tue, 28 Feb 2012 18:48:27 -0800
-Subject: [PATCH 78/80] h264: prevent overreads in intra PCM decoding.
+Subject: [PATCH 78/83] h264: prevent overreads in intra PCM decoding.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -26,5 +26,5 @@ index 75fb02c..2ee4bc0 100644
ff_init_cabac_decoder(&h->cabac, ptr, h->cabac.bytestream_end - ptr);
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0079-amrnbdec-check-frame-size-before-decoding.patch b/debian/patches/post-0.8/0079-amrnbdec-check-frame-size-before-decoding.patch
index bf2bc87..9630017 100644
--- a/debian/patches/post-0.8/0079-amrnbdec-check-frame-size-before-decoding.patch
+++ b/debian/patches/post-0.8/0079-amrnbdec-check-frame-size-before-decoding.patch
@@ -1,7 +1,7 @@
From 11f3173e1bae135eb18a10b0060a5dd4b9fdcc74 Mon Sep 17 00:00:00 2001
From: Vitor Sessak <vitor1001 at gmail.com>
Date: Wed, 29 Feb 2012 22:09:10 +0100
-Subject: [PATCH 79/80] amrnbdec: check frame size before decoding.
+Subject: [PATCH 79/83] amrnbdec: check frame size before decoding.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
CC: libav-stable at libav.org
@@ -40,5 +40,5 @@ index fff0e72..a7d0b4e 100644
av_log_missing_feature(avctx, "dtx mode", 1);
return -1;
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0080-cscd-use-negative-error-values-to-indicate-decode_in.patch b/debian/patches/post-0.8/0080-cscd-use-negative-error-values-to-indicate-decode_in.patch
index 24d6840..026351a 100644
--- a/debian/patches/post-0.8/0080-cscd-use-negative-error-values-to-indicate-decode_in.patch
+++ b/debian/patches/post-0.8/0080-cscd-use-negative-error-values-to-indicate-decode_in.patch
@@ -1,7 +1,7 @@
From b5331b979bfb31ec1715618b2712429764b6a9b5 Mon Sep 17 00:00:00 2001
From: "Ronald S. Bultje" <rsbultje at gmail.com>
Date: Wed, 29 Feb 2012 13:55:09 -0800
-Subject: [PATCH 80/80] cscd: use negative error values to indicate
+Subject: [PATCH 80/83] cscd: use negative error values to indicate
decode_init() failures.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
@@ -36,5 +36,5 @@ index 00921bc..1edab91 100644
return 0;
}
--
-1.7.5.4
+1.7.9
diff --git a/debian/patches/post-0.8/0081-h264-change-underread-for-10bit-QPEL-to-overread.patch b/debian/patches/post-0.8/0081-h264-change-underread-for-10bit-QPEL-to-overread.patch
new file mode 100644
index 0000000..d117aab
--- /dev/null
+++ b/debian/patches/post-0.8/0081-h264-change-underread-for-10bit-QPEL-to-overread.patch
@@ -0,0 +1,30 @@
+From 5186984ee9cf65946ed8bcf4b480f81c4310a8ce Mon Sep 17 00:00:00 2001
+From: "Ronald S. Bultje" <rsbultje at gmail.com>
+Date: Sat, 25 Feb 2012 17:24:56 -0800
+Subject: [PATCH 81/83] h264: change underread for 10bit QPEL to overread.
+
+This prevents us from reading before the start of the buffer, and thus
+prevents crashes resulting from this behaviour. Fixes bug 237.
+(cherry picked from commit 291c9b62855d555ac5385e23219461b6080da7db)
+
+Signed-off-by: Reinhard Tartler <siretart at tauware.de>
+---
+ libavcodec/x86/h264_qpel_10bit.asm | 2 +-
+ 1 files changed, 1 insertions(+), 1 deletions(-)
+
+diff --git a/libavcodec/x86/h264_qpel_10bit.asm b/libavcodec/x86/h264_qpel_10bit.asm
+index 15dd72c..cafd4da 100644
+--- a/libavcodec/x86/h264_qpel_10bit.asm
++++ b/libavcodec/x86/h264_qpel_10bit.asm
+@@ -619,7 +619,7 @@ MC MC33
+ %define PAD 12
+ %define COUNT 2
+ %else
+-%define PAD 0
++%define PAD 4
+ %define COUNT 3
+ %endif
+ put_hv%2_10_%1:
+--
+1.7.9
+
diff --git a/debian/patches/post-0.8/0082-h264-fix-mmxext-chroma-deblock-to-use-correct-TC-val.patch b/debian/patches/post-0.8/0082-h264-fix-mmxext-chroma-deblock-to-use-correct-TC-val.patch
new file mode 100644
index 0000000..cba1496
--- /dev/null
+++ b/debian/patches/post-0.8/0082-h264-fix-mmxext-chroma-deblock-to-use-correct-TC-val.patch
@@ -0,0 +1,28 @@
+From 85eb76a23fbba2d26e3742e8163d3994b2972b4b Mon Sep 17 00:00:00 2001
+From: "Ronald S. Bultje" <rsbultje at gmail.com>
+Date: Sun, 26 Feb 2012 08:57:14 -0800
+Subject: [PATCH 82/83] h264: fix mmxext chroma deblock to use correct TC
+ values. (cherry picked from commit
+ b0c4f04338234ee011d7b704621347ef232294fe)
+
+Signed-off-by: Reinhard Tartler <siretart at tauware.de>
+---
+ libavcodec/x86/h264_deblock_10bit.asm | 2 +-
+ 1 files changed, 1 insertions(+), 1 deletions(-)
+
+diff --git a/libavcodec/x86/h264_deblock_10bit.asm b/libavcodec/x86/h264_deblock_10bit.asm
+index baac725..6744661 100644
+--- a/libavcodec/x86/h264_deblock_10bit.asm
++++ b/libavcodec/x86/h264_deblock_10bit.asm
+@@ -870,7 +870,7 @@ cglobal deblock_v_chroma_10_%1, 5,7-(mmsize/16),8*(mmsize/16)
+ %if mmsize < 16
+ add r0, mmsize
+ add r5, mmsize
+- add r4, mmsize/8
++ add r4, mmsize/4
+ dec r6
+ jg .loop
+ REP_RET
+--
+1.7.9
+
diff --git a/debian/patches/post-0.8/0083-Fix-format-string-vulnerability-detected-by-Wformat-.patch b/debian/patches/post-0.8/0083-Fix-format-string-vulnerability-detected-by-Wformat-.patch
new file mode 100644
index 0000000..7adc6b5
--- /dev/null
+++ b/debian/patches/post-0.8/0083-Fix-format-string-vulnerability-detected-by-Wformat-.patch
@@ -0,0 +1,39 @@
+From 003f7e3dd0debfaa28622bd81e77f9217043ee28 Mon Sep 17 00:00:00 2001
+From: Fabian Greffrath <fabian at greffrath.com>
+Date: Mon, 5 Mar 2012 16:06:01 +0100
+Subject: [PATCH 83/83] Fix format string vulnerability detected by
+ -Wformat-security.
+
+Signed-off-by: Diego Biurrun <diego at biurrun.de>
+(cherry picked from commit c9dbac36ad4bac07f6c1d06d465e361ab55bcb95)
+
+Signed-off-by: Reinhard Tartler <siretart at tauware.de>
+---
+ libavcodec/srtdec.c | 4 ++--
+ 1 files changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/libavcodec/srtdec.c b/libavcodec/srtdec.c
+index 677c550..99cbd94 100644
+--- a/libavcodec/srtdec.c
++++ b/libavcodec/srtdec.c
+@@ -110,7 +110,7 @@ static const char *srt_to_ass(AVCodecContext *avctx, char *out, char *out_end,
+ for (j=sptr-2; j>=0; j--)
+ if (stack[j].param[i][0]) {
+ out += snprintf(out, out_end-out,
+- stack[j].param[i]);
++ "%s", stack[j].param[i]);
+ break;
+ }
+ } else {
+@@ -146,7 +146,7 @@ static const char *srt_to_ass(AVCodecContext *avctx, char *out, char *out_end,
+ for (i=0; i<PARAM_NUMBER; i++)
+ if (stack[sptr].param[i][0])
+ out += snprintf(out, out_end-out,
+- stack[sptr].param[i]);
++ "%s", stack[sptr].param[i]);
+ }
+ } else if (!buffer[1] && strspn(buffer, "bisu") == 1) {
+ out += snprintf(out, out_end-out,
+--
+1.7.9
+
diff --git a/debian/patches/series b/debian/patches/series
index a87cc6a..7cc079d 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -82,3 +82,6 @@ post-0.8/0077-wmaenc-fix-m-s-stereo-encoding-for-the-first-frame.patch
post-0.8/0078-h264-prevent-overreads-in-intra-PCM-decoding.patch
post-0.8/0079-amrnbdec-check-frame-size-before-decoding.patch
post-0.8/0080-cscd-use-negative-error-values-to-indicate-decode_in.patch
+post-0.8/0081-h264-change-underread-for-10bit-QPEL-to-overread.patch
+post-0.8/0082-h264-fix-mmxext-chroma-deblock-to-use-correct-TC-val.patch
+post-0.8/0083-Fix-format-string-vulnerability-detected-by-Wformat-.patch
--
Libav/FFmpeg packaging
More information about the pkg-multimedia-commits
mailing list