+commit 8715ce2749d1e5a1e9c77646e9a2ddf0ec82bac9
+Author: Stefan Weil <sw@weilnetz.de>
+Date: 2016-09-21 21:15:25 +0200
+
+ Fix some issues reported by Coverity Scan (#846)
+
+ * test_tile_decoder: Fix potential buffer overflow (coverity)
+
+ CID 1190155 (#1 of 1): Unbounded source buffer (STRING_SIZE)
+
+ Using a pointer instead of buffer of fixed size avoids the limit
+ for the length of the input file name.
+
+ Signed-off-by: Stefan Weil <sw@weilnetz.de>
+
+ * test_tile_encoder: Fix potential buffer overflow (coverity)
+
+ CID 1190154 (#1 of 1): Unbounded source buffer (STRING_SIZE)
+
+ Using a pointer instead of buffer of fixed size avoids the limit
+ for the length of the output file name. This implies that the length
+ can exceed 255, so the data type for variable len had to be fixed, too.
+
+ Signed-off-by: Stefan Weil <sw@weilnetz.de>
+
+ * openjpip: Initialize data before returning it
+
+ This fixes an error reported by Coverity:
+
+ CID 1190143 (#1 of 1): Uninitialized scalar variable (UNINIT)
+
+ Signed-off-by: Stefan Weil <sw@weilnetz.de>
+
+commit 045aa4d9f297b8d3d5f89e9983a54252d103a3da
+Author: Stefan Weil <sw@weilnetz.de>
+Date: 2016-09-21 13:17:09 +0200
+
+ Fix potential out-of-bounds read (coverity) (#844)
+
+ * query_parser: Fix potential out-of-bounds read (coverity)
+
+ CID 1190207 (#1 of 1): Out-of-bounds read (OVERRUN)
+
+ Variable i must be checked before testing query_param.box_type.
+
+ Signed-off-by: Stefan Weil <sw@weilnetz.de>
+
+ * jpip_parser: Fix potential out-of-bounds read (coverity)
+
+ CID 1190206 (#1 of 1): Out-of-bounds read (OVERRUN)
+
+ Variable i must be checked before testing query_param.box_type.
+
+ Signed-off-by: Stefan Weil <sw@weilnetz.de>
+
+commit da940424816e11d624362ce080bc026adffa26e8
+Merge: 31d44f0 893143c