<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openjpeg/src/bin/common, branch v2.5.2</title>
<subtitle>Fork of openjpeg library for JPEG2000 encoding and decoding</subtitle>
<id>https://git.carlh.net/cgit/openjpeg/atom?h=v2.5.2</id>
<link rel='self' href='https://git.carlh.net/cgit/openjpeg/atom?h=v2.5.2'/>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/'/>
<updated>2024-02-18T16:02:25Z</updated>
<entry>
<title>opj_decompress: fix off-by-one read heap-buffer-overflow in sycc420_to_rgb() when x0 and y0 are odd (CVE-2021-3575, fixes #1347)</title>
<updated>2024-02-18T16:02:25Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2024-02-18T16:02:25Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=7bd884f8750892de4f50bf4642fcfbe7011c6bdf'/>
<id>urn:sha1:7bd884f8750892de4f50bf4642fcfbe7011c6bdf</id>
<content type='text'>
</content>
</entry>
<entry>
<title>color_apply_icc_profile: add checks on the number of components (#1236)</title>
<updated>2020-04-16T22:37:33Z</updated>
<author>
<name>szukw000</name>
<email>szukw000@arcor.de</email>
</author>
<published>2020-04-16T22:37:33Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=b6b7e96b0cf7819ef6a2e8ba2f8bdaaf938326ed'/>
<id>urn:sha1:b6b7e96b0cf7819ef6a2e8ba2f8bdaaf938326ed</id>
<content type='text'>
</content>
</entry>
<entry>
<title>color_apply_icc_profile: avoid potential heap buffer overflow</title>
<updated>2018-11-27T22:31:30Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2018-11-27T22:31:30Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=2e5ab1d9987831c981ff05862e8ccf1381ed58ea'/>
<id>urn:sha1:2e5ab1d9987831c981ff05862e8ccf1381ed58ea</id>
<content type='text'>
Derived from a patch by Thuan Pham
</content>
</entry>
<entry>
<title>opj_getopt.c: avoid crash on invalid input (#301)</title>
<updated>2017-09-02T22:30:36Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-09-02T22:30:36Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=3a382d312306f45853b3ad78b770754d4bc7e440'/>
<id>urn:sha1:3a382d312306f45853b3ad78b770754d4bc7e440</id>
<content type='text'>
</content>
</entry>
<entry>
<title>opj_getopt_long(): avoid infinite loop on invalid or missing value for an option (#736)</title>
<updated>2017-08-17T12:52:10Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-08-17T12:52:10Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=9f7d79fd30df3712e6bfc6d475bfa143c069c4df'/>
<id>urn:sha1:9f7d79fd30df3712e6bfc6d475bfa143c069c4df</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #975 from szukw000/changes-for-afl-tests</title>
<updated>2017-08-08T23:51:54Z</updated>
<author>
<name>Antonin Descampe</name>
<email>antonin@descampe.net</email>
</author>
<published>2017-08-08T23:51:54Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=0394f8d0f1c981e0bc587beddc14d1fb0b265b1b'/>
<id>urn:sha1:0394f8d0f1c981e0bc587beddc14d1fb0b265b1b</id>
<content type='text'>
Catch images broken by AFL</content>
</entry>
<entry>
<title>Complementary fix to previous commit</title>
<updated>2017-08-07T16:32:52Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-07-06T00:02:25Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=0c1fc0593ef5b918068709fd74d76e4824c90e7c'/>
<id>urn:sha1:0c1fc0593ef5b918068709fd74d76e4824c90e7c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add opj_image_data_alloc() / opj_image_data_free()</title>
<updated>2017-08-07T16:32:52Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-07-05T23:47:40Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=f58aab9d6a57e48bdc60e15dd373c24de74719a9'/>
<id>urn:sha1:f58aab9d6a57e48bdc60e15dd373c24de74719a9</id>
<content type='text'>
As bin/common/color.c used to directly call malloc()/free(), we need
to export functions dedicated to allocating/freeing image component data.
</content>
</entry>
<entry>
<title>Catch images broken by AFL</title>
<updated>2017-07-31T11:58:08Z</updated>
<author>
<name>szukw000</name>
<email>szukw000@arcor.de</email>
</author>
<published>2017-07-31T11:58:08Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=00f45684a8339e69ed55df2397f3c19d09fecaed'/>
<id>urn:sha1:00f45684a8339e69ed55df2397f3c19d09fecaed</id>
<content type='text'>
</content>
</entry>
<entry>
<title>color_cielab_to_rgb(): reject images with components of different dimensions to void read heap buffer overflow (#909)</title>
<updated>2017-07-29T15:56:12Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2017-07-29T15:56:12Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=5a3e7aaf339943bc988adbada39a1fc8f5046899'/>
<id>urn:sha1:5a3e7aaf339943bc988adbada39a1fc8f5046899</id>
<content type='text'>
</content>
</entry>
</feed>
