<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openjpeg/src/bin/jp2, branch v2.3.1</title>
<subtitle>Fork of openjpeg library for JPEG2000 encoding and decoding</subtitle>
<id>https://git.carlh.net/cgit/openjpeg/atom?h=v2.3.1</id>
<link rel='self' href='https://git.carlh.net/cgit/openjpeg/atom?h=v2.3.1'/>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/'/>
<updated>2018-12-14T04:10:35Z</updated>
<entry>
<title>convertbmp: detect invalid file dimensions early</title>
<updated>2018-12-14T04:10:35Z</updated>
<author>
<name>Hugo Lefeuvre</name>
<email>hle@debian.org</email>
</author>
<published>2018-12-14T03:58:40Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=8ee335227bbcaf1614124046aa25e53d67b11ec3'/>
<id>urn:sha1:8ee335227bbcaf1614124046aa25e53d67b11ec3</id>
<content type='text'>
width/length dimensions read from bmp headers are not necessarily
valid. For instance they may have been maliciously set to very large
values with the intention to cause DoS (large memory allocation, stack
overflow). In these cases we want to detect the invalid size as early
as possible.

This commit introduces a counter which verifies that the number of
written bytes corresponds to the advertized width/length.

Fixes #1059 (CVE-2018-6616).
</content>
</entry>
<entry>
<title>Merge pull request #1160 from hlef/master</title>
<updated>2018-11-16T08:42:19Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@mines-paris.org</email>
</author>
<published>2018-11-16T08:42:19Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=92023cd6c377e0384a7725949b25655d4d94dced'/>
<id>urn:sha1:92023cd6c377e0384a7725949b25655d4d94dced</id>
<content type='text'>
jp3d/jpwl convert: fix write stack buffer overflow</content>
</entry>
<entry>
<title>jp2: convert: fix null pointer dereference</title>
<updated>2018-11-07T17:53:18Z</updated>
<author>
<name>Hugo Lefeuvre</name>
<email>hle@debian.org</email>
</author>
<published>2018-11-07T17:48:29Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=cab352e249ed3372dd9355c85e837613fff98fa2'/>
<id>urn:sha1:cab352e249ed3372dd9355c85e837613fff98fa2</id>
<content type='text'>
Tile components in a JP2 image might have null data pointer by defining a
zero component size (for example using large horizontal or vertical
sampling periods). This null data pointer leads to null image component
data pointer, causing crash when dereferenced without != null check in
imagetopnm.

Add != null check.

This commit addresses #1152 (CVE-2018-18088).
</content>
</entry>
<entry>
<title>Fix some potential overflow issues (#1161)</title>
<updated>2018-10-31T19:44:30Z</updated>
<author>
<name>Stefan Weil</name>
<email>sw@weilnetz.de</email>
</author>
<published>2018-10-31T19:44:30Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=948332e6ed17565100d1df5f6fdbf66865218e36'/>
<id>urn:sha1:948332e6ed17565100d1df5f6fdbf66865218e36</id>
<content type='text'>
* Fix some potential overflow issues

Put sizeof to the beginning of the multiplication to enforce that
size_t instead of smaller integer types is used for the calculation.

This fixes warnings from LGTM:

    Multiplication result may overflow 'unsigned int'
    before it is converted to 'unsigned long'.

It also allows removing some type casts.

Signed-off-by: Stefan Weil &lt;sw@weilnetz.de&gt;

* Fix code indentation

Signed-off-by: Stefan Weil &lt;sw@weilnetz.de&gt;
</content>
</entry>
<entry>
<title>Fix several memory and resource leaks</title>
<updated>2018-10-31T15:16:22Z</updated>
<author>
<name>Nikola Forró</name>
<email>nforro@redhat.com</email>
</author>
<published>2018-10-31T12:39:05Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=943db0f1c28ca6a7df6d18483f97166a03be9bf7'/>
<id>urn:sha1:943db0f1c28ca6a7df6d18483f97166a03be9bf7</id>
<content type='text'>
Signed-off-by: Nikola Forró &lt;nforro@redhat.com&gt;
</content>
</entry>
<entry>
<title>Merge pull request #1148 from hlef/master</title>
<updated>2018-09-22T21:54:12Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@mines-paris.org</email>
</author>
<published>2018-09-22T21:54:12Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=0e6a5553cfef21b764d289585af2c6934a95456b'/>
<id>urn:sha1:0e6a5553cfef21b764d289585af2c6934a95456b</id>
<content type='text'>
CVE-2018-5785: fix issues with zero bitmasks</content>
</entry>
<entry>
<title>Merge pull request #1128 from stweil/typos</title>
<updated>2018-09-22T20:55:33Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@mines-paris.org</email>
</author>
<published>2018-09-22T20:55:33Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=17bbb0e23ff03bb722914841a9b962b21fe7a310'/>
<id>urn:sha1:17bbb0e23ff03bb722914841a9b962b21fe7a310</id>
<content type='text'>
Fix some typos in code comments and documentation</content>
</entry>
<entry>
<title>convertbmp: fix issues with zero bitmasks</title>
<updated>2018-09-22T18:51:50Z</updated>
<author>
<name>Hugo Lefeuvre</name>
<email>hle@debian.org</email>
</author>
<published>2018-09-22T18:33:19Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=ca16fe55014c57090dd97369256c7657aeb25975'/>
<id>urn:sha1:ca16fe55014c57090dd97369256c7657aeb25975</id>
<content type='text'>
In the case where a BMP file declares compression 3 (BI_BITFIELDS)
with header size &lt;= 56, all bitmask values keep their initialization
value 0. This may lead to various undefined behavior later e.g. when
doing 1 &lt;&lt; (l_comp-&gt;prec - 1).

This issue does not affect files with bit count 16 because of a check
added in 16240e2 which sets default values to the color masks if they
are all 0.

This commit adds similar checks for the 32 bit case.

Also, if a BMP file declares compression 3 with header size &gt;= 56 and
intentional 0 bitmasks, the same issue will be triggered in both the
16 and 32 bit count case.

This commit adds checks to bmp_read_info_header() rejecting BMP files
with "intentional" 0 bitmasks. These checks might be removed in the
future when proper handling of zero bitmasks will be available in
openjpeg2.

fixes #1057 (CVE-2018-5785)
</content>
</entry>
<entry>
<title>Fix some typos in code comments and documentation</title>
<updated>2018-09-05T18:01:10Z</updated>
<author>
<name>Stefan Weil</name>
<email>sw@weilnetz.de</email>
</author>
<published>2018-07-30T19:04:28Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=3d6ffaf3f3463b62830f88f50a8c1b510f555eb5'/>
<id>urn:sha1:3d6ffaf3f3463b62830f88f50a8c1b510f555eb5</id>
<content type='text'>
All typos were found by Codespell.

Signed-off-by: Stefan Weil &lt;sw@weilnetz.de&gt;
</content>
</entry>
<entry>
<title>Changes in pnmtoimage if image data are missing</title>
<updated>2018-08-31T14:24:41Z</updated>
<author>
<name>szukw000</name>
<email>szukw000@arcor.de</email>
</author>
<published>2018-08-31T14:24:41Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=98363e244e027c731f73ee8239d3c19451a9153b'/>
<id>urn:sha1:98363e244e027c731f73ee8239d3c19451a9153b</id>
<content type='text'>
</content>
</entry>
</feed>
