<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openjpeg/src/bin, branch v2.3.1</title>
<subtitle>Fork of openjpeg library for JPEG2000 encoding and decoding</subtitle>
<id>https://git.carlh.net/cgit/openjpeg/atom?h=v2.3.1</id>
<link rel='self' href='https://git.carlh.net/cgit/openjpeg/atom?h=v2.3.1'/>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/'/>
<updated>2019-03-29T09:44:35Z</updated>
<entry>
<title>Revert "[JPWL] tgatoimage(): avoid excessive memory allocation attempt,"</title>
<updated>2019-03-29T09:44:35Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2019-03-29T09:44:35Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=25b815dc460dbf9def7e6b822c8998727094f85a'/>
<id>urn:sha1:25b815dc460dbf9def7e6b822c8998727094f85a</id>
<content type='text'>
This reverts commit 05be3084460e46282ee63f04c72c451f3271fd28.

This commit doesn't compile due to missing OPJ_UINT64 type
</content>
</entry>
<entry>
<title>convertbmp: detect invalid file dimensions early</title>
<updated>2018-12-14T04:10:35Z</updated>
<author>
<name>Hugo Lefeuvre</name>
<email>hle@debian.org</email>
</author>
<published>2018-12-14T03:58:40Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=8ee335227bbcaf1614124046aa25e53d67b11ec3'/>
<id>urn:sha1:8ee335227bbcaf1614124046aa25e53d67b11ec3</id>
<content type='text'>
width/length dimensions read from bmp headers are not necessarily
valid. For instance they may have been maliciously set to very large
values with the intention to cause DoS (large memory allocation, stack
overflow). In these cases we want to detect the invalid size as early
as possible.

This commit introduces a counter which verifies that the number of
written bytes corresponds to the advertized width/length.

Fixes #1059 (CVE-2018-6616).
</content>
</entry>
<entry>
<title>Merge pull request #1168 from Young-X/fix_dev</title>
<updated>2018-12-07T20:27:38Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@mines-paris.org</email>
</author>
<published>2018-12-07T20:27:38Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=e7640f58f122d1228f3d750864543ad4703e18fc'/>
<id>urn:sha1:e7640f58f122d1228f3d750864543ad4703e18fc</id>
<content type='text'>
Fix multiple potential vulnerabilities and bugs</content>
</entry>
<entry>
<title>[JPWL] tgatoimage(): avoid excessive memory allocation attempt,</title>
<updated>2018-11-28T06:44:06Z</updated>
<author>
<name>Young Xiao</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-28T06:44:06Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=05be3084460e46282ee63f04c72c451f3271fd28'/>
<id>urn:sha1:05be3084460e46282ee63f04c72c451f3271fd28</id>
<content type='text'>
and fixes unaligned load

Signed-off-by: Young Xiao &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title> [JPWL] opj_compress: reorder checks related to code block dimensions to avoid potential int overflow</title>
<updated>2018-11-28T06:39:14Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T09:12:06Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=ce9583d1d7627e007a34a31ae4e22a00d78bd153'/>
<id>urn:sha1:ce9583d1d7627e007a34a31ae4e22a00d78bd153</id>
<content type='text'>
Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title>color_apply_icc_profile: avoid potential heap buffer overflow</title>
<updated>2018-11-27T22:31:30Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2018-11-27T22:31:30Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=2e5ab1d9987831c981ff05862e8ccf1381ed58ea'/>
<id>urn:sha1:2e5ab1d9987831c981ff05862e8ccf1381ed58ea</id>
<content type='text'>
Derived from a patch by Thuan Pham
</content>
</entry>
<entry>
<title>[JPWL] imagetotga(): fix read heap buffer overflow if numcomps &lt; 3 (#987)</title>
<updated>2018-11-23T09:08:57Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T07:58:23Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=46822d0eddc3324b2a056bc60ffa997027bebd66'/>
<id>urn:sha1:46822d0eddc3324b2a056bc60ffa997027bebd66</id>
<content type='text'>
Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title>[JPWL] fix CVE-2018-16375</title>
<updated>2018-11-23T09:08:56Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T07:02:26Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=619e1b086eaa21ebd9b23eb67deee543b07bf06f'/>
<id>urn:sha1:619e1b086eaa21ebd9b23eb67deee543b07bf06f</id>
<content type='text'>
Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title>Merge pull request #1160 from hlef/master</title>
<updated>2018-11-16T08:42:19Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@mines-paris.org</email>
</author>
<published>2018-11-16T08:42:19Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=92023cd6c377e0384a7725949b25655d4d94dced'/>
<id>urn:sha1:92023cd6c377e0384a7725949b25655d4d94dced</id>
<content type='text'>
jp3d/jpwl convert: fix write stack buffer overflow</content>
</entry>
<entry>
<title>jp2: convert: fix null pointer dereference</title>
<updated>2018-11-07T17:53:18Z</updated>
<author>
<name>Hugo Lefeuvre</name>
<email>hle@debian.org</email>
</author>
<published>2018-11-07T17:48:29Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=cab352e249ed3372dd9355c85e837613fff98fa2'/>
<id>urn:sha1:cab352e249ed3372dd9355c85e837613fff98fa2</id>
<content type='text'>
Tile components in a JP2 image might have null data pointer by defining a
zero component size (for example using large horizontal or vertical
sampling periods). This null data pointer leads to null image component
data pointer, causing crash when dereferenced without != null check in
imagetopnm.

Add != null check.

This commit addresses #1152 (CVE-2018-18088).
</content>
</entry>
</feed>
