<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openjpeg/src, branch v2.3.1</title>
<subtitle>Fork of openjpeg library for JPEG2000 encoding and decoding</subtitle>
<id>https://git.carlh.net/cgit/openjpeg/atom?h=v2.3.1</id>
<link rel='self' href='https://git.carlh.net/cgit/openjpeg/atom?h=v2.3.1'/>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/'/>
<updated>2019-03-29T10:17:39Z</updated>
<entry>
<title>opj_t1_encode_cblks: fix UBSAN signed integer overflow</title>
<updated>2019-03-29T10:17:39Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2019-03-29T10:17:39Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=a1d32a596a94280178c44a55d7e7f1acd992ed5d'/>
<id>urn:sha1:a1d32a596a94280178c44a55d7e7f1acd992ed5d</id>
<content type='text'>
Fixes #1053 / CVE-2018-5727

Note: I don't consider this issue to be a security vulnerability, in
practice.
At least with gcc or clang compilers on x86_64 which generate the same
assembly code with or without that fix.
</content>
</entry>
<entry>
<title>Revert "[JPWL] tgatoimage(): avoid excessive memory allocation attempt,"</title>
<updated>2019-03-29T09:44:35Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2019-03-29T09:44:35Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=25b815dc460dbf9def7e6b822c8998727094f85a'/>
<id>urn:sha1:25b815dc460dbf9def7e6b822c8998727094f85a</id>
<content type='text'>
This reverts commit 05be3084460e46282ee63f04c72c451f3271fd28.

This commit doesn't compile due to missing OPJ_UINT64 type
</content>
</entry>
<entry>
<title>Revert "[MJ2] Avoid index out of bounds access to pi-&gt;include[]"</title>
<updated>2019-03-29T09:40:58Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2019-03-29T09:40:58Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=e1740e7ce79d0a1676db4da0f4189b64e85f52cb'/>
<id>urn:sha1:e1740e7ce79d0a1676db4da0f4189b64e85f52cb</id>
<content type='text'>
This reverts commit c277159986c80142180fbe5efb256bbf3bdf3edc.

The commit didn't compile. include_size is not defined in openmj2
</content>
</entry>
<entry>
<title>convertbmp: detect invalid file dimensions early</title>
<updated>2018-12-14T04:10:35Z</updated>
<author>
<name>Hugo Lefeuvre</name>
<email>hle@debian.org</email>
</author>
<published>2018-12-14T03:58:40Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=8ee335227bbcaf1614124046aa25e53d67b11ec3'/>
<id>urn:sha1:8ee335227bbcaf1614124046aa25e53d67b11ec3</id>
<content type='text'>
width/length dimensions read from bmp headers are not necessarily
valid. For instance they may have been maliciously set to very large
values with the intention to cause DoS (large memory allocation, stack
overflow). In these cases we want to detect the invalid size as early
as possible.

This commit introduces a counter which verifies that the number of
written bytes corresponds to the advertized width/length.

Fixes #1059 (CVE-2018-6616).
</content>
</entry>
<entry>
<title>Merge pull request #1168 from Young-X/fix_dev</title>
<updated>2018-12-07T20:27:38Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@mines-paris.org</email>
</author>
<published>2018-12-07T20:27:38Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=e7640f58f122d1228f3d750864543ad4703e18fc'/>
<id>urn:sha1:e7640f58f122d1228f3d750864543ad4703e18fc</id>
<content type='text'>
Fix multiple potential vulnerabilities and bugs</content>
</entry>
<entry>
<title>[JPWL] tgatoimage(): avoid excessive memory allocation attempt,</title>
<updated>2018-11-28T06:44:06Z</updated>
<author>
<name>Young Xiao</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-28T06:44:06Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=05be3084460e46282ee63f04c72c451f3271fd28'/>
<id>urn:sha1:05be3084460e46282ee63f04c72c451f3271fd28</id>
<content type='text'>
and fixes unaligned load

Signed-off-by: Young Xiao &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title> [JP3D] To avoid divisions by zero / undefined behaviour on shift (CVE-2018-14423</title>
<updated>2018-11-28T06:39:15Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T09:15:05Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=bd88611ed9ad7144ec4f3de54790cd848175891b'/>
<id>urn:sha1:bd88611ed9ad7144ec4f3de54790cd848175891b</id>
<content type='text'>
Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title> [JPWL] opj_compress: reorder checks related to code block dimensions to avoid potential int overflow</title>
<updated>2018-11-28T06:39:14Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T09:12:06Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=ce9583d1d7627e007a34a31ae4e22a00d78bd153'/>
<id>urn:sha1:ce9583d1d7627e007a34a31ae4e22a00d78bd153</id>
<content type='text'>
Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title>[OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function</title>
<updated>2018-11-28T06:39:14Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T08:24:19Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=c58df149900df862806d0e892859b41115875845'/>
<id>urn:sha1:c58df149900df862806d0e892859b41115875845</id>
<content type='text'>
opj_get_encoding_parameters

Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
<entry>
<title>[MJ2] Avoid index out of bounds access to pi-&gt;include[]</title>
<updated>2018-11-28T06:39:14Z</updated>
<author>
<name>Young_X</name>
<email>YangX92@hotmail.com</email>
</author>
<published>2018-11-23T08:12:53Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=c277159986c80142180fbe5efb256bbf3bdf3edc'/>
<id>urn:sha1:c277159986c80142180fbe5efb256bbf3bdf3edc</id>
<content type='text'>
Signed-off-by: Young_X &lt;YangX92@hotmail.com&gt;
</content>
</entry>
</feed>
