<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openjpeg/src, branch v2.5.0</title>
<subtitle>Fork of openjpeg library for JPEG2000 encoding and decoding</subtitle>
<id>https://git.carlh.net/cgit/openjpeg/atom?h=v2.5.0</id>
<link rel='self' href='https://git.carlh.net/cgit/openjpeg/atom?h=v2.5.0'/>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/'/>
<updated>2022-05-08T17:45:53Z</updated>
<entry>
<title>opj_compress.c: usage formatting fix</title>
<updated>2022-05-08T17:45:53Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2022-05-08T17:45:42Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=76c6a257264da40fff1805cfc957536af451faff'/>
<id>urn:sha1:76c6a257264da40fff1805cfc957536af451faff</id>
<content type='text'>
</content>
</entry>
<entry>
<title>JAVA_SOURCE_VERSION from 1.6 to 1.8</title>
<updated>2022-05-07T01:27:27Z</updated>
<author>
<name>Pei Jia</name>
<email>jiapei@longervision.com</email>
</author>
<published>2022-05-07T01:27:27Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=3ac495c7fc8c23010a15b3d282e1dbfb6422dae0'/>
<id>urn:sha1:3ac495c7fc8c23010a15b3d282e1dbfb6422dae0</id>
<content type='text'>
</content>
</entry>
<entry>
<title>opj_j2k_decode_tile(): avoid 'Stream too short' error in non-strict mode</title>
<updated>2022-02-10T14:50:07Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2022-02-10T14:49:57Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=6a29f5a9e3a1e2dbf1e3df22b7e449bc1db20b5c'/>
<id>urn:sha1:6a29f5a9e3a1e2dbf1e3df22b7e449bc1db20b5c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Avoid integer overflows in DWT. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44544</title>
<updated>2022-02-10T13:30:13Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2022-02-10T13:30:13Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=1462e9403fb7d1186e999701dfe72980262a089c'/>
<id>urn:sha1:1462e9403fb7d1186e999701dfe72980262a089c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add support for partial bitstream decoding (#1407) (fixes #715)</title>
<updated>2022-02-10T13:27:17Z</updated>
<author>
<name>Robert Gabriel Jakabosky</name>
<email>rjakabosky+github@neoawareness.com</email>
</author>
<published>2022-02-10T13:27:17Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=883c31dbe09771aab043744ac2b490d7386878e3'/>
<id>urn:sha1:883c31dbe09771aab043744ac2b490d7386878e3</id>
<content type='text'>
Add a -allow-partial option to opj_decompress utility and a opj_decoder_set_strict_mode() option to the API

Co-authored-by: Chris Hafey &lt;chafey@gmail.com&gt;</content>
</entry>
<entry>
<title>opj_encoder_set_extra_options(): add a GUARD_BITS=value option</title>
<updated>2022-01-23T16:54:44Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2022-01-23T16:53:55Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=1de5fc6c51617f49515ef80708dd074432a27a6a'/>
<id>urn:sha1:1de5fc6c51617f49515ef80708dd074432a27a6a</id>
<content type='text'>
and add a -GuardBits option to opj_compress.

The recently-released SMPTE DCP Bv2.1 Application Profile (link below)
says that the number of guard bits in the QCD marker shall be 1 for 2K
content and 2 for 4K content. This change allows the number of guard bits
to be configured, so that users of openjpeg have the control they need to meet the specification.

https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9161348

This is an alternative implementation of https://github.com/uclouvain/openjpeg/pull/1388
that keeps ABI unchanged.
</content>
</entry>
<entry>
<title>Fix potential overflow related issues spotted by LGTM code analysis (#1402)</title>
<updated>2022-01-18T20:55:10Z</updated>
<author>
<name>Eric Harvey</name>
<email>71228603+Eharve14@users.noreply.github.com</email>
</author>
<published>2022-01-18T20:55:10Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=241e9e8efeb6750ef4202a61b3a436628e4f6d23'/>
<id>urn:sha1:241e9e8efeb6750ef4202a61b3a436628e4f6d23</id>
<content type='text'>
</content>
</entry>
<entry>
<title>opj_j2k_setup_encoder(): validate number of tiles to avoid illegal values and potential overflow (fixes #1399)</title>
<updated>2022-01-18T14:44:18Z</updated>
<author>
<name>Even Rouault</name>
<email>even.rouault@spatialys.com</email>
</author>
<published>2022-01-18T14:44:18Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=70f5e0a0df0b97a5675673b779105dc8e5cfed30'/>
<id>urn:sha1:70f5e0a0df0b97a5675673b779105dc8e5cfed30</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix unsigned vs OPJ_INT32 mismatches  (#1398)</title>
<updated>2022-01-16T17:54:00Z</updated>
<author>
<name>Eric Harvey</name>
<email>71228603+Eharve14@users.noreply.github.com</email>
</author>
<published>2022-01-16T17:54:00Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=a1eec9c49e143fab0e0c0dcc13f94f11fef04f22'/>
<id>urn:sha1:a1eec9c49e143fab0e0c0dcc13f94f11fef04f22</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Added check for integer overflow in get_num_images  (#1397)</title>
<updated>2022-01-15T14:33:03Z</updated>
<author>
<name>Eharve14</name>
<email>71228603+Eharve14@users.noreply.github.com</email>
</author>
<published>2022-01-15T14:33:03Z</published>
<link rel='alternate' type='text/html' href='https://git.carlh.net/cgit/openjpeg/commit/?id=6e4588f379be0eb5b62fff65bf96aa1ca556ea96'/>
<id>urn:sha1:6e4588f379be0eb5b62fff65bf96aa1ca556ea96</id>
<content type='text'>
As discussed in pull request 1396, added a check for integer overflow.
Change list:
Defined num_images as unsigned int
Moved the if statement to check for an empty directory to the beginning of the read directory section
Added a check to see if num images would roll back to zero when incrementing.</content>
</entry>
</feed>
