diff options
author | Daniel Sabogal <dsabogalcc@gmail.com> | 2016-09-15 12:53:23 -0400 |
---|---|---|
committer | Jakub Jirutka <jakub@jirutka.cz> | 2016-09-21 01:21:20 +0200 |
commit | cc30e48f2395b7893ffd566af92c1354494a1060 (patch) | |
tree | 6d20d0ccf349c8325d6739ae0df07b26afbdb417 /main/openjpeg/CVE-2016-7163-1.patch | |
parent | f4a083bd7a02c3fce05d1732453469acdb1c0e62 (diff) | |
download | aports-cc30e48f2395b7893ffd566af92c1354494a1060.tar.bz2 aports-cc30e48f2395b7893ffd566af92c1354494a1060.tar.xz |
main/openjpeg: security fix (CVE-2016-7163)
Diffstat (limited to 'main/openjpeg/CVE-2016-7163-1.patch')
-rw-r--r-- | main/openjpeg/CVE-2016-7163-1.patch | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/main/openjpeg/CVE-2016-7163-1.patch b/main/openjpeg/CVE-2016-7163-1.patch new file mode 100644 index 0000000000..c7d277a562 --- /dev/null +++ b/main/openjpeg/CVE-2016-7163-1.patch @@ -0,0 +1,33 @@ +From c16bc057ba3f125051c9966cf1f5b68a05681de4 Mon Sep 17 00:00:00 2001 +From: trylab <trylab@users.noreply.github.com> +Date: Tue, 6 Sep 2016 13:55:49 +0800 +Subject: [PATCH] Fix an integer overflow issue (#809) + +Prevent an integer overflow issue in function opj_pi_create_decode of +pi.c. +--- + src/lib/openjp2/pi.c | 8 +++++++- + 1 file changed, 7 insertions(+), 1 deletion(-) + +diff --git a/src/lib/openjp2/pi.c b/src/lib/openjp2/pi.c +index cffad66..36e2ff0 100644 +--- a/src/lib/openjp2/pi.c ++++ b/src/lib/openjp2/pi.c +@@ -1237,7 +1237,13 @@ opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image, + l_current_pi = l_pi; + + /* memory allocation for include */ +- l_current_pi->include = (OPJ_INT16*) opj_calloc((l_tcp->numlayers +1) * l_step_l, sizeof(OPJ_INT16)); ++ /* prevent an integer overflow issue */ ++ l_current_pi->include = 00; ++ if (l_step_l <= (SIZE_MAX / (l_tcp->numlayers + 1U))) ++ { ++ l_current_pi->include = (OPJ_INT16*) opj_calloc((l_tcp->numlayers +1) * l_step_l, sizeof(OPJ_INT16)); ++ } ++ + if + (!l_current_pi->include) + { +-- +2.10.0 + |