b6e4e9de41
Fixes: CVE-2014-8137 - double-free in jas_iccattrval_destroy() CVE-2014-8138 - heap overflow in jp2_decode() Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
19 lines
753 B
Diff
19 lines
753 B
Diff
See https://bugzilla.redhat.com/show_bug.cgi?id=1173157
|
|
|
|
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
|
|
|
|
--- jasper-1.900.1.orig/src/libjasper/jp2/jp2_dec.c 2014-12-11 14:30:54.193209780 +0100
|
|
+++ jasper-1.900.1/src/libjasper/jp2/jp2_dec.c 2014-12-11 14:36:46.313217814 +0100
|
|
@@ -291,7 +291,10 @@ jas_image_t *jp2_decode(jas_stream_t *in
|
|
case JP2_COLR_ICC:
|
|
iccprof = jas_iccprof_createfrombuf(dec->colr->data.colr.iccp,
|
|
dec->colr->data.colr.iccplen);
|
|
- assert(iccprof);
|
|
+ if (!iccprof) {
|
|
+ jas_eprintf("error: failed to parse ICC profile\n");
|
|
+ goto error;
|
|
+ }
|
|
jas_iccprof_gethdr(iccprof, &icchdr);
|
|
jas_eprintf("ICC Profile CS %08x\n", icchdr.colorspc);
|
|
jas_image_setclrspc(dec->image, fromiccpcs(icchdr.colorspc));
|