b6e4e9de41
Fixes: CVE-2014-8137 - double-free in jas_iccattrval_destroy() CVE-2014-8138 - heap overflow in jp2_decode() Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
48 lines
1.0 KiB
Diff
48 lines
1.0 KiB
Diff
See https://bugzilla.redhat.com/show_bug.cgi?id=1173157
|
|
|
|
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
|
|
|
|
--- jasper-1.900.1.orig/src/libjasper/base/jas_icc.c 2014-12-11 14:06:44.000000000 +0100
|
|
+++ jasper-1.900.1/src/libjasper/base/jas_icc.c 2014-12-11 15:16:37.971272386 +0100
|
|
@@ -1009,7 +1009,6 @@ static int jas_icccurv_input(jas_iccattr
|
|
return 0;
|
|
|
|
error:
|
|
- jas_icccurv_destroy(attrval);
|
|
return -1;
|
|
}
|
|
|
|
@@ -1127,7 +1126,6 @@ static int jas_icctxtdesc_input(jas_icca
|
|
#endif
|
|
return 0;
|
|
error:
|
|
- jas_icctxtdesc_destroy(attrval);
|
|
return -1;
|
|
}
|
|
|
|
@@ -1206,8 +1204,6 @@ static int jas_icctxt_input(jas_iccattrv
|
|
goto error;
|
|
return 0;
|
|
error:
|
|
- if (txt->string)
|
|
- jas_free(txt->string);
|
|
return -1;
|
|
}
|
|
|
|
@@ -1328,7 +1324,6 @@ static int jas_icclut8_input(jas_iccattr
|
|
goto error;
|
|
return 0;
|
|
error:
|
|
- jas_icclut8_destroy(attrval);
|
|
return -1;
|
|
}
|
|
|
|
@@ -1497,7 +1492,6 @@ static int jas_icclut16_input(jas_iccatt
|
|
goto error;
|
|
return 0;
|
|
error:
|
|
- jas_icclut16_destroy(attrval);
|
|
return -1;
|
|
}
|
|
|