summaryrefslogtreecommitdiffstats
path: root/openjpeg2_CVE-2020-27824.patch
diff options
context:
space:
mode:
authorRemi Collet <remi@remirepo.net>2021-05-31 14:07:41 +0200
committerRemi Collet <remi@remirepo.net>2021-05-31 14:07:41 +0200
commitec030379984fe4becf3f014e31e66e2b25539039 (patch)
tree1cab3215bbad05c5414e6fa24f059ffe96d27fd1 /openjpeg2_CVE-2020-27824.patch
parentaa3cad9000d51a3aae7dd04933776c7efd7f3b87 (diff)
sync with Fedora
Update to 2.4.0 Apply proposed patches for CVE-2021-29338 and a heap buffer overflow (#1957616)
Diffstat (limited to 'openjpeg2_CVE-2020-27824.patch')
-rw-r--r--openjpeg2_CVE-2020-27824.patch23
1 files changed, 0 insertions, 23 deletions
diff --git a/openjpeg2_CVE-2020-27824.patch b/openjpeg2_CVE-2020-27824.patch
deleted file mode 100644
index 8301f7e..0000000
--- a/openjpeg2_CVE-2020-27824.patch
+++ /dev/null
@@ -1,23 +0,0 @@
-From 6daf5f3e1ec6eff03b7982889874a3de6617db8d Mon Sep 17 00:00:00 2001
-From: Even Rouault <even.rouault@spatialys.com>
-Date: Mon, 30 Nov 2020 22:37:07 +0100
-Subject: [PATCH] Encoder: avoid global buffer overflow on irreversible
- conversion when too many decomposition levels are specified (fixes #1286)
-
----
- src/lib/openjp2/dwt.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/lib/openjp2/dwt.c b/src/lib/openjp2/dwt.c
-index ee9eb5e63..4164ba090 100644
---- a/src/lib/openjp2/dwt.c
-+++ b/src/lib/openjp2/dwt.c
-@@ -1976,7 +1976,7 @@ void opj_dwt_calc_explicit_stepsizes(opj_tccp_t * tccp, OPJ_UINT32 prec)
- if (tccp->qntsty == J2K_CCP_QNTSTY_NOQNT) {
- stepsize = 1.0;
- } else {
-- OPJ_FLOAT64 norm = opj_dwt_norms_real[orient][level];
-+ OPJ_FLOAT64 norm = opj_dwt_getnorm_real(level, orient);
- stepsize = (1 << (gain)) / norm;
- }
- opj_dwt_encode_stepsize((OPJ_INT32) floor(stepsize * 8192.0),