summaryrefslogtreecommitdiff
path: root/gnu/packages/patches/jasper-CVE-2014-8138.patch
diff options
context:
space:
mode:
Diffstat (limited to 'gnu/packages/patches/jasper-CVE-2014-8138.patch')
-rw-r--r--gnu/packages/patches/jasper-CVE-2014-8138.patch21
1 files changed, 0 insertions, 21 deletions
diff --git a/gnu/packages/patches/jasper-CVE-2014-8138.patch b/gnu/packages/patches/jasper-CVE-2014-8138.patch
deleted file mode 100644
index 0d9dc632ed..0000000000
--- a/gnu/packages/patches/jasper-CVE-2014-8138.patch
+++ /dev/null
@@ -1,21 +0,0 @@
-Fix CVE-2014-8138 (heap overflow in jp2_decode()).
-
-Copied from Fedora.
-
-http://pkgs.fedoraproject.org/cgit/rpms/jasper.git/tree/jasper-CVE-2014-8138.patch
-https://bugzilla.redhat.com/show_bug.cgi?id=1173162
-
---- jasper-1.900.1.orig/src/libjasper/jp2/jp2_dec.c 2014-12-11 14:06:44.000000000 +0100
-+++ jasper-1.900.1/src/libjasper/jp2/jp2_dec.c 2014-12-11 14:06:26.000000000 +0100
-@@ -386,6 +386,11 @@ jas_image_t *jp2_decode(jas_stream_t *in
- /* Determine the type of each component. */
- if (dec->cdef) {
- for (i = 0; i < dec->numchans; ++i) {
-+ /* Is the channel number reasonable? */
-+ if (dec->cdef->data.cdef.ents[i].channo >= dec->numchans) {
-+ jas_eprintf("error: invalid channel number in CDEF box\n");
-+ goto error;
-+ }
- jas_image_setcmpttype(dec->image,
- dec->chantocmptlut[dec->cdef->data.cdef.ents[i].channo],
- jp2_getct(jas_image_clrspc(dec->image),