[arch-commits] Commit in jasper/repos (8 files)

Antonio Rojas arojas at archlinux.org
Mon Oct 17 06:20:43 UTC 2016


    Date: Monday, October 17, 2016 @ 06:20:43
  Author: arojas
Revision: 278868

archrelease: copy trunk to testing-i686, testing-x86_64

Added:
  jasper/repos/testing-i686/
  jasper/repos/testing-i686/PKGBUILD
    (from rev 278867, jasper/trunk/PKGBUILD)
  jasper/repos/testing-i686/jasper-1.900.1-CVE-2016-2089.patch
    (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
  jasper/repos/testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch
    (from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
  jasper/repos/testing-x86_64/
  jasper/repos/testing-x86_64/PKGBUILD
    (from rev 278867, jasper/trunk/PKGBUILD)
  jasper/repos/testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch
    (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
  jasper/repos/testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch
    (from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)

------------------------------------------------------------------+
 testing-i686/PKGBUILD                                            |   37 ++++++++++
 testing-i686/jasper-1.900.1-CVE-2016-2089.patch                  |   33 ++++++++
 testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch   |   37 ++++++++++
 testing-x86_64/PKGBUILD                                          |   37 ++++++++++
 testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch                |   33 ++++++++
 testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch |   37 ++++++++++
 6 files changed, 214 insertions(+)

Copied: jasper/repos/testing-i686/PKGBUILD (from rev 278867, jasper/trunk/PKGBUILD)
===================================================================
--- testing-i686/PKGBUILD	                        (rev 0)
+++ testing-i686/PKGBUILD	2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+# $Id$
+# Maintainer: Eric Bélanger <eric at archlinux.org>
+
+pkgname=jasper
+pkgver=1.900.5
+pkgrel=1
+pkgdesc="A software-based implementation of the codec specified in the emerging JPEG-2000 Part-1 standard"
+arch=('i686' 'x86_64')
+url="http://www.ece.uvic.ca/~mdadams/jasper/"
+license=('custom:JasPer2.0')
+depends=('libjpeg')
+makedepends=('freeglut' 'libxmu' 'glu')
+optdepends=('freeglut: for jiv support' 'glu: for jiv support')
+source=(http://www.ece.uvic.ca/~mdadams/${pkgname}/software/${pkgname}-${pkgver}.tar.gz
+        jasper-1.900.1-fix-filename-buffer-overflow.patch
+        jasper-1.900.1-CVE-2016-2089.patch)
+sha1sums=('ca335fc2eccbd01019bf402dac810de1f02f98ac'
+          '577dfce40da75818c4d32eb1c4532b1370950bee'
+          '981d622402f6ce82975489d76a373e4abd252418')
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 -i "${srcdir}/jasper-1.900.1-fix-filename-buffer-overflow.patch"
+  patch -p1 -i "${srcdir}/jasper-1.900.1-CVE-2016-2089.patch"
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  ./configure --prefix=/usr --mandir=/usr/share/man --enable-shared
+  make
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make DESTDIR="${pkgdir}" install
+  install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}

Copied: jasper/repos/testing-i686/jasper-1.900.1-CVE-2016-2089.patch (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
===================================================================
--- testing-i686/jasper-1.900.1-CVE-2016-2089.patch	                        (rev 0)
+++ testing-i686/jasper-1.900.1-CVE-2016-2089.patch	2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,33 @@
+Description: CVE-2016-2089: matrix rows_ NULL pointer dereference in jas_matrix_clip()
+Origin: vendor
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1302636
+Bug-Debian: https://bugs.debian.org/812978
+Forwarded: not-needed
+Author: Tomas Hoger <thoger at redhat.com>
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2016-03-05
+
+--- a/src/libjasper/base/jas_image.c
++++ b/src/libjasper/base/jas_image.c
+@@ -426,6 +426,10 @@ int jas_image_readcmpt(jas_image_t *imag
+ 		return -1;
+ 	}
+ 
++	if (!data->rows_) {
++		return -1;
++	}
++
+ 	if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ 		if (jas_matrix_resize(data, height, width)) {
+ 			return -1;
+@@ -479,6 +483,10 @@ int jas_image_writecmpt(jas_image_t *ima
+ 		return -1;
+ 	}
+ 
++	if (!data->rows_) {
++		return -1;
++	}
++
+ 	if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ 		return -1;
+ 	}

Copied: jasper/repos/testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch (from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
===================================================================
--- testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch	                        (rev 0)
+++ testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch	2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+Description: Filename buffer overflow fix
+ This patch fixes a security hole by a bad buffer size handling.
+Author: Roland Stigge <stigge at antcom.de>
+Bug-Debian: http://bugs.debian.org/645118
+
+--- a/src/libjasper/include/jasper/jas_stream.h
++++ b/src/libjasper/include/jasper/jas_stream.h
+@@ -77,6 +77,7 @@
+ #include <jasper/jas_config.h>
+ 
+ #include <stdio.h>
++#include <limits.h>
+ #if defined(HAVE_FCNTL_H)
+ #include <fcntl.h>
+ #endif
+@@ -99,6 +100,12 @@ extern "C" {
+ #define O_BINARY	0
+ #endif
+ 
++#ifdef PATH_MAX
++#define JAS_PATH_MAX PATH_MAX
++#else
++#define JAS_PATH_MAX 4096
++#endif
++
+ /*
+  * Stream open flags.
+  */
+@@ -251,7 +258,7 @@ typedef struct {
+ typedef struct {
+ 	int fd;
+ 	int flags;
+-	char pathname[L_tmpnam + 1];
++	char pathname[JAS_PATH_MAX + 1];
+ } jas_stream_fileobj_t;
+ 
+ #define	JAS_STREAM_FILEOBJ_DELONCLOSE	0x01

Copied: jasper/repos/testing-x86_64/PKGBUILD (from rev 278867, jasper/trunk/PKGBUILD)
===================================================================
--- testing-x86_64/PKGBUILD	                        (rev 0)
+++ testing-x86_64/PKGBUILD	2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+# $Id$
+# Maintainer: Eric Bélanger <eric at archlinux.org>
+
+pkgname=jasper
+pkgver=1.900.5
+pkgrel=1
+pkgdesc="A software-based implementation of the codec specified in the emerging JPEG-2000 Part-1 standard"
+arch=('i686' 'x86_64')
+url="http://www.ece.uvic.ca/~mdadams/jasper/"
+license=('custom:JasPer2.0')
+depends=('libjpeg')
+makedepends=('freeglut' 'libxmu' 'glu')
+optdepends=('freeglut: for jiv support' 'glu: for jiv support')
+source=(http://www.ece.uvic.ca/~mdadams/${pkgname}/software/${pkgname}-${pkgver}.tar.gz
+        jasper-1.900.1-fix-filename-buffer-overflow.patch
+        jasper-1.900.1-CVE-2016-2089.patch)
+sha1sums=('ca335fc2eccbd01019bf402dac810de1f02f98ac'
+          '577dfce40da75818c4d32eb1c4532b1370950bee'
+          '981d622402f6ce82975489d76a373e4abd252418')
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 -i "${srcdir}/jasper-1.900.1-fix-filename-buffer-overflow.patch"
+  patch -p1 -i "${srcdir}/jasper-1.900.1-CVE-2016-2089.patch"
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  ./configure --prefix=/usr --mandir=/usr/share/man --enable-shared
+  make
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make DESTDIR="${pkgdir}" install
+  install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}

Copied: jasper/repos/testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
===================================================================
--- testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch	                        (rev 0)
+++ testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch	2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,33 @@
+Description: CVE-2016-2089: matrix rows_ NULL pointer dereference in jas_matrix_clip()
+Origin: vendor
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1302636
+Bug-Debian: https://bugs.debian.org/812978
+Forwarded: not-needed
+Author: Tomas Hoger <thoger at redhat.com>
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2016-03-05
+
+--- a/src/libjasper/base/jas_image.c
++++ b/src/libjasper/base/jas_image.c
+@@ -426,6 +426,10 @@ int jas_image_readcmpt(jas_image_t *imag
+ 		return -1;
+ 	}
+ 
++	if (!data->rows_) {
++		return -1;
++	}
++
+ 	if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ 		if (jas_matrix_resize(data, height, width)) {
+ 			return -1;
+@@ -479,6 +483,10 @@ int jas_image_writecmpt(jas_image_t *ima
+ 		return -1;
+ 	}
+ 
++	if (!data->rows_) {
++		return -1;
++	}
++
+ 	if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ 		return -1;
+ 	}

Copied: jasper/repos/testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch (from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
===================================================================
--- testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch	                        (rev 0)
+++ testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch	2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+Description: Filename buffer overflow fix
+ This patch fixes a security hole by a bad buffer size handling.
+Author: Roland Stigge <stigge at antcom.de>
+Bug-Debian: http://bugs.debian.org/645118
+
+--- a/src/libjasper/include/jasper/jas_stream.h
++++ b/src/libjasper/include/jasper/jas_stream.h
+@@ -77,6 +77,7 @@
+ #include <jasper/jas_config.h>
+ 
+ #include <stdio.h>
++#include <limits.h>
+ #if defined(HAVE_FCNTL_H)
+ #include <fcntl.h>
+ #endif
+@@ -99,6 +100,12 @@ extern "C" {
+ #define O_BINARY	0
+ #endif
+ 
++#ifdef PATH_MAX
++#define JAS_PATH_MAX PATH_MAX
++#else
++#define JAS_PATH_MAX 4096
++#endif
++
+ /*
+  * Stream open flags.
+  */
+@@ -251,7 +258,7 @@ typedef struct {
+ typedef struct {
+ 	int fd;
+ 	int flags;
+-	char pathname[L_tmpnam + 1];
++	char pathname[JAS_PATH_MAX + 1];
+ } jas_stream_fileobj_t;
+ 
+ #define	JAS_STREAM_FILEOBJ_DELONCLOSE	0x01



More information about the arch-commits mailing list