[arch-commits] Commit in jasper/repos (8 files)
Antonio Rojas
arojas at archlinux.org
Mon Oct 17 06:20:43 UTC 2016
Date: Monday, October 17, 2016 @ 06:20:43
Author: arojas
Revision: 278868
archrelease: copy trunk to testing-i686, testing-x86_64
Added:
jasper/repos/testing-i686/
jasper/repos/testing-i686/PKGBUILD
(from rev 278867, jasper/trunk/PKGBUILD)
jasper/repos/testing-i686/jasper-1.900.1-CVE-2016-2089.patch
(from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
jasper/repos/testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch
(from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
jasper/repos/testing-x86_64/
jasper/repos/testing-x86_64/PKGBUILD
(from rev 278867, jasper/trunk/PKGBUILD)
jasper/repos/testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch
(from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
jasper/repos/testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch
(from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
------------------------------------------------------------------+
testing-i686/PKGBUILD | 37 ++++++++++
testing-i686/jasper-1.900.1-CVE-2016-2089.patch | 33 ++++++++
testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch | 37 ++++++++++
testing-x86_64/PKGBUILD | 37 ++++++++++
testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch | 33 ++++++++
testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch | 37 ++++++++++
6 files changed, 214 insertions(+)
Copied: jasper/repos/testing-i686/PKGBUILD (from rev 278867, jasper/trunk/PKGBUILD)
===================================================================
--- testing-i686/PKGBUILD (rev 0)
+++ testing-i686/PKGBUILD 2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+# $Id$
+# Maintainer: Eric Bélanger <eric at archlinux.org>
+
+pkgname=jasper
+pkgver=1.900.5
+pkgrel=1
+pkgdesc="A software-based implementation of the codec specified in the emerging JPEG-2000 Part-1 standard"
+arch=('i686' 'x86_64')
+url="http://www.ece.uvic.ca/~mdadams/jasper/"
+license=('custom:JasPer2.0')
+depends=('libjpeg')
+makedepends=('freeglut' 'libxmu' 'glu')
+optdepends=('freeglut: for jiv support' 'glu: for jiv support')
+source=(http://www.ece.uvic.ca/~mdadams/${pkgname}/software/${pkgname}-${pkgver}.tar.gz
+ jasper-1.900.1-fix-filename-buffer-overflow.patch
+ jasper-1.900.1-CVE-2016-2089.patch)
+sha1sums=('ca335fc2eccbd01019bf402dac810de1f02f98ac'
+ '577dfce40da75818c4d32eb1c4532b1370950bee'
+ '981d622402f6ce82975489d76a373e4abd252418')
+
+prepare() {
+ cd ${pkgname}-${pkgver}
+ patch -p1 -i "${srcdir}/jasper-1.900.1-fix-filename-buffer-overflow.patch"
+ patch -p1 -i "${srcdir}/jasper-1.900.1-CVE-2016-2089.patch"
+}
+
+build() {
+ cd ${pkgname}-${pkgver}
+ ./configure --prefix=/usr --mandir=/usr/share/man --enable-shared
+ make
+}
+
+package() {
+ cd ${pkgname}-${pkgver}
+ make DESTDIR="${pkgdir}" install
+ install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}
Copied: jasper/repos/testing-i686/jasper-1.900.1-CVE-2016-2089.patch (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
===================================================================
--- testing-i686/jasper-1.900.1-CVE-2016-2089.patch (rev 0)
+++ testing-i686/jasper-1.900.1-CVE-2016-2089.patch 2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,33 @@
+Description: CVE-2016-2089: matrix rows_ NULL pointer dereference in jas_matrix_clip()
+Origin: vendor
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1302636
+Bug-Debian: https://bugs.debian.org/812978
+Forwarded: not-needed
+Author: Tomas Hoger <thoger at redhat.com>
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2016-03-05
+
+--- a/src/libjasper/base/jas_image.c
++++ b/src/libjasper/base/jas_image.c
+@@ -426,6 +426,10 @@ int jas_image_readcmpt(jas_image_t *imag
+ return -1;
+ }
+
++ if (!data->rows_) {
++ return -1;
++ }
++
+ if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ if (jas_matrix_resize(data, height, width)) {
+ return -1;
+@@ -479,6 +483,10 @@ int jas_image_writecmpt(jas_image_t *ima
+ return -1;
+ }
+
++ if (!data->rows_) {
++ return -1;
++ }
++
+ if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ return -1;
+ }
Copied: jasper/repos/testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch (from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
===================================================================
--- testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch (rev 0)
+++ testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch 2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+Description: Filename buffer overflow fix
+ This patch fixes a security hole by a bad buffer size handling.
+Author: Roland Stigge <stigge at antcom.de>
+Bug-Debian: http://bugs.debian.org/645118
+
+--- a/src/libjasper/include/jasper/jas_stream.h
++++ b/src/libjasper/include/jasper/jas_stream.h
+@@ -77,6 +77,7 @@
+ #include <jasper/jas_config.h>
+
+ #include <stdio.h>
++#include <limits.h>
+ #if defined(HAVE_FCNTL_H)
+ #include <fcntl.h>
+ #endif
+@@ -99,6 +100,12 @@ extern "C" {
+ #define O_BINARY 0
+ #endif
+
++#ifdef PATH_MAX
++#define JAS_PATH_MAX PATH_MAX
++#else
++#define JAS_PATH_MAX 4096
++#endif
++
+ /*
+ * Stream open flags.
+ */
+@@ -251,7 +258,7 @@ typedef struct {
+ typedef struct {
+ int fd;
+ int flags;
+- char pathname[L_tmpnam + 1];
++ char pathname[JAS_PATH_MAX + 1];
+ } jas_stream_fileobj_t;
+
+ #define JAS_STREAM_FILEOBJ_DELONCLOSE 0x01
Copied: jasper/repos/testing-x86_64/PKGBUILD (from rev 278867, jasper/trunk/PKGBUILD)
===================================================================
--- testing-x86_64/PKGBUILD (rev 0)
+++ testing-x86_64/PKGBUILD 2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+# $Id$
+# Maintainer: Eric Bélanger <eric at archlinux.org>
+
+pkgname=jasper
+pkgver=1.900.5
+pkgrel=1
+pkgdesc="A software-based implementation of the codec specified in the emerging JPEG-2000 Part-1 standard"
+arch=('i686' 'x86_64')
+url="http://www.ece.uvic.ca/~mdadams/jasper/"
+license=('custom:JasPer2.0')
+depends=('libjpeg')
+makedepends=('freeglut' 'libxmu' 'glu')
+optdepends=('freeglut: for jiv support' 'glu: for jiv support')
+source=(http://www.ece.uvic.ca/~mdadams/${pkgname}/software/${pkgname}-${pkgver}.tar.gz
+ jasper-1.900.1-fix-filename-buffer-overflow.patch
+ jasper-1.900.1-CVE-2016-2089.patch)
+sha1sums=('ca335fc2eccbd01019bf402dac810de1f02f98ac'
+ '577dfce40da75818c4d32eb1c4532b1370950bee'
+ '981d622402f6ce82975489d76a373e4abd252418')
+
+prepare() {
+ cd ${pkgname}-${pkgver}
+ patch -p1 -i "${srcdir}/jasper-1.900.1-fix-filename-buffer-overflow.patch"
+ patch -p1 -i "${srcdir}/jasper-1.900.1-CVE-2016-2089.patch"
+}
+
+build() {
+ cd ${pkgname}-${pkgver}
+ ./configure --prefix=/usr --mandir=/usr/share/man --enable-shared
+ make
+}
+
+package() {
+ cd ${pkgname}-${pkgver}
+ make DESTDIR="${pkgdir}" install
+ install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}
Copied: jasper/repos/testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
===================================================================
--- testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch (rev 0)
+++ testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch 2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,33 @@
+Description: CVE-2016-2089: matrix rows_ NULL pointer dereference in jas_matrix_clip()
+Origin: vendor
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1302636
+Bug-Debian: https://bugs.debian.org/812978
+Forwarded: not-needed
+Author: Tomas Hoger <thoger at redhat.com>
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2016-03-05
+
+--- a/src/libjasper/base/jas_image.c
++++ b/src/libjasper/base/jas_image.c
+@@ -426,6 +426,10 @@ int jas_image_readcmpt(jas_image_t *imag
+ return -1;
+ }
+
++ if (!data->rows_) {
++ return -1;
++ }
++
+ if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ if (jas_matrix_resize(data, height, width)) {
+ return -1;
+@@ -479,6 +483,10 @@ int jas_image_writecmpt(jas_image_t *ima
+ return -1;
+ }
+
++ if (!data->rows_) {
++ return -1;
++ }
++
+ if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != width) {
+ return -1;
+ }
Copied: jasper/repos/testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch (from rev 278867, jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
===================================================================
--- testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch (rev 0)
+++ testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch 2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+Description: Filename buffer overflow fix
+ This patch fixes a security hole by a bad buffer size handling.
+Author: Roland Stigge <stigge at antcom.de>
+Bug-Debian: http://bugs.debian.org/645118
+
+--- a/src/libjasper/include/jasper/jas_stream.h
++++ b/src/libjasper/include/jasper/jas_stream.h
+@@ -77,6 +77,7 @@
+ #include <jasper/jas_config.h>
+
+ #include <stdio.h>
++#include <limits.h>
+ #if defined(HAVE_FCNTL_H)
+ #include <fcntl.h>
+ #endif
+@@ -99,6 +100,12 @@ extern "C" {
+ #define O_BINARY 0
+ #endif
+
++#ifdef PATH_MAX
++#define JAS_PATH_MAX PATH_MAX
++#else
++#define JAS_PATH_MAX 4096
++#endif
++
+ /*
+ * Stream open flags.
+ */
+@@ -251,7 +258,7 @@ typedef struct {
+ typedef struct {
+ int fd;
+ int flags;
+- char pathname[L_tmpnam + 1];
++ char pathname[JAS_PATH_MAX + 1];
+ } jas_stream_fileobj_t;
+
+ #define JAS_STREAM_FILEOBJ_DELONCLOSE 0x01
More information about the arch-commits
mailing list