Blame SOURCES/openjpeg2_CVE-2020-6851.patch

153bb5
From 36dc8ffca8c085423149bb028da5688936c88c68 Mon Sep 17 00:00:00 2001
153bb5
From: Even Rouault <even.rouault@spatialys.com>
153bb5
Date: Sat, 11 Jan 2020 01:51:19 +0100
153bb5
Subject: [PATCH] opj_j2k_update_image_dimensions(): reject images whose
153bb5
 coordinates are beyond INT_MAX (fixes #1228)
153bb5
153bb5
---
153bb5
 src/lib/openjp2/j2k.c | 8 ++++++++
153bb5
 1 file changed, 8 insertions(+)
153bb5
153bb5
diff --git a/src/lib/openjp2/j2k.c b/src/lib/openjp2/j2k.c
153bb5
index 4169cd6..9e9a30f 100644
153bb5
--- a/src/lib/openjp2/j2k.c
153bb5
+++ b/src/lib/openjp2/j2k.c
153bb5
@@ -9236,6 +9236,14 @@ static OPJ_BOOL opj_j2k_update_image_dimensions(opj_image_t* p_image,
153bb5
     l_img_comp = p_image->comps;
153bb5
     for (it_comp = 0; it_comp < p_image->numcomps; ++it_comp) {
153bb5
         OPJ_INT32 l_h, l_w;
153bb5
+        if (p_image->x0 > (OPJ_UINT32)INT_MAX ||
153bb5
+                p_image->y0 > (OPJ_UINT32)INT_MAX ||
153bb5
+                p_image->x1 > (OPJ_UINT32)INT_MAX ||
153bb5
+                p_image->y1 > (OPJ_UINT32)INT_MAX) {
153bb5
+            opj_event_msg(p_manager, EVT_ERROR,
153bb5
+                          "Image coordinates above INT_MAX are not supported\n");
153bb5
+            return OPJ_FALSE;
153bb5
+        }
153bb5
 
153bb5
         l_img_comp->x0 = (OPJ_UINT32)opj_int_ceildiv((OPJ_INT32)p_image->x0,
153bb5
                          (OPJ_INT32)l_img_comp->dx);
153bb5
-- 
153bb5
2.21.1
153bb5