[trunk] Fixed a crash on 0xh or wx0 image size decoding
Update issue 427
This commit is contained in:
parent
9a21e1eef0
commit
c0cb119c0e
|
@ -1981,8 +1981,9 @@ static OPJ_BOOL opj_j2k_read_siz(opj_j2k_t *p_j2k,
|
|||
}
|
||||
|
||||
/* testcase 4035.pdf.SIGSEGV.d8b.3375 */
|
||||
if (l_image->x0 > l_image->x1 || l_image->y0 > l_image->y1) {
|
||||
opj_event_msg(p_manager, EVT_ERROR, "Error with SIZ marker: negative image size (%d x %d)\n", l_image->x1 - l_image->x0, l_image->y1 - l_image->y0);
|
||||
/* testcase issue427-null-image-size.jp2 */
|
||||
if ((l_image->x0 >= l_image->x1) || (l_image->y0 >= l_image->y1)) {
|
||||
opj_event_msg(p_manager, EVT_ERROR, "Error with SIZ marker: negative or zero image size (%d x %d)\n", l_image->x1 - l_image->x0, l_image->y1 - l_image->y0);
|
||||
return OPJ_FALSE;
|
||||
}
|
||||
/* testcase 2539.pdf.SIGFPE.706.1712 (also 3622.pdf.SIGFPE.706.2916 and 4008.pdf.SIGFPE.706.3345 and maybe more) */
|
||||
|
|
|
@ -43,6 +43,7 @@ set(BLACKLIST_JPEG2000_TMP
|
|||
edf_c2_1674177.jp2
|
||||
edf_c2_1673169.jp2
|
||||
issue429.jp2
|
||||
issue427-null-image-size.jp2
|
||||
)
|
||||
|
||||
# Define a list of file which should be gracefully rejected:
|
||||
|
|
|
@ -229,6 +229,8 @@ opj_decompress -i @INPUT_NR_PATH@/issue411-ycc420.jp2 -o @TEMP_PATH@/issue411-yc
|
|||
!opj_decompress -i @INPUT_NR_PATH@/issue429.jp2 -o @TEMP_PATH@/issue429.jp2.pgx
|
||||
# issue 432 (from pdfium fuzz engine) Overflow in tcd tilec data size computation.
|
||||
!opj_decompress -i @INPUT_NR_PATH@/issue432.jp2 -o @TEMP_PATH@/issue432.jp2.pgx
|
||||
# issue 427 image width is 0
|
||||
!opj_decompress -i @INPUT_NR_PATH@/issue427-null-image-size.jp2 -o @TEMP_PATH@/issue427-null-image-size.jp2.pgx
|
||||
|
||||
# decode with specific area
|
||||
# prec=12; nb_c=1
|
||||
|
|
Loading…
Reference in New Issue