openjpeg/src/bin
Hugo Lefeuvre 8ee335227b convertbmp: detect invalid file dimensions early
width/length dimensions read from bmp headers are not necessarily
valid. For instance they may have been maliciously set to very large
values with the intention to cause DoS (large memory allocation, stack
overflow). In these cases we want to detect the invalid size as early
as possible.

This commit introduces a counter which verifies that the number of
written bytes corresponds to the advertized width/length.

Fixes #1059 (CVE-2018-6616).
2018-12-14 05:10:35 +01:00
..
common color_apply_icc_profile: avoid potential heap buffer overflow 2018-11-27 23:31:30 +01:00
jp2 convertbmp: detect invalid file dimensions early 2018-12-14 05:10:35 +01:00
jp3d jp3d/jpwl convert: fix write stack buffer overflow 2018-11-01 09:05:26 +01:00
jpip Reformat whole codebase with astyle.options (#128) 2017-05-09 20:46:20 +02:00
jpwl [JPWL] tgatoimage(): avoid excessive memory allocation attempt, 2018-11-28 14:44:06 +08:00
mj2 Merge branch 'pr1095' 2018-09-22 23:12:50 +02:00
wx Spelling fixes (patch by ka7, #890, rebased on top of master) 2017-07-26 21:06:38 +02:00
CMakeLists.txt [trunk] FolderReorgProposal task: fix JPWL 2012-09-28 09:26:51 +00:00