Date: Monday, October 17, 2016 @ 06:20:43
  Author: arojas
Revision: 278868

archrelease: copy trunk to testing-i686, testing-x86_64

Added:
  jasper/repos/testing-i686/
  jasper/repos/testing-i686/PKGBUILD
    (from rev 278867, jasper/trunk/PKGBUILD)
  jasper/repos/testing-i686/jasper-1.900.1-CVE-2016-2089.patch
    (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
  jasper/repos/testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch
    (from rev 278867, 
jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
  jasper/repos/testing-x86_64/
  jasper/repos/testing-x86_64/PKGBUILD
    (from rev 278867, jasper/trunk/PKGBUILD)
  jasper/repos/testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch
    (from rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
  jasper/repos/testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch
    (from rev 278867, 
jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)

------------------------------------------------------------------+
 testing-i686/PKGBUILD                                            |   37 
++++++++++
 testing-i686/jasper-1.900.1-CVE-2016-2089.patch                  |   33 
++++++++
 testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch   |   37 
++++++++++
 testing-x86_64/PKGBUILD                                          |   37 
++++++++++
 testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch                |   33 
++++++++
 testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch |   37 
++++++++++
 6 files changed, 214 insertions(+)

Copied: jasper/repos/testing-i686/PKGBUILD (from rev 278867, 
jasper/trunk/PKGBUILD)
===================================================================
--- testing-i686/PKGBUILD                               (rev 0)
+++ testing-i686/PKGBUILD       2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+# $Id$
+# Maintainer: Eric Bélanger <e...@archlinux.org>
+
+pkgname=jasper
+pkgver=1.900.5
+pkgrel=1
+pkgdesc="A software-based implementation of the codec specified in the 
emerging JPEG-2000 Part-1 standard"
+arch=('i686' 'x86_64')
+url="http://www.ece.uvic.ca/~mdadams/jasper/";
+license=('custom:JasPer2.0')
+depends=('libjpeg')
+makedepends=('freeglut' 'libxmu' 'glu')
+optdepends=('freeglut: for jiv support' 'glu: for jiv support')
+source=(http://www.ece.uvic.ca/~mdadams/${pkgname}/software/${pkgname}-${pkgver}.tar.gz
+        jasper-1.900.1-fix-filename-buffer-overflow.patch
+        jasper-1.900.1-CVE-2016-2089.patch)
+sha1sums=('ca335fc2eccbd01019bf402dac810de1f02f98ac'
+          '577dfce40da75818c4d32eb1c4532b1370950bee'
+          '981d622402f6ce82975489d76a373e4abd252418')
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 -i "${srcdir}/jasper-1.900.1-fix-filename-buffer-overflow.patch"
+  patch -p1 -i "${srcdir}/jasper-1.900.1-CVE-2016-2089.patch"
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  ./configure --prefix=/usr --mandir=/usr/share/man --enable-shared
+  make
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make DESTDIR="${pkgdir}" install
+  install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}

Copied: jasper/repos/testing-i686/jasper-1.900.1-CVE-2016-2089.patch (from rev 
278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
===================================================================
--- testing-i686/jasper-1.900.1-CVE-2016-2089.patch                             
(rev 0)
+++ testing-i686/jasper-1.900.1-CVE-2016-2089.patch     2016-10-17 06:20:43 UTC 
(rev 278868)
@@ -0,0 +1,33 @@
+Description: CVE-2016-2089: matrix rows_ NULL pointer dereference in 
jas_matrix_clip()
+Origin: vendor
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1302636
+Bug-Debian: https://bugs.debian.org/812978
+Forwarded: not-needed
+Author: Tomas Hoger <tho...@redhat.com>
+Reviewed-by: Salvatore Bonaccorso <car...@debian.org>
+Last-Update: 2016-03-05
+
+--- a/src/libjasper/base/jas_image.c
++++ b/src/libjasper/base/jas_image.c
+@@ -426,6 +426,10 @@ int jas_image_readcmpt(jas_image_t *imag
+               return -1;
+       }
+ 
++      if (!data->rows_) {
++              return -1;
++      }
++
+       if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != 
width) {
+               if (jas_matrix_resize(data, height, width)) {
+                       return -1;
+@@ -479,6 +483,10 @@ int jas_image_writecmpt(jas_image_t *ima
+               return -1;
+       }
+ 
++      if (!data->rows_) {
++              return -1;
++      }
++
+       if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != 
width) {
+               return -1;
+       }

Copied: 
jasper/repos/testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch 
(from rev 278867, 
jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
===================================================================
--- testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch              
                (rev 0)
+++ testing-i686/jasper-1.900.1-fix-filename-buffer-overflow.patch      
2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+Description: Filename buffer overflow fix
+ This patch fixes a security hole by a bad buffer size handling.
+Author: Roland Stigge <sti...@antcom.de>
+Bug-Debian: http://bugs.debian.org/645118
+
+--- a/src/libjasper/include/jasper/jas_stream.h
++++ b/src/libjasper/include/jasper/jas_stream.h
+@@ -77,6 +77,7 @@
+ #include <jasper/jas_config.h>
+ 
+ #include <stdio.h>
++#include <limits.h>
+ #if defined(HAVE_FCNTL_H)
+ #include <fcntl.h>
+ #endif
+@@ -99,6 +100,12 @@ extern "C" {
+ #define O_BINARY      0
+ #endif
+ 
++#ifdef PATH_MAX
++#define JAS_PATH_MAX PATH_MAX
++#else
++#define JAS_PATH_MAX 4096
++#endif
++
+ /*
+  * Stream open flags.
+  */
+@@ -251,7 +258,7 @@ typedef struct {
+ typedef struct {
+       int fd;
+       int flags;
+-      char pathname[L_tmpnam + 1];
++      char pathname[JAS_PATH_MAX + 1];
+ } jas_stream_fileobj_t;
+ 
+ #define       JAS_STREAM_FILEOBJ_DELONCLOSE   0x01

Copied: jasper/repos/testing-x86_64/PKGBUILD (from rev 278867, 
jasper/trunk/PKGBUILD)
===================================================================
--- testing-x86_64/PKGBUILD                             (rev 0)
+++ testing-x86_64/PKGBUILD     2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+# $Id$
+# Maintainer: Eric Bélanger <e...@archlinux.org>
+
+pkgname=jasper
+pkgver=1.900.5
+pkgrel=1
+pkgdesc="A software-based implementation of the codec specified in the 
emerging JPEG-2000 Part-1 standard"
+arch=('i686' 'x86_64')
+url="http://www.ece.uvic.ca/~mdadams/jasper/";
+license=('custom:JasPer2.0')
+depends=('libjpeg')
+makedepends=('freeglut' 'libxmu' 'glu')
+optdepends=('freeglut: for jiv support' 'glu: for jiv support')
+source=(http://www.ece.uvic.ca/~mdadams/${pkgname}/software/${pkgname}-${pkgver}.tar.gz
+        jasper-1.900.1-fix-filename-buffer-overflow.patch
+        jasper-1.900.1-CVE-2016-2089.patch)
+sha1sums=('ca335fc2eccbd01019bf402dac810de1f02f98ac'
+          '577dfce40da75818c4d32eb1c4532b1370950bee'
+          '981d622402f6ce82975489d76a373e4abd252418')
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 -i "${srcdir}/jasper-1.900.1-fix-filename-buffer-overflow.patch"
+  patch -p1 -i "${srcdir}/jasper-1.900.1-CVE-2016-2089.patch"
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  ./configure --prefix=/usr --mandir=/usr/share/man --enable-shared
+  make
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make DESTDIR="${pkgdir}" install
+  install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}

Copied: jasper/repos/testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch (from 
rev 278867, jasper/trunk/jasper-1.900.1-CVE-2016-2089.patch)
===================================================================
--- testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch                           
(rev 0)
+++ testing-x86_64/jasper-1.900.1-CVE-2016-2089.patch   2016-10-17 06:20:43 UTC 
(rev 278868)
@@ -0,0 +1,33 @@
+Description: CVE-2016-2089: matrix rows_ NULL pointer dereference in 
jas_matrix_clip()
+Origin: vendor
+Bug-RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=1302636
+Bug-Debian: https://bugs.debian.org/812978
+Forwarded: not-needed
+Author: Tomas Hoger <tho...@redhat.com>
+Reviewed-by: Salvatore Bonaccorso <car...@debian.org>
+Last-Update: 2016-03-05
+
+--- a/src/libjasper/base/jas_image.c
++++ b/src/libjasper/base/jas_image.c
+@@ -426,6 +426,10 @@ int jas_image_readcmpt(jas_image_t *imag
+               return -1;
+       }
+ 
++      if (!data->rows_) {
++              return -1;
++      }
++
+       if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != 
width) {
+               if (jas_matrix_resize(data, height, width)) {
+                       return -1;
+@@ -479,6 +483,10 @@ int jas_image_writecmpt(jas_image_t *ima
+               return -1;
+       }
+ 
++      if (!data->rows_) {
++              return -1;
++      }
++
+       if (jas_matrix_numrows(data) != height || jas_matrix_numcols(data) != 
width) {
+               return -1;
+       }

Copied: 
jasper/repos/testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch 
(from rev 278867, 
jasper/trunk/jasper-1.900.1-fix-filename-buffer-overflow.patch)
===================================================================
--- testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch            
                (rev 0)
+++ testing-x86_64/jasper-1.900.1-fix-filename-buffer-overflow.patch    
2016-10-17 06:20:43 UTC (rev 278868)
@@ -0,0 +1,37 @@
+Description: Filename buffer overflow fix
+ This patch fixes a security hole by a bad buffer size handling.
+Author: Roland Stigge <sti...@antcom.de>
+Bug-Debian: http://bugs.debian.org/645118
+
+--- a/src/libjasper/include/jasper/jas_stream.h
++++ b/src/libjasper/include/jasper/jas_stream.h
+@@ -77,6 +77,7 @@
+ #include <jasper/jas_config.h>
+ 
+ #include <stdio.h>
++#include <limits.h>
+ #if defined(HAVE_FCNTL_H)
+ #include <fcntl.h>
+ #endif
+@@ -99,6 +100,12 @@ extern "C" {
+ #define O_BINARY      0
+ #endif
+ 
++#ifdef PATH_MAX
++#define JAS_PATH_MAX PATH_MAX
++#else
++#define JAS_PATH_MAX 4096
++#endif
++
+ /*
+  * Stream open flags.
+  */
+@@ -251,7 +258,7 @@ typedef struct {
+ typedef struct {
+       int fd;
+       int flags;
+-      char pathname[L_tmpnam + 1];
++      char pathname[JAS_PATH_MAX + 1];
+ } jas_stream_fileobj_t;
+ 
+ #define       JAS_STREAM_FILEOBJ_DELONCLOSE   0x01

Reply via email to