summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorHitendra Prajapati <hprajapati@mvista.com>2025-09-04 10:10:26 +0530
committerGyorgy Sarvari <skandigraun@gmail.com>2025-09-07 07:37:56 +0200
commit5d0643f194e9a7ed77eddbdc1d106536df2eb488 (patch)
treef9c25bae35f3e52288b644b5b02d80fb67e88500
parentbd42142b14f39a85a11783d1e34c9e23949bd6d1 (diff)
downloadmeta-openembedded-5d0643f194e9a7ed77eddbdc1d106536df2eb488.tar.gz
openjpeg: fix for CVE-2025-54874
Upstream-Status: Backport https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
-rw-r--r--meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2025-54874.patch44
-rw-r--r--meta-oe/recipes-graphics/openjpeg/openjpeg_2.5.3.bb1
2 files changed, 45 insertions, 0 deletions
diff --git a/meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2025-54874.patch b/meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2025-54874.patch
new file mode 100644
index 0000000000..187557a35c
--- /dev/null
+++ b/meta-oe/recipes-graphics/openjpeg/openjpeg/CVE-2025-54874.patch
@@ -0,0 +1,44 @@
1From f809b80c67717c152a5ad30bf06774f00da4fd2d Mon Sep 17 00:00:00 2001
2From: Sebastian Rasmussen <sebras@gmail.com>
3Date: Thu, 16 Jan 2025 02:13:43 +0100
4Subject: [PATCH] opj_jp2_read_header: Check for error after parsing header.
5
6Consider the case where the caller has not set the p_image
7pointer to NULL before calling opj_read_header().
8
9If opj_j2k_read_header_procedure() fails while obtaining the rest
10of the marker segment when calling opj_stream_read_data() because
11the data stream is too short, then opj_j2k_read_header() will
12never have the chance to initialize p_image, leaving it
13uninitialized.
14
15opj_jp2_read_header() will check the p_image value whether
16opj_j2k_read_header() suceeded or failed. This may be detected as
17an error in valgrind or ASAN.
18
19The fix is to check whether opj_j2k_read_header() suceeded before
20using the output argument p_image.
21
22CVE: CVE-2025-54874
23Upstream-Status: Backport [https://github.com/uclouvain/openjpeg/commit/f809b80c67717c152a5ad30bf06774f00da4fd2d]
24Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
25---
26 src/lib/openjp2/jp2.c | 2 +-
27 1 file changed, 1 insertion(+), 1 deletion(-)
28
29diff --git a/src/lib/openjp2/jp2.c b/src/lib/openjp2/jp2.c
30index 4df055a5..da506318 100644
31--- a/src/lib/openjp2/jp2.c
32+++ b/src/lib/openjp2/jp2.c
33@@ -2873,7 +2873,7 @@ OPJ_BOOL opj_jp2_read_header(opj_stream_private_t *p_stream,
34 p_image,
35 p_manager);
36
37- if (p_image && *p_image) {
38+ if (ret && p_image && *p_image) {
39 /* Set Image Color Space */
40 if (jp2->enumcs == 16) {
41 (*p_image)->color_space = OPJ_CLRSPC_SRGB;
42--
432.50.1
44
diff --git a/meta-oe/recipes-graphics/openjpeg/openjpeg_2.5.3.bb b/meta-oe/recipes-graphics/openjpeg/openjpeg_2.5.3.bb
index 231bf84573..586bfeaf1f 100644
--- a/meta-oe/recipes-graphics/openjpeg/openjpeg_2.5.3.bb
+++ b/meta-oe/recipes-graphics/openjpeg/openjpeg_2.5.3.bb
@@ -7,6 +7,7 @@ DEPENDS = "libpng tiff lcms zlib"
7 7
8SRC_URI = "git://github.com/uclouvain/openjpeg.git;branch=master;protocol=https \ 8SRC_URI = "git://github.com/uclouvain/openjpeg.git;branch=master;protocol=https \
9 file://0001-Do-not-ask-cmake-to-export-binaries-they-don-t-make-.patch \ 9 file://0001-Do-not-ask-cmake-to-export-binaries-they-don-t-make-.patch \
10 file://CVE-2025-54874.patch \
10 " 11 "
11SRCREV = "210a8a5690d0da66f02d49420d7176a21ef409dc" 12SRCREV = "210a8a5690d0da66f02d49420d7176a21ef409dc"
12S = "${WORKDIR}/git" 13S = "${WORKDIR}/git"