pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/graphics/openjpeg openjpeg: updated to 2.5.0



details:   https://anonhg.NetBSD.org/pkgsrc/rev/beb87bf59ca3
branches:  trunk
changeset: 379396:beb87bf59ca3
user:      adam <adam%pkgsrc.org@localhost>
date:      Sun May 15 19:24:10 2022 +0000

description:
openjpeg: updated to 2.5.0

v2.5.0

Merged pull requests:

tools/travis-ci/install.sh: git clone with https:// to fix 'The unaut…
Java Support 1.8 now...
Separate fuzz targets to increase coverage
CMakeLists.txt: do not set INSTALL_NAME_DIR for MacOS builds for CMake >= 3.0 (fixes
Avoid integer overflows in DWT. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44544
Updated "added support for partial bitstream decoding"
opj_encoder_set_extra_options(): add a GUARD_BITS=value option
More overflow related bug fixes
opj_j2k_setup_encoder(): validate number of tiles to avoid illegal values and potential overflow (fixes
Missed conversion from unsigned int to OPJ_INT32
Added check for integer overflow in get_num_images
Added overflow check for CVE-2021-29338
Fix integer overflow in num_images
Remove duplicate assignments in function tiftoimage
Fix some typos (found by codespell)
CI: Add CIFuzz action
Feature/decimation
API: deprecate 'bpp' member in favor of 'prec'
Added support for high throughput (HTJ2K) decoding.
verify-indentation.sh: fix for pull request from bar/master to foo/master
Change integer for version libtiff 4.3.0
Port continuous integration to github actions
Avoid integer overflows in DWT.
LGTM warning: Comparison result is always the same
A couple typos found by codespell
cmake: add install interface include directory
fix issues 1368: exist a issues of freeing uninitialized pointer in src/bin/jp2/opj_decompress.c,that will cause a segfault
opj_j2k_is_imf_compliant: Fix out of bounds access
opj_j2k_is_imf_compliant: Fix argument formatting for warnings.
CMakeLists.txt/appveyor.yml: update version number to 2.5.0…
.travis.yml: try to fix gcc 4.8 config by updating to xenial
Add support for enabling generation of TLM markers in encoder
Fix various compiler warnings
fix
Remove obsolete components JPWL, JP3D and MJ2
tools/travis-ci/install.sh: fix links to Kakadu and jpylyzer binaries
emscripten: disable big endian test
Fix cmake file with DESTDIR
CMakeLists.txt: Don't require a C++ compiler
Import files tiff and yuv(raw)
Fix year in NEWS
Fix lcms2 static linking using pgk config
fix static build only against tiff and its indirect dependencies

Closed issues:

integer constant is too large for 'long' type
Openjpeg3D lossy compression not working
mj2: Array overflow
OPJ fails to decode image that KDU manages correctly
yuvtoimage() bug in v1 and v2 for 16-Bit: please apply ASAP
JP3D: Fix CVE-2013-4289 CVE-2013-4290
MJ2 libraries are installed in lib
MJ2: realloc is misused and may leak memory
MJ2 wrapper not functional
JPWL is broken in trunk
MJ2 files not using OPENJPEG API correctly
Maximum bit depth supported by the OpenJPEG implementation of JP3D
does openjpeg support either visually lossless or numerically lossless jpeg2000 compression?
extract jpeg2000 tile without decompression
openjpeg doesn't install a relocatable shared lib on macOS
pull request - the cinema industry awaits!
Integer overflows in j2K
why lossly compression performance worse than jpeg when compress png?
cect
the docs don't describe bpp and prec in opj_image_comp very well
converting .png to .jp2 by opj_compress is different from the original image
Comparison result is always the same
Exist a issues of freeing uninitialized pointer in src/bin/jp2/opj_decompress.c,that will cause a segfault
[TEST NOT RUNNING]: bigendian test
opj_decompress 2.4.0 built with library 2.3.0.
New library htjpeg2000
Integer Overflow in num_images
All IMF Profile Selections Result in PART1
grayscale image
error C2169: 'lrintf': intrinsic function, cannot be defined
Generate lower-case extension
color of reconstructed png file much darker
CVE-2019-6988, CVE-2018-20846 and CVE-2018-16376
opj 2.4.0: opj_free missing in opj3d
Not able to compress volumetric data
HTML documents are not installed in specified place
Can't find openjpeg.h when cross-compile.
OpenJPEG is available with EasyConfig
Building Test Programs
Builds are not reproducible
strange behaviour of opj_jp3d_compress/decompress utility
Potential heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c and src/lib/openjp3d/t2.c
Function tgatoimage in src/bin/jpwl/convert.c need to check that the file is big enough to avoid excessive memory allocations
memory & cpu are exhausted when converting jp2 file into png
Cannot compress PGX into JP3D despite following the directions?
sscanf buffer overflow in opj_jp3d_compress.c
integer underflow may lead to writing garbage
sscanf buffer overflow
strcpy overflows
sprintf buffer overflows
strcpy buffer overflow
integer overflow in malloc()
out of bounds writes
out of bounds writes
divide by zero, perhaps multiplication overflow
missing format string parameter
leaks from cppcheck in lib folder
How to initialize DEBUG_PROFILE in color.c?
JP3D sample files
BIG_ENDIAN bug in jpwl.c
OpenJPEG fails to decode partial j2c where kdu succeeds
building mj2 binaries fails
openmj2\mj2.c: Out of bounds
bin\mj2\opj_mj2_decompress.c 101 wrong check / leak

diffstat:

 graphics/openjpeg/Makefile                                     |   5 +-
 graphics/openjpeg/PLIST                                        |  14 +-
 graphics/openjpeg/distinfo                                     |  11 +-
 graphics/openjpeg/patches/patch-src_lib_openjp2_CMakeLists.txt |   8 +-
 graphics/openjpeg/patches/patch-src_lib_openmj2_t2.c           |  40 ----------
 5 files changed, 18 insertions(+), 60 deletions(-)

diffs (127 lines):

diff -r fd0e74540b34 -r beb87bf59ca3 graphics/openjpeg/Makefile
--- a/graphics/openjpeg/Makefile        Sun May 15 19:23:52 2022 +0000
+++ b/graphics/openjpeg/Makefile        Sun May 15 19:24:10 2022 +0000
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.23 2021/06/23 20:33:11 nia Exp $
+# $NetBSD: Makefile,v 1.24 2022/05/15 19:24:10 adam Exp $
 
-DISTNAME=      openjpeg-2.4.0
-PKGREVISION=   1
+DISTNAME=      openjpeg-2.5.0
 CATEGORIES=    graphics
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=uclouvain/}
 GITHUB_TAG=    v${PKGVERSION_NOREV}
diff -r fd0e74540b34 -r beb87bf59ca3 graphics/openjpeg/PLIST
--- a/graphics/openjpeg/PLIST   Sun May 15 19:23:52 2022 +0000
+++ b/graphics/openjpeg/PLIST   Sun May 15 19:24:10 2022 +0000
@@ -1,17 +1,17 @@
-@comment $NetBSD: PLIST,v 1.8 2021/01/06 12:32:34 adam Exp $
+@comment $NetBSD: PLIST,v 1.9 2022/05/15 19:24:10 adam Exp $
 bin/opj_compress
 bin/opj_decompress
 bin/opj_dump
-include/openjpeg-2.4/openjpeg.h
-include/openjpeg-2.4/opj_config.h
-include/openjpeg-2.4/opj_stdint.h
+include/openjpeg-2.5/openjpeg.h
+include/openjpeg-2.5/opj_config.h
+include/openjpeg-2.5/opj_stdint.h
 lib/libopenjp2.a
 lib/libopenjp2.so
 lib/libopenjp2.so.${PKGVERSION}
 lib/libopenjp2.so.7
-lib/openjpeg-2.4/OpenJPEGConfig.cmake
-lib/openjpeg-2.4/OpenJPEGTargets-noconfig.cmake
-lib/openjpeg-2.4/OpenJPEGTargets.cmake
+lib/openjpeg-2.5/OpenJPEGConfig.cmake
+lib/openjpeg-2.5/OpenJPEGTargets-noconfig.cmake
+lib/openjpeg-2.5/OpenJPEGTargets.cmake
 lib/pkgconfig/libopenjp2.pc
 man/man1/opj_compress.1
 man/man1/opj_decompress.1
diff -r fd0e74540b34 -r beb87bf59ca3 graphics/openjpeg/distinfo
--- a/graphics/openjpeg/distinfo        Sun May 15 19:23:52 2022 +0000
+++ b/graphics/openjpeg/distinfo        Sun May 15 19:24:10 2022 +0000
@@ -1,10 +1,9 @@
-$NetBSD: distinfo,v 1.21 2021/10/26 10:46:35 nia Exp $
+$NetBSD: distinfo,v 1.22 2022/05/15 19:24:10 adam Exp $
 
-BLAKE2s (openjpeg-2.4.0.tar.gz) = ba47d310f5ea2a373a6a8f57368e1b2d12c20b1d6fbad6c8c9abd231f4852eaf
-SHA512 (openjpeg-2.4.0.tar.gz) = 55daab47d33823af94e32e5d345b52c251a5410f0c8e0a13b693f17899eedc8b2bb107489ddcba9ab78ef17dfd7cd80d3c5ec80c1e429189cb041124b67e07a8
-Size (openjpeg-2.4.0.tar.gz) = 2233229 bytes
+BLAKE2s (openjpeg-2.5.0.tar.gz) = 8a0fa90f83fd3bfcb890a44ceaab0b3d13a9985abc09efd42783c43d3f6a0ff6
+SHA512 (openjpeg-2.5.0.tar.gz) = 08975a2dd79f1e29fd1824249a5fbe66026640ed787b3a3aa8807c2c69f994240ff33e2132f8bf15bbc2202bef7001f98e42d487231d4eebc8e503538658049a
+Size (openjpeg-2.5.0.tar.gz) = 1867111 bytes
 SHA1 (patch-CMakeLists.txt) = 3738946db63df4d623c6ce486bd22fa4d57336e2
 SHA1 (patch-src_bin_jp2_CMakeLists.txt) = c9f709c23d6bab7a3c705640d66a00ec90ddabc7
-SHA1 (patch-src_lib_openjp2_CMakeLists.txt) = d839121ec2d008e5d3e1676d3e7ac3642bc946f7
+SHA1 (patch-src_lib_openjp2_CMakeLists.txt) = 49e66815ddbca5d01f3ff1c1b8208448e19e2a0c
 SHA1 (patch-src_lib_openjp2_opj__config__private.h.cmake.in) = fc0c170789dbe0a2ebc9dce0ef0d21aa6b2edd49
-SHA1 (patch-src_lib_openmj2_t2.c) = a4ce0faa349f1a23453ef7632fbcc3af2d045337
diff -r fd0e74540b34 -r beb87bf59ca3 graphics/openjpeg/patches/patch-src_lib_openjp2_CMakeLists.txt
--- a/graphics/openjpeg/patches/patch-src_lib_openjp2_CMakeLists.txt    Sun May 15 19:23:52 2022 +0000
+++ b/graphics/openjpeg/patches/patch-src_lib_openjp2_CMakeLists.txt    Sun May 15 19:24:10 2022 +0000
@@ -1,10 +1,10 @@
-$NetBSD: patch-src_lib_openjp2_CMakeLists.txt,v 1.2 2016/10/04 19:27:10 adam Exp $
+$NetBSD: patch-src_lib_openjp2_CMakeLists.txt,v 1.3 2022/05/15 19:24:11 adam Exp $
 
 Install man pages without building other docs.
 
---- src/lib/openjp2/CMakeLists.txt.orig        2016-09-28 18:18:16.000000000 +0000
+--- src/lib/openjp2/CMakeLists.txt.orig        2022-05-13 16:54:29.000000000 +0000
 +++ src/lib/openjp2/CMakeLists.txt
-@@ -103,12 +103,10 @@ install(FILES openjpeg.h opj_stdint.h
+@@ -127,12 +127,10 @@ install(FILES openjpeg.h opj_stdint.h
    DESTINATION ${OPENJPEG_INSTALL_INCLUDE_DIR} COMPONENT Headers
  )
  
@@ -16,4 +16,4 @@
 -endif()
  
  if(BUILD_LUTS_GENERATOR)
- # internal utility to generate t1_luts.h (part of the jp2 lib)
+ # internal utility to generate t1_luts.h and t1_ht_luts.h (part of the jp2 lib)
diff -r fd0e74540b34 -r beb87bf59ca3 graphics/openjpeg/patches/patch-src_lib_openmj2_t2.c
--- a/graphics/openjpeg/patches/patch-src_lib_openmj2_t2.c      Sun May 15 19:23:52 2022 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,40 +0,0 @@
-$NetBSD: patch-src_lib_openmj2_t2.c,v 1.2 2019/11/26 23:24:25 sevan Exp $
-
-CVE-2018-16376
-https://github.com/uclouvain/openjpeg/issues/1127
-https://nvd.nist.gov/vuln/detail/CVE-2018-16376
-
---- src/lib/openmj2/t2.c.orig  2019-04-02 12:45:15.000000000 +0000
-+++ src/lib/openmj2/t2.c
-@@ -166,6 +166,15 @@ static int t2_encode_packet(opj_tcd_tile
- 
-     /* <SOP 0xff91> */
-     if (tcp->csty & J2K_CP_CSTY_SOP) {
-+      if (length < 6) {
-+          if (p_t2_mode == FINAL_PASS) {
-+              opj_event_msg(p_manager, EVT_ERROR,
-+                              "opj_t2_encode_packet(): only %u bytes remaining in "
-+                              "output buffer. %u needed.\n",
-+                              length, 6);
-+          }
-+          return OPJ_FALSE;
-+      }
-         c[0] = 255;
-         c[1] = 145;
-         c[2] = 0;
-@@ -272,6 +281,15 @@ static int t2_encode_packet(opj_tcd_tile
- 
-     /* <EPH 0xff92> */
-     if (tcp->csty & J2K_CP_CSTY_EPH) {
-+      if (length < 2) {
-+          if (p_t2_mode == FINAL_PASS) {
-+              opj_event_msg(p_manager, EVT_ERROR,
-+                              "opj_t2_encode_packet(): only %u bytes remaining in "
-+                              "output buffer. %u needed.\n",
-+                              length, 2);
-+          }
-+          return OPJ_FALSE;
-+      }
-         c[0] = 255;
-         c[1] = 146;
-         c += 2;


Home | Main Index | Thread Index | Old Index