From e93d5341d87c54713a9632c8823288fa901a3b78 Mon Sep 17 00:00:00 2001 From: Bo Xu Date: Fri, 3 Oct 2014 12:29:54 -0700 Subject: check pointer overflow in t2.c BUG=413375 R=tsepez@chromium.org Review URL: https://codereview.chromium.org/624023003 --- core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/jp2.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/jp2.c') diff --git a/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/jp2.c b/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/jp2.c index dd188c1ba7..683d0415cf 100644 --- a/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/jp2.c +++ b/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/jp2.c @@ -1280,7 +1280,7 @@ OPJ_BOOL opj_jp2_read_colr( opj_jp2_t *jp2, } else if (jp2->meth > 2) { - /* ISO/IEC 15444-1:2004 (E), Table I.9 ­ Legal METH values: + /* ISO/IEC 15444-1:2004 (E), Table I.9 Legal METH values: conforming JP2 reader shall ignore the entire Colour Specification box.*/ opj_event_msg(p_manager, EVT_INFO, "COLR BOX meth value is not a regular value (%d), " "so we will ignore the entire Colour Specification box. \n", jp2->meth); -- cgit v1.2.3