new file mode 100644
@@ -0,0 +1,35 @@
+From 776b00ff792a3c54b65f3bd92dbe7476a5a54106 Mon Sep 17 00:00:00 2001
+From: Even Rouault <even.rouault@spatialys.com>
+Date: Sun, 5 Apr 2026 13:25:27 +0200
+Subject: [PATCH] opj_pi_initialise_encode() (write code path): avoid potential
+ integer overflow leading to insufficient memory allocation
+
+Fixes #1619
+
+CVE: CVE-2026-6192
+Upstream-Status: Backport [https://github.com/uclouvain/openjpeg/commit/839936aa33eb8899bbbd80fda02796bb65068951]
+Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
+---
+ src/lib/openjp2/pi.c | 9 ++++++---
+ 1 file changed, 6 insertions(+), 3 deletions(-)
+
+diff --git a/src/lib/openjp2/pi.c b/src/lib/openjp2/pi.c
+index 15ac3314..4abb87af 100644
+--- a/src/lib/openjp2/pi.c
++++ b/src/lib/openjp2/pi.c
+@@ -1694,9 +1694,12 @@ opj_pi_iterator_t *opj_pi_initialise_encode(const opj_image_t *p_image,
+ l_current_pi = l_pi;
+
+ /* memory allocation for include*/
+- l_current_pi->include_size = l_tcp->numlayers * l_step_l;
+- l_current_pi->include = (OPJ_INT16*) opj_calloc(l_current_pi->include_size,
+- sizeof(OPJ_INT16));
++ l_current_pi->include = NULL;
++ if (l_step_l <= UINT_MAX / l_tcp->numlayers) {
++ l_current_pi->include_size = l_tcp->numlayers * l_step_l;
++ l_current_pi->include = (OPJ_INT16*) opj_calloc(l_current_pi->include_size,
++ sizeof(OPJ_INT16));
++ }
+ if (!l_current_pi->include) {
+ opj_free(l_tmp_data);
+ opj_free(l_tmp_ptr);
@@ -8,6 +8,7 @@ DEPENDS = "libpng tiff lcms zlib"
SRC_URI = "git://github.com/uclouvain/openjpeg.git;branch=master;protocol=https \
file://0001-Do-not-ask-cmake-to-export-binaries-they-don-t-make-.patch \
file://CVE-2023-39327.patch \
+ file://CVE-2026-6192.patch \
"
SRCREV = "6c4a29b00211eb0430fa0e5e890f1ce5c80f409f"