summaryrefslogtreecommitdiffstats
path: root/thirdparty/zlib/infback.c
diff options
context:
space:
mode:
authorRémi Verschelde <rverschelde@gmail.com>2022-03-31 14:14:05 +0200
committerRémi Verschelde <rverschelde@gmail.com>2022-03-31 15:19:11 +0200
commit420d0d50bcdc47c793157c2f1e143136eafa6500 (patch)
tree375213d3f3b14f97cb4dd8c8d9ccb4e54ca80105 /thirdparty/zlib/infback.c
parenta647fb3e623c8e5c14427c2631ee61f132951709 (diff)
downloadredot-engine-420d0d50bcdc47c793157c2f1e143136eafa6500.tar.gz
zlib/minizip: Update to version 1.2.12
Security update, fixes CVE-2018-25032 in zlib. Preliminary assessment doesn't show Godot as affected since we don't seem to call `deflate` with the problematic parameters, but the extent of the vulnerability is not fully clear upstream yet.
Diffstat (limited to 'thirdparty/zlib/infback.c')
-rw-r--r--thirdparty/zlib/infback.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/thirdparty/zlib/infback.c b/thirdparty/zlib/infback.c
index 59679ecbfc..a390c58e81 100644
--- a/thirdparty/zlib/infback.c
+++ b/thirdparty/zlib/infback.c
@@ -1,5 +1,5 @@
/* infback.c -- inflate using a call-back interface
- * Copyright (C) 1995-2016 Mark Adler
+ * Copyright (C) 1995-2022 Mark Adler
* For conditions of distribution and use, see copyright notice in zlib.h
*/
@@ -477,6 +477,7 @@ void FAR *out_desc;
}
Tracev((stderr, "inflate: codes ok\n"));
state->mode = LEN;
+ /* fallthrough */
case LEN:
/* use inflate_fast() if we have enough input and output */