diff options
author | Rémi Verschelde <rverschelde@gmail.com> | 2022-03-31 14:14:05 +0200 |
---|---|---|
committer | Rémi Verschelde <rverschelde@gmail.com> | 2022-03-31 15:19:11 +0200 |
commit | 420d0d50bcdc47c793157c2f1e143136eafa6500 (patch) | |
tree | 375213d3f3b14f97cb4dd8c8d9ccb4e54ca80105 /thirdparty/zlib/infback.c | |
parent | a647fb3e623c8e5c14427c2631ee61f132951709 (diff) | |
download | redot-engine-420d0d50bcdc47c793157c2f1e143136eafa6500.tar.gz |
zlib/minizip: Update to version 1.2.12
Security update, fixes CVE-2018-25032 in zlib.
Preliminary assessment doesn't show Godot as affected since we don't
seem to call `deflate` with the problematic parameters, but the extent
of the vulnerability is not fully clear upstream yet.
Diffstat (limited to 'thirdparty/zlib/infback.c')
-rw-r--r-- | thirdparty/zlib/infback.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/thirdparty/zlib/infback.c b/thirdparty/zlib/infback.c index 59679ecbfc..a390c58e81 100644 --- a/thirdparty/zlib/infback.c +++ b/thirdparty/zlib/infback.c @@ -1,5 +1,5 @@ /* infback.c -- inflate using a call-back interface - * Copyright (C) 1995-2016 Mark Adler + * Copyright (C) 1995-2022 Mark Adler * For conditions of distribution and use, see copyright notice in zlib.h */ @@ -477,6 +477,7 @@ void FAR *out_desc; } Tracev((stderr, "inflate: codes ok\n")); state->mode = LEN; + /* fallthrough */ case LEN: /* use inflate_fast() if we have enough input and output */ |