diff options
author | Cosmin Truta <ctruta@gmail.com> | 2019-02-03 22:40:56 -0500 |
---|---|---|
committer | Thomas Jarosch <thomas.jarosch@intra2net.com> | 2019-05-14 19:59:32 +0200 |
commit | 76f2acfde474f0116143b558412b8578b4d66737 (patch) | |
tree | 94148d360551de008f999e7f1ba10027ad354322 /ltmain.sh | |
parent | 6e267ffb6f981d1abd9913c5d0d9856771254fdb (diff) | |
download | android_external_libpng-76f2acfde474f0116143b558412b8578b4d66737.tar.gz android_external_libpng-76f2acfde474f0116143b558412b8578b4d66737.tar.bz2 android_external_libpng-76f2acfde474f0116143b558412b8578b4d66737.zip |
Call png_image_free_function without guarding it with png_safe_execute
png_image_free_function (or any other destructor) should never fail.
Destructors need not and must not be executed under png_safe_execute.
Reference: CVE-2019-7317, use-after-free in png_image_free
Upstream commit:
https://github.com/glennrp/libpng/commit/9c0d5c77bf5bf2d7c1e11f388de40a70e0191550
https://github.com/glennrp/libpng/issues/275
Change-Id: I1f8f39bb80e8be17aaa565c8efc28a93d56b0b12
Diffstat (limited to 'ltmain.sh')
0 files changed, 0 insertions, 0 deletions