commit | 2d62f7406f0cce2d250d25f1095a0afdc041310e | [log] [tgz] |
---|---|---|
author | John Bowler <jbowler@acm.org> | Wed Aug 19 12:56:48 2015 -0500 |
committer | Glenn Randers-Pehrson <glennrp at users.sourceforge.net> | Wed Aug 19 12:56:48 2015 -0500 |
tree | 3edec7b2d3779b0159426fda6d22f615e213972c | |
parent | 6530e3898d8282f3f13c37f4ebae7193d8e52b07 [diff] |
[libpng16] Fixed the recently reported 1's complement security issue by replacing the value that is illegal in the PNG spec, in both signed and unsigned values, with 0. Illegal unsigned values (anything greater than or equal to 0x80000000) can still pass through, but since these are not illegal in ANSI-C (unlike 0x80000000 in the signed case) the checking that occurs later can catch them (John Bowler).