refresh patches
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
From 3dacd15edbed579d6966a884ce04aab95f1dfdeb Mon Sep 17 00:00:00 2001
|
||||
From 0df7cc91ac0a3e84f2e0aeec1a71cd737de41b8a Mon Sep 17 00:00:00 2001
|
||||
From: Kees Cook <keescook@chromium.org>
|
||||
Date: Mon, 22 Jan 2024 16:27:56 -0800
|
||||
Subject: lib: zstd: Refactor intentional wrap-around test
|
||||
@@ -38,7 +38,7 @@ Signed-off-by: Kees Cook <keescook@chromium.org>
|
||||
|
||||
--- a/lib/zstd/decompress/zstd_decompress.c
|
||||
+++ b/lib/zstd/decompress/zstd_decompress.c
|
||||
@@ -618,7 +618,7 @@ size_t ZSTD_readSkippableFrame(void* dst
|
||||
@@ -620,7 +620,7 @@ size_t ZSTD_readSkippableFrame(void* dst
|
||||
* @return : decompressed size of the frames contained */
|
||||
unsigned long long ZSTD_findDecompressedSize(const void* src, size_t srcSize)
|
||||
{
|
||||
@@ -47,7 +47,7 @@ Signed-off-by: Kees Cook <keescook@chromium.org>
|
||||
|
||||
while (srcSize >= ZSTD_startingInputLength(ZSTD_f_zstd1)) {
|
||||
U32 const magicNumber = MEM_readLE32(src);
|
||||
@@ -636,7 +636,7 @@ unsigned long long ZSTD_findDecompressed
|
||||
@@ -638,7 +638,7 @@ unsigned long long ZSTD_findDecompressed
|
||||
{ unsigned long long const fcs = ZSTD_getFrameContentSize(src, srcSize);
|
||||
if (fcs >= ZSTD_CONTENTSIZE_ERROR) return fcs;
|
||||
|
||||
|
Reference in New Issue
Block a user