Permalink
4 comments
on commit
sign in to comment.
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
fetch map after DGifGetImageDesc()
Earlier refactoring broke GIF map fetch.
- Loading branch information
Showing
1 changed file
with
2 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ce684ddThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
how to use itt men plz tell me , or it can use in metasploit..?
ce684ddThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jcupitt Is it correct that the issue (which got assigned CVE-2019-17534, cf https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16796) only ever was present in a non-tagged version, introduced with the refactoring around 5749d60...f6cc2a9? So no released/tagged version was ever affected?
ce684ddThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, I think that's correct.
This commit introduced the bug on 26 August to git master:
25e4577#diff-0ecc7d6a66fc223548212a9bac2745c9
oss-fuzz found the bug that night, and this commit we are commenting on fixed it on 27 August. It was never formally released.
The CVE was created automatically. I don't think anyone was affected.
ce684ddThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.