diff options
author | Robin Watts <robin.watts@artifex.com> | 2012-12-14 11:37:15 +0000 |
---|---|---|
committer | Robin Watts <robin.watts@artifex.com> | 2012-12-14 12:51:40 +0000 |
commit | 25ee437eb784a8eb241b9463e79dad429b60e933 (patch) | |
tree | bb0b66f88008e73b8b1f40f3ed36763d06a2b5f9 /android/res/drawable-mdpi | |
parent | df835b0f23b4976b453d3bdd63c60804b2376c16 (diff) | |
download | mupdf-25ee437eb784a8eb241b9463e79dad429b60e933.tar.xz |
Bug 693503: Fix SEGV/memory problems in AES.
If an illegal keysize is passed into the AES crypt filter, we
currently exit without setting up the AES context. This causes
us to fail in all manner of ways later on.
We now return failure and callers throw an exception.
This appears to solve all the SEGVs and memory exceptions found in
crypt_aes by Mateusz "j00ru" Jurczyk and Gynvael Coldwind of the
Google Security Team using Address Sanitizer. Many thanks!
Diffstat (limited to 'android/res/drawable-mdpi')
0 files changed, 0 insertions, 0 deletions