https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109428

chluo at cse dot cuhk.edu.hk changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|DUPLICATE                   |---
             Status|RESOLVED                    |UNCONFIRMED

--- Comment #2 from chluo at cse dot cuhk.edu.hk ---
Thank you for your quick update! The commit might just list one approach to
exploit the bug in **inflate()** function. I am not sure if there are other
ways to reach there but the buggy code is definitely a hazard. 
Anyway, it is good to align with the patched version of upstream code zlib. It
would not take effort since the patch is very easy to apply and verify.

Reply via email to