brotli (1.0.3-1ubuntu1~16.04.2) xenial-security; urgency=medium
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2020-8927.patch: fix potential overflow when
input chunk is >2GiB in c/common/*, c/dec/*, c/enc/*,
research/brotli_decoder.c, research/draw_histogram.cc,
scripts/.bintray.json, scripts/source.lst, setup.py.
- CVE-2020-8927
Date: 2020-09-29 16:35:15.164370+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/brotli/1.0.3-1ubuntu1~16.04.2
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes