brotli (1.0.3-1ubuntu1~16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2020-8927.patch: fix potential overflow when
      input chunk is >2GiB in c/common/*, c/dec/*, c/enc/*,
      research/brotli_decoder.c, research/draw_histogram.cc,
      scripts/.bintray.json, scripts/source.lst, setup.py.
    - CVE-2020-8927

Date: 2020-09-29 16:35:15.164370+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot 
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/brotli/1.0.3-1ubuntu1~16.04.2
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to