Bugs fixes in "brotli"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
CVE | CVE-2020-8927 | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression r | 2020-10-05 |
Launchpad | 1795077 | Backport brotli 1.0.3 to Ubuntu 16.04 LTS | 2018-10-17 |
Launchpad | 1795077 | Backport brotli 1.0.3 to Ubuntu 16.04 LTS | 2018-10-17 |
Launchpad | 1795077 | Backport brotli 1.0.3 to Ubuntu 16.04 LTS | 2018-10-10 |
Launchpad | 1795077 | Backport brotli 1.0.3 to Ubuntu 16.04 LTS | 2018-10-05 |
CVE | CVE-2016-1968 | Integer underflow in Brotli, as used in Mozilla Firefox before 45.0, allows remote attackers to execute arbitrary code or cause a denial of service ( | 2018-02-06 |
CVE | CVE-2016-1624 | Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote att | 2018-02-06 |
Launchpad | 1737364 | 16.04: Fix CVE-2016-1968 and CVE-2016-1624 for brotli | 2018-02-06 |
CVE | CVE-2016-1968 | Integer underflow in Brotli, as used in Mozilla Firefox before 45.0, allows remote attackers to execute arbitrary code or cause a denial of service ( | 2018-02-05 |
About
-
Send Feedback to @ubuntu_updates