diff options
author | Evgenii Kliuchnikov <eustas.ru@gmail.com> | 2020-08-27 16:12:55 +0200 |
---|---|---|
committer | Evgenii Kliuchnikov <eustas.ru@gmail.com> | 2020-08-27 16:12:55 +0200 |
commit | e61745a6b7add50d380cfd7d3883dd6c62fc2c71 (patch) | |
tree | db1cc99c21a5b6e539c41fa7b5b50b78d22f7583 /README.md | |
parent | db361a0bb901d6a71c7cbf1370d97b3703482e3b (diff) | |
download | brotli-e61745a6b7add50d380cfd7d3883dd6c62fc2c71.zip brotli-e61745a6b7add50d380cfd7d3883dd6c62fc2c71.tar.gz brotli-e61745a6b7add50d380cfd7d3883dd6c62fc2c71.tar.bz2 |
Re-releasev1.0.9
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -2,9 +2,9 @@ # SECURITY NOTE -Please consider updating brotli to version 1.0.8 (latest). +Please consider updating brotli to version 1.0.9 (latest). -Version 1.0.8 contains a fix to "integer overflow" problem. This happens when "one-shot" decoding API is used (or input chunk for streaming API is not limited), input size (chunk size) is larger than 2GiB, and input contains uncompressed blocks. After the overflow happens, `memcpy` is invoked with a gigantic `num` value, that will likely cause the crash. +Version 1.0.9 contains a fix to "integer overflow" problem. This happens when "one-shot" decoding API is used (or input chunk for streaming API is not limited), input size (chunk size) is larger than 2GiB, and input contains uncompressed blocks. After the overflow happens, `memcpy` is invoked with a gigantic `num` value, that will likely cause the crash. ### Introduction |