Skip to content

Commit

Permalink
Re-release
Browse files Browse the repository at this point in the history
  • Loading branch information
eustas committed Aug 27, 2020
1 parent db361a0 commit e61745a
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,9 @@

# SECURITY NOTE

Please consider updating brotli to version 1.0.8 (latest).
Please consider updating brotli to version 1.0.9 (latest).

Version 1.0.8 contains a fix to "integer overflow" problem. This happens when "one-shot" decoding API is used (or input chunk for streaming API is not limited), input size (chunk size) is larger than 2GiB, and input contains uncompressed blocks. After the overflow happens, `memcpy` is invoked with a gigantic `num` value, that will likely cause the crash.
Version 1.0.9 contains a fix to "integer overflow" problem. This happens when "one-shot" decoding API is used (or input chunk for streaming API is not limited), input size (chunk size) is larger than 2GiB, and input contains uncompressed blocks. After the overflow happens, `memcpy` is invoked with a gigantic `num` value, that will likely cause the crash.

### Introduction

Expand Down
4 changes: 2 additions & 2 deletions c/common/version.h
Original file line number Diff line number Diff line change
Expand Up @@ -14,13 +14,13 @@
BrotliEncoderVersion methods. */

/* Semantic version, calculated as (MAJOR << 24) | (MINOR << 12) | PATCH */
#define BROTLI_VERSION 0x1000008
#define BROTLI_VERSION 0x1000009

/* This macro is used by build system to produce Libtool-friendly soname. See
https://www.gnu.org/software/libtool/manual/html_node/Libtool-versioning.html
*/

/* ABI version, calculated as (CURRENT << 24) | (REVISION << 12) | AGE */
#define BROTLI_ABI_VERSION 0x1008000
#define BROTLI_ABI_VERSION 0x1009000

#endif /* BROTLI_COMMON_VERSION_H_ */

0 comments on commit e61745a

Please sign in to comment.