[ALSA-2021:1702] Moderate: brotli security update
Type:
security
Severity:
moderate
Release date:
2021-11-12
Description:
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 brotli-1.0.6-3.el8.aarch64.rpm 4f1c53745875ba074eca370037ab222a48c77afe8936cf1df849a1f061f84b20
aarch64 python3-brotli-1.0.6-3.el8.aarch64.rpm 612a49ef38c968589b593304d1d1ae282b68ede40ec6be9204a242db9b1dffb2
aarch64 brotli-devel-1.0.6-3.el8.aarch64.rpm 91f015d4debec8b39d7b3da09412274dd6ddb226518590d7947d63b21ed935d8
i686 brotli-devel-1.0.6-3.el8.i686.rpm c4b74a9a3945a7fa89815f13021dceb7a7bc5426a09e113655ebc1a24e6b9222
ppc64le brotli-1.0.6-3.el8.ppc64le.rpm 6d8a59fb661bdfad0a5fcb04b7b1a61e83409b73c54b40676ec5e1fe12a1fa5a
ppc64le brotli-devel-1.0.6-3.el8.ppc64le.rpm 745ae02f9aa4181baa9bacdc5ff73ceaaec0c21b7e589874d5cc3ed4dad199e8
ppc64le python3-brotli-1.0.6-3.el8.ppc64le.rpm b4b4587359c3a016b0dfe79fe60b279aeb1e32ea19fdb0ebcfc0455fdc1b125f
x86_64 brotli-devel-1.0.6-3.el8.x86_64.rpm 4f9047fc196889006f38e5dccdf91b1dcf7bad8ba7089729ef4bb7d9e68eec4a
x86_64 brotli-1.0.6-3.el8.x86_64.rpm dcec78f8c3c484906b4121656938988e326d3aecb82239370575451a278e3620
x86_64 python3-brotli-1.0.6-3.el8.x86_64.rpm f9119c5c7e8a5ad74b6eae5f001018a14868ab968ed3d38ceb76f62b68a63da0
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.