Description
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Published: 2020-09-15
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2476-1 brotli security update
Debian DSA Debian DSA DSA-4801-1 brotli security update
EUVD EUVD EUVD-2020-0057 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.
Github GHSA Github GHSA GHSA-5v8v-66v8-mwm7 Integer overflow in the bundled Brotli C library
Ubuntu USN Ubuntu USN USN-4568-1 Brotli vulnerability
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html cve-icon cve-icon
https://github.com/google/brotli/releases/tag/v1.0.9 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-8927 cve-icon
https://usn.ubuntu.com/4568-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-8927 cve-icon
https://www.debian.org/security/2020/dsa-4801 cve-icon cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Google Brotli
Microsoft .net .net Core Powershell Visual Studio 2019 Visual Studio 2022
Opensuse Leap
Redhat Enterprise Linux Rhel Dotnet
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-04T10:12:11.066Z

Reserved: 2020-02-12T00:00:00.000Z

Link: CVE-2020-8927

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-15T10:15:12.887

Modified: 2024-11-21T05:39:41.370

Link: CVE-2020-8927

cve-icon Redhat

Severity : Important

Publid Date: 2020-08-27T00:00:00Z

Links: CVE-2020-8927 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses