A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Microsoft Subscribe
.net Core Subscribe
Powershell Subscribe
Visual Studio 2019 Subscribe
Visual Studio 2022 Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe
Rhel Dotnet Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2476-1 brotli security update
Debian DSA Debian DSA DSA-4801-1 brotli security update
EUVD EUVD EUVD-2020-0057 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.
Github GHSA Github GHSA GHSA-5v8v-66v8-mwm7 Integer overflow in the bundled Brotli C library
Ubuntu USN Ubuntu USN USN-4568-1 Brotli vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html cve-icon cve-icon
https://github.com/google/brotli/releases/tag/v1.0.9 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-8927 cve-icon
https://usn.ubuntu.com/4568-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-8927 cve-icon
https://www.debian.org/security/2020/dsa-4801 cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-04T10:12:11.066Z

Reserved: 2020-02-12T00:00:00

Link: CVE-2020-8927

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-15T10:15:12.887

Modified: 2024-11-21T05:39:41.370

Link: CVE-2020-8927

cve-icon Redhat

Severity : Important

Publid Date: 2020-08-27T00:00:00Z

Links: CVE-2020-8927 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses