CVE-2020-8927

MEDIUM

Google Brotli < 1.0.8 - Buffer Overflow

Title source: rule
STIX 2.1

Description

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

References (14)

Scores

CVSS v3 5.3
EPSS 0.0031
EPSS Percentile 54.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Details

CWE
CWE-130 CWE-120
Status published
Products (50)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
crates.io/compu-brotli-sys 0 - 1.0.9crates.io
debian/debian_linux 9.0
debian/debian_linux 10.0
fedoraproject/fedora 31
fedoraproject/fedora 32
fedoraproject/fedora 33
fedoraproject/fedora 34
... and 40 more
Published Sep 15, 2020
Tracked Since Feb 18, 2026