Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-8927

Published: 15 September 2020

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Priority

Medium

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
brotli
Launchpad, Ubuntu, Debian
bionic
Released (1.0.3-1ubuntu1.3)
focal
Released (1.0.7-6ubuntu0.1)
trusty Does not exist

upstream
Released (1.0.9-1)
xenial
Released (1.0.3-1ubuntu1~16.04.2)
Patches:
upstream: https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact Low
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L