Search for packages
| purl | pkg:pypi/brotli@1.0.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-69ua-s6h2-3uhc
Aliases: BIT-brotli-2020-8927 BIT-dotnet-2020-8927 BIT-dotnet-sdk-2020-8927 BIT-powershell-2020-8927 CVE-2020-36846 CVE-2020-8927 GHSA-5v8v-66v8-mwm7 GO-2025-3726 PYSEC-2020-29 RUSTSEC-2021-0131 RUSTSEC-2021-0132 |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
Affected by 1 other vulnerability. |
|
VCID-dc1m-rt7j-w3af
Aliases: CVE-2025-6176 GHSA-2qfp-q593-8484 |
Scrapy is vulnerable to a denial of service (DoS) attack due to flaws in brotli decompression implementation Scrapy versions up to 2.13.3 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression. Mitigation for this vulnerability needs security enhancement added in brotli v1.2.0. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||