Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/brotli@1.0.6-3?arch=el8
purl pkg:rpm/redhat/brotli@1.0.6-3?arch=el8
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.4
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-69ua-s6h2-3uhc
Aliases:
BIT-brotli-2020-8927
BIT-dotnet-2020-8927
BIT-dotnet-sdk-2020-8927
BIT-powershell-2020-8927
CVE-2020-36846
CVE-2020-8927
GHSA-5v8v-66v8-mwm7
GO-2025-3726
PYSEC-2020-29
RUSTSEC-2021-0131
RUSTSEC-2021-0132
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:04:55.241821+00:00 RedHat Importer Affected by VCID-69ua-s6h2-3uhc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8927.json 38.0.0