Search for packages
Package details: pkg:cargo/compu-brotli-sys@0.1.1
purl pkg:cargo/compu-brotli-sys@0.1.1
Next non-vulnerable version 1.0.9
Latest non-vulnerable version 1.0.9
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-zv7x-wujr-aaaa
Aliases:
BIT-2020-8927
BIT-brotli-2020-8927
BIT-dotnet-2020-8927
BIT-dotnet-sdk-2020-8927
CVE-2020-8927
GHSA-5v8v-66v8-mwm7
PYSEC-2020-29
RUSTSEC-2021-0131
RUSTSEC-2021-0132
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
1.0.9
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2024-10-07T18:50:11.476594+00:00 GHSA Importer Affected by VCID-zv7x-wujr-aaaa https://github.com/advisories/GHSA-5v8v-66v8-mwm7 34.0.2
2024-09-22T19:43:41.722850+00:00 GHSA Importer Affected by VCID-zv7x-wujr-aaaa https://github.com/advisories/GHSA-5v8v-66v8-mwm7 34.0.1