Search for packages
| purl | pkg:deb/debian/brotli@1.0.7-2%2Bdeb10u1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3j9t-6z8z-zbct
Aliases: CVE-2020-8927 GHSA-5v8v-66v8-mwm7 PYSEC-2020-29 |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3j9t-6z8z-zbct | A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
CVE-2020-8927
GHSA-5v8v-66v8-mwm7 PYSEC-2020-29 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-08-01T19:18:15.014500+00:00 | Debian Oval Importer | Affected by | VCID-3j9t-6z8z-zbct | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 37.0.0 |
| 2025-08-01T11:31:16.918051+00:00 | Debian Oval Importer | Fixing | VCID-3j9t-6z8z-zbct | https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 | 37.0.0 |