A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a one-shot decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the streaming API as opposed to the one-shot API, and impose chunk size limits.
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Brotli | * | 1.0.8 (excluding) | |
.NET Core on Red Hat Enterprise Linux | RedHat | rh-dotnet31-dotnet-0:3.1.417-1.el7_9 | * |
.NET Core on Red Hat Enterprise Linux | RedHat | rh-dotnet50-dotnet-0:5.0.212-1.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | brotli-0:1.0.6-3.el8 | * |
Red Hat Enterprise Linux 8 | RedHat | dotnet3.1-0:3.1.417-1.el8_5 | * |
Red Hat Enterprise Linux 8 | RedHat | dotnet5.0-0:5.0.212-1.el8_5 | * |
Red Hat Enterprise Linux 8 | RedHat | brotli-0:1.0.6-3.el8 | * |
Brotli | Ubuntu | bionic | * |
Brotli | Ubuntu | devel | * |
Brotli | Ubuntu | focal | * |
Brotli | Ubuntu | trusty | * |
Brotli | Ubuntu | upstream | * |
Brotli | Ubuntu | xenial | * |