You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927 - Medium Severity Vulnerability
Vulnerable Libraries - cloudflared2021.1.5, cloudflared2021.1.5, cloudflared2021.1.5, cloudflared2021.1.5, cloudflared2021.1.5, cloudflared2021.1.5
Vulnerability Details
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Publish Date: 2020-09-15
URL: CVE-2020-8927
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: google/brotli@223d80c
Release Date: 2020-07-21
Fix Resolution: 1.0.8
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: