A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. Reference: https://github.com/google/brotli/releases/tag/v1.0.9
Created brotli tracking bugs for this issue: Affects: epel-7 [bug 1879230] Affects: fedora-all [bug 1879226] Created golang-github-andybalholm-brotli tracking bugs for this issue: Affects: fedora-all [bug 1879228] Created mingw-brotli tracking bugs for this issue: Affects: fedora-all [bug 1879227]
Upstream commit: https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6
Mitigation: This flaw can be mitigated by using the Streaming API instead of the One-Shot API and imposing chunk size limitations.
Anyone mind if I update Brotli to 1.0.9 in Fedora 32? because I'm not sure how to backport this to 1.0.7.
I don't think anyone would mind a security update. Not sure why the Go-sig is CCed on this, for golang-github-andybalholm-brotli?
In reply to comment #10: > Not sure why the Go-sig is CCed on this, for > golang-github-andybalholm-brotli? Yes. Go-sig is on the initialcc list for the component.
(In reply to pouar from comment #9) > Anyone mind if I update Brotli to 1.0.9 in Fedora 32? because I'm not sure > how to backport this to 1.0.7. As far as I experienced it's not backportable at all if not using the decoder sources from 1.0.8 Be aware that starting from 1.0.8 all Java and Go related files and others are not part of the tarball anymore. I don't know if anything in F32 relies on those.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1702 https://access.redhat.com/errata/RHSA-2021:1702
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8927
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0830 https://access.redhat.com/errata/RHSA-2022:0830
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0827 https://access.redhat.com/errata/RHSA-2022:0827
This issue has been addressed in the following products: .NET Core on Red Hat Enterprise Linux Via RHSA-2022:0829 https://access.redhat.com/errata/RHSA-2022:0829
This issue has been addressed in the following products: .NET Core on Red Hat Enterprise Linux Via RHSA-2022:0828 https://access.redhat.com/errata/RHSA-2022:0828