{"id":"ALPINE-CVE-2020-8927","details":"A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits.","modified":"2026-03-09T01:20:56.332898Z","published":"2020-09-15T10:15:12.887Z","upstream":["CVE-2020-8927"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2020-8927"}],"affected":[{"package":{"name":"brotli","ecosystem":"Alpine:v3.12","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.13","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}},{"package":{"name":"brotli","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/brotli?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.9-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.5-r0","1.0.6-r0","1.0.7-r0","1.0.7-r1","1.0.7-r2","1.0.7-r3","1.0.7-r4","1.0.7-r5"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2020-8927.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}]}