USN-4568-1

Source
https://ubuntu.com/security/notices/USN-4568-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-4568-1.json
Related
Published
2020-10-05T12:05:18.309094Z
Modified
2020-10-05T12:05:18.309094Z
Details

It was discovered that Brotli incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash.

References

Affected packages

Ubuntu:18.04:LTS / brotli

Package

Name
brotli

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.0.3-1ubuntu1.3

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libbrotli1": "1.0.3-1ubuntu1.3",
            "libbrotli-dev": "1.0.3-1ubuntu1.3",
            "brotli": "1.0.3-1ubuntu1.3",
            "python3-brotli": "1.0.3-1ubuntu1.3",
            "python-brotli": "1.0.3-1ubuntu1.3"
        }
    ]
}

Ubuntu:20.04:LTS / brotli

Package

Name
brotli

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.0.7-6ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libbrotli1": "1.0.7-6ubuntu0.1",
            "libbrotli-dev": "1.0.7-6ubuntu0.1",
            "brotli": "1.0.7-6ubuntu0.1",
            "python3-brotli": "1.0.7-6ubuntu0.1"
        }
    ]
}

Ubuntu:16.04:LTS / brotli

Package

Name
brotli

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.0.3-1ubuntu1~16.04.2

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libbrotli1": "1.0.3-1ubuntu1~16.04.2",
            "libbrotli-dev": "1.0.3-1ubuntu1~16.04.2",
            "brotli": "1.0.3-1ubuntu1~16.04.2",
            "python3-brotli": "1.0.3-1ubuntu1~16.04.2",
            "python-brotli": "1.0.3-1ubuntu1~16.04.2"
        }
    ]
}