A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.  Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
History

Fri, 30 May 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 May 2025 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 30 May 2025 01:15:00 +0000

Type Values Removed Values Added
Description A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.  Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Title IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library
Weaknesses CWE-1395
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2025-05-30T00:50:28.582Z

Updated: 2025-05-30T22:01:41.998Z

Reserved: 2025-05-28T01:44:05.054Z

Link: CVE-2020-36846

cve-icon Vulnrichment

Updated: 2025-05-30T14:40:50.444Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-30T01:15:20.950

Modified: 2025-05-30T22:15:20.233

Link: CVE-2020-36846

cve-icon Redhat

No data.