A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Metrics
Affected Vendors & Products
References
History
Fri, 30 May 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 30 May 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 30 May 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | |
Title | IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library | |
Weaknesses | CWE-1395 | |
References |
|
|

Status: PUBLISHED
Assigner: CPANSec
Published: 2025-05-30T00:50:28.582Z
Updated: 2025-05-30T22:01:41.998Z
Reserved: 2025-05-28T01:44:05.054Z
Link: CVE-2020-36846

Updated: 2025-05-30T14:40:50.444Z

Status : Awaiting Analysis
Published: 2025-05-30T01:15:20.950
Modified: 2025-05-30T22:15:20.233
Link: CVE-2020-36846

No data.