CVE-2020-36846 — Dependency on Vulnerable Third-Party Component in IO Compress Brotli
Severity
9.8CRITICALNVD
EPSS
0.5%
top 32.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 30
Latest updateJun 3
Description
A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages13 packages
🔴Vulnerability Details
8OSV▶
IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library in github.com/google/brotli↗2025-06-03
OSV▶
CVE-2020-36846: A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library↗2025-05-30
CVEList▶
IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library↗2025-05-30
GHSA▶
GHSA-44qx-v2f9-7rq9: A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library↗2025-05-30
📋Vendor Advisories
1Debian▶
CVE-2020-36846: libio-compress-brotli-perl - A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli ...↗2020