Skip to content

Commit fa8b7eb

Browse files
committed
Merge branch 'advisory-fix-1'
2 parents 3ea16d4 + 26c5686 commit fa8b7eb

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2026-27820: Buffer overflow vulnerability in Zlib::GzipReader"
4+
author: "hsbt"
5+
translator:
6+
date: 2026-03-05 09:00:00 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
A buffer overflow vulnerability exists in `Zlib::GzipReader`. This vulnerability has been assigned the CVE identifier [CVE-2026-27820](https://www.cve.org/CVERecord?id=CVE-2026-27820). We recommend upgrading the zlib gem.
12+
13+
### Details
14+
15+
The `zstream_buffer_ungets` function prepends caller-provided bytes ahead of previously produced output but fails to guarantee the backing Ruby string has enough capacity before the memmove shifts the existing data. This can lead to memory corruption when the buffer length exceeds capacity.
16+
17+
### Recommended action
18+
19+
We recommend to update the `zlib` gem to version 3.2.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
20+
21+
* For Ruby 3.2 users: Update to zlib 3.0.1
22+
* For Ruby 3.3 users: Update to zlib 3.1.2
23+
24+
You can use gem update zlib to update it. If you are using bundler, please add `gem "zlib", ">= 3.2.3"` to your Gemfile.
25+
26+
### Affected versions
27+
28+
zlib gem 3.2.2 or lower
29+
30+
### Credits
31+
32+
Thanks to [calysteon](https://hackerone.com/calysteon) for reporting this issue. Also thanks to [nobu](https://github.com/nobu) for creating the patch.
33+
34+
## History
35+
36+
* Originally published at 2026-03-05 09:00:00 (UTC)

0 commit comments

Comments
 (0)