CVE-2026-27820: Buffer Overflow in Zlib::GzipReader ungetc via large input leads to memory corruption
Details
A buffer overflow vulnerability exists in Zlib::GzipReader.
The zstream_buffer_ungets function prepends caller-provided bytes ahead of previously produced output but fails to guarantee the backing Ruby string has enough capacity before the memmove shifts the existing data. This can lead to memory corruption when the buffer length exceeds capacity.
Recommended action
We recommend to update the zlib gem to version 3.2.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
- For Ruby 3.2 users: Update to zlib 3.0.1
- For Ruby 3.3 users: Update to zlib 3.1.2
You can use gem update zlib to update it. If you are using bundler, please add gem "zlib", ">= 3.2.3" to your Gemfile.
Affected versions
zlib gem 3.2.2 or lower
Credits
References
References
- github.com/advisories/GHSA-g857-hhfv-j68w
- github.com/ruby/zlib
- github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w
- github.com/rubysec/ruby-advisory-db/blob/master/gems/zlib/CVE-2026-27820.yml
- hackerone.com/reports/3467067
- nvd.nist.gov/vuln/detail/CVE-2026-27820
- www.ruby-lang.org/en/news/2026/03/05/buffer-overflow-zlib-cve-2026-27820
Code Behaviors & Features
Detect and mitigate CVE-2026-27820 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →