Skip to content

Commit b027fd4

Browse files
committed
Add security advisory for CVE-2026-27820
1 parent 6f726e0 commit b027fd4

1 file changed

Lines changed: 36 additions & 0 deletions

File tree

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2026-27820: DoS vulnerability in REXML"
4+
author: "hsbt"
5+
translator:
6+
date: 2026-03-04 09:00:00 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
A buffer overflow vulnerability exists in `Zlib::GzipReader`. This vulnerability has been assigned the CVE identifier [CVE-2026-27820](https://www.cve.org/CVERecord?id=CVE-2026-27820). We recommend upgrading the zlib gem.
12+
13+
### Details
14+
15+
The `zstream_buffer_ungets` function prepends caller-provided bytes ahead of previously produced output but fails to guarantee the backing Ruby string has enough capacity before the memmove shifts the existing data. This can lead to memory corruption when the buffer length exceeds capacity.
16+
17+
### Recommended action
18+
19+
We recommend to update the `zlib` gem to version 3.2.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
20+
21+
* For Ruby 3.2 users: Update to zlib 3.0.1
22+
* For Ruby 3.3 users: Update to zlib 3.1.2
23+
24+
You can use gem update zlib to update it. If you are using bundler, please add `gem "zlib", ">= 3.2.3"` to your Gemfile.
25+
26+
### Affected versions
27+
28+
zlib gem 3.2.2 or lower
29+
30+
### Credits
31+
32+
[calysteon](https://hackerone.com/calysteon)
33+
34+
## History
35+
36+
* Originally published at 2026-03-04 09:00:00 (UTC)

0 commit comments

Comments
 (0)