Improper Validation of Specified Quantity in Input Affecting zlib package, versions <1.3.2-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-ZLIB-15352379
  • published26 Feb 2026
  • disclosed18 Feb 2026

Introduced: 18 Feb 2026

CVE-2026-27171  (opens in a new tab)
CWE-1284  (opens in a new tab)

How to fix?

Upgrade Chainguard zlib to version 1.3.2-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.

CVSS Base Scores

version 3.1