CVE-2026-22184

ADVISORY - nist

Summary

zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.

EPSS Score: 0.00038 (0.112)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Out-of-bounds Write

ADVISORY - redhat

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in