CVE-2026-3381
Published: March 7, 2026Last modified: March 11, 2026
Description
Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib. Compress::Raw::Zlib includes a copy of the zlib library. Compress::Raw::Zlib version 2.220 includes zlib 1.3.2, which addresses findings fron the 7ASecurity audit of zlib. The includes fixs for CVE-2026-27171.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 9.8 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Notes
Perl is forced to be built with system zlib so a bundled insecure version of zlib is never used.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | perl | Not affected (5.36.0-r0) |
| 25 LTS | perl | Not affected (5.40.2-r0) | |
| Stream | perl | Not affected (5.36.0-r0) | |
| Hardened Containers | 23 LTS | perl | Not affected (5.36.0-r0) |
| 25 LTS | perl | Not affected (5.40.2-r0) | |
| Stream | perl | Not affected (5.36.0-r0) |
References
- https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/
- https://github.com/madler/zlib
- https://github.com/madler/zlib/releases/tag/v1.3.2
- https://github.com/pmqs/Compress-Raw-Zlib/issues/41
- https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes
- https://www.cve.org/CVERecord?id=CVE-2026-27171
- https://www.zlib.net/