Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-45853

Published: 14 October 2023

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

Notes

AuthorNote
mdeslaur
since 3.2.0-1, rsync builds with the system zlib
contrib/minizip is no longer built in zlib in xenial+

Priority

Medium

Cvss 3 Severity Score

9.8

Score breakdown

Status

Package Release Status
klibc
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal Not vulnerable
(code not present)
jammy Not vulnerable
(code not present)
mantic Not vulnerable
(code not present)
noble Not vulnerable
(code not present)
trusty Not vulnerable
(code not present)
upstream Not vulnerable
(code not present)
xenial Not vulnerable
(code not present)
rsync
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not built)
focal Not vulnerable
(code not built)
jammy Not vulnerable
(uses system zlib)
lunar Not vulnerable
(uses system zlib)
mantic Not vulnerable
(uses system zlib)
noble Not vulnerable
(uses system zlib)
trusty Not vulnerable
(uses system zlib)
upstream Needs triage

xenial Not vulnerable
(code not built)
zlib
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not built)
focal Not vulnerable
(code not built)
jammy Not vulnerable
(code not built)
lunar Not vulnerable
(code not built)
mantic Not vulnerable
(code not built)
noble Not vulnerable
(code not built)
trusty Needed

upstream Needs triage

xenial Not vulnerable
(code not built)
Patches:
upstream: https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c

Severity score breakdown

Parameter Value
Base score 9.8
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H