Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 917762 (CVE-2023-48106, CVE-2023-48107) - <sys-libs/minizip-ng-4.0.3: Buffer Overflow vulnerability
Summary: <sys-libs/minizip-ng-4.0.3: Buffer Overflow vulnerability
Status: IN_PROGRESS
Alias: CVE-2023-48106, CVE-2023-48107
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://github.com/zlib-ng/minizip-ng...
Whiteboard: ~2 [noglsa cleanup]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-22 19:19 UTC by Jarkko Suominen
Modified: 2023-11-25 17:44 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jarkko Suominen 2023-11-22 19:19:08 UTC
Fixed in 4.0.3 which is the latest (unstable) version in tree. Vulnerability filed for kuroneko. Package maintainers not added as CC at least initially since there is nothing to do if cleanup isn't necessary. 

https://www.cve.org/CVERecord?id=CVE-2023-48106
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file.


https://github.com/zlib-ng/minizip-ng/issues/740#issuecomment-1807233928
The issue with this one is a filename of the form x/../fred. The code in mz_path_resolve tries to remove the .. by walking backwards to the preceding /. It wants to end up with the filename fred, but in this case there isn't a preceeding /, so it walks past the start of the buffer.
Comment 1 Christopher Fore 2023-11-25 17:44:18 UTC
CVE-2023-48107 (https://github.com/zlib-ng/minizip-ng/issues/739):

Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file.