Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SNYK: Integer Overflow or Wraparound #124

Closed
github-actions bot opened this issue Jul 22, 2024 · 0 comments
Closed

SNYK: Integer Overflow or Wraparound #124

github-actions bot opened this issue Jul 22, 2024 · 0 comments
Labels
security Security related issues

Comments

@github-actions
Copy link

Description\n## NVD Description

Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

Remediation

There is no fixed version for Debian:10 zlib.

References

@github-actions github-actions bot added the security Security related issues label Jul 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security related issues
Projects
None yet
Development

No branches or pull requests

1 participant