Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

From zlib: Reject overflows of zip header fields in minizip. #427

Merged
merged 1 commit into from
Dec 24, 2023
Merged

From zlib: Reject overflows of zip header fields in minizip. #427

merged 1 commit into from
Dec 24, 2023

Conversation

jayaddison
Copy link
Contributor

With the minizip code in the codebase updated by #420, it's fairly straightforward to cherry-pick a fixup for CVE-2023-45853.

If-and-when a release of zlib v1.3.1 (that contains minizip in the contrib directory) appears, it could be worthwhile to update to that; since that hasn't appeared yet I think it may make sense to apply this here directly.

This checks the lengths of the file name, extra field, and comment
that would be put in the zip headers, and rejects them if they are
too long. They are each limited to 65535 bytes in length by the zip
format. This also avoids possible buffer overflows if the provided
fields are too long.

(cherry picked from commit 73331a6a0481067628f065ffe87bb1d8f787d10c)
@jmcnamara jmcnamara merged commit 1dfd55b into jmcnamara:main Dec 24, 2023
40 checks passed
@jmcnamara
Copy link
Owner

Merged. Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants