UBUNTU-CVE-2023-29417

Source
https://ubuntu.com/security/CVE-2023-29417
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29417.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-29417
Withdrawn
2025-06-23T15:56:50Z
Published
2023-04-06T05:15:00Z
Modified
2023-04-06T05:15:00Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

** DISPUTED ** An issue was discovered in libbzip3.a in bzip3 1.2.2. There is a bz3_decompress out-of-bounds read in certain situations where buffers passed to bzip3 do not contain enough space to be filled with decompressed data. NOTE: the vendor's perspective is that the observed behavior can only occur for a contract violation, and thus the report is invalid.

References

Affected packages

Ubuntu:24.04:LTS / bzip3

Package

Name
bzip3
Purl
pkg:deb/ubuntu/bzip3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.1-1
1.3.2-1
1.4.0-1

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29417.json"