UBUNTU-CVE-2023-7158

Source
https://ubuntu.com/security/CVE-2023-7158
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7158.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-7158
Upstream
Published
2023-12-29T07:15:00Z
Modified
2026-01-20T19:07:00.872556Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.

References

Affected packages

Ubuntu:18.04:LTS / giac

Package

Name
giac
Purl
pkg:deb/ubuntu/giac@1.2.3.57+dfsg1-2build3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.2.3.57+dfsg1-2build1
1.2.3.57+dfsg1-2build2
1.2.3.57+dfsg1-2build3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libgiac-dev",
            "binary_version": "1.2.3.57+dfsg1-2build3"
        },
        {
            "binary_name": "libgiac0",
            "binary_version": "1.2.3.57+dfsg1-2build3"
        },
        {
            "binary_name": "xcas",
            "binary_version": "1.2.3.57+dfsg1-2build3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7158.json"

Ubuntu:20.04:LTS / giac

Package

Name
giac
Purl
pkg:deb/ubuntu/giac@1.5.0.85+dfsg1-3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.4.9.69+dfsg1-2build1
1.5.0.85+dfsg1-2
1.5.0.85+dfsg1-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libgiac-dev",
            "binary_version": "1.5.0.85+dfsg1-3"
        },
        {
            "binary_name": "libgiac0",
            "binary_version": "1.5.0.85+dfsg1-3"
        },
        {
            "binary_name": "xcas",
            "binary_version": "1.5.0.85+dfsg1-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7158.json"

Ubuntu:22.04:LTS / giac

Package

Name
giac
Purl
pkg:deb/ubuntu/giac@1.7.0.39+dfsg2-1build2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.6.0.41+dfsg1-1
1.7.0.39+dfsg2-1build1
1.7.0.39+dfsg2-1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libgiac-dev",
            "binary_version": "1.7.0.39+dfsg2-1build2"
        },
        {
            "binary_name": "libgiac0",
            "binary_version": "1.7.0.39+dfsg2-1build2"
        },
        {
            "binary_name": "xcas",
            "binary_version": "1.7.0.39+dfsg2-1build2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7158.json"

Ubuntu:24.04:LTS / giac

Package

Name
giac
Purl
pkg:deb/ubuntu/giac@1.9.0.93+dfsg2-2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.9.0.35+dfsg2-1.1
1.9.0.59+dfsg2-1
1.9.0.69+dfsg2-1
1.9.0.93+dfsg2-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libgiac-dev",
            "binary_version": "1.9.0.93+dfsg2-2"
        },
        {
            "binary_name": "libgiac0t64",
            "binary_version": "1.9.0.93+dfsg2-2"
        },
        {
            "binary_name": "xcas",
            "binary_version": "1.9.0.93+dfsg2-2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7158.json"

Ubuntu:25.10 / giac

Package

Name
giac
Purl
pkg:deb/ubuntu/giac@1.9.0.93+dfsg2-3build1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.9.0.93+dfsg2-3build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libgiac-dev",
            "binary_version": "1.9.0.93+dfsg2-3build1"
        },
        {
            "binary_name": "libgiac0t64",
            "binary_version": "1.9.0.93+dfsg2-3build1"
        },
        {
            "binary_name": "xcas",
            "binary_version": "1.9.0.93+dfsg2-3build1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-7158.json"