the vulnerability seems to exist in jodogne/orthanc:latest as well. Seems to be an issue of the underlying debian (see affected packages: util-linux, wget, apt) .
Unfortunately the “snyk website says, that there is no fix”
You’ll often find that trying to go to a zero-CVE setup is usually not possible.
What you need to check is whether it’s actually exploitable in your solution.
According to the Snyk page for this CVE, the vulnerability can be exploited by calling the zipOpenNewFileInZip4_64 function.
You should therefore ask “Could someone use (or abuse) my system in a way that leads the zipOpenNewFileInZip4_64 function to be used, with some or all of its parameters being controlled by user-supplied data?”
In the software that you’re actually using (i.e. Orthanc and its plugins), you should check if this function is called.
In Orthanc, this function does not seem to be called at all. You should check in the actual version you’re using, and in the plugins.
If the only user-facing service in your solution is Orthanc, and if none of Orthanc or its dependencies use this function, you should register this CVE as having a zero exploitability (regardless of its severity).
I can add that the version of Orthanc that is shipped within jodogne/orthanc-python:1.12.6 are LSB binaries that are statically linked against zlib 1.3.1 (reference), which is not affected by CVE-2023-45853. As a consequence, such a vulnerability in the base image will be not transferred to Orthanc.