lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
References
Link | Resource |
---|---|
https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931 | Mailing List Third Party Advisory |
https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931 | Mailing List Third Party Advisory |
http://www.ohse.de/uwe/software/lrzsz.html | Release Notes Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1572058 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00027.html | Issue Tracking Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-06-02 07:15
Updated : 2022-02-20 20:59
NVD link : CVE-2018-10195
Mitre link : CVE-2018-10195
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
suse
- linux_enterprise_desktop
- linux_enterprise_debuginfo
- linux_enterprise_server
debian
- debian_linux
lrzsz_project
- lrzsz