lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
References
Link | Resource |
---|---|
http://www.ohse.de/uwe/software/lrzsz.html | Release Notes Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1572058 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00027.html | Issue Tracking Mailing List Third Party Advisory |
https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931 | Mailing List Third Party Advisory |
https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2021-06-02 14:15
Updated : 2022-02-21 04:59
NVD link : CVE-2018-10195
Mitre link : CVE-2018-10195
CVE.ORG link : CVE-2018-10195
JSON object : View
Products Affected
suse
- linux_enterprise_desktop
- linux_enterprise_debuginfo
- linux_enterprise_server
lrzsz_project
- lrzsz
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound