lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ohse.de/uwe/software/lrzsz.html - Release Notes, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1572058 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/01/msg00027.html - Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931 - Mailing List, Third Party Advisory | |
References | () https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931 - Mailing List, Third Party Advisory |
Information
Published : 2021-06-02 14:15
Updated : 2024-11-21 03:40
NVD link : CVE-2018-10195
Mitre link : CVE-2018-10195
CVE.ORG link : CVE-2018-10195
JSON object : View
Products Affected
lrzsz_project
- lrzsz
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_debuginfo
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound