Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-11496

Опубликовано: 26 мая 2018
Источник: debian

Описание

In Long Range Zip (aka lrzip) 0.631, there is a use-after-free in read_stream in stream.c, because decompress_file in lrzip.c lacks certain size validation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lrzipfixed0.631+git180528-1package
lrzipno-dsajessiepackage

Примечания

  • https://github.com/ckolivas/lrzip/issues/96

  • https://github.com/ckolivas/lrzip/commit/907b66b8cb4ba7384abf8d82f09204b127d328bd

  • https://github.com/ckolivas/lrzip/commit/a81248e47d276cf59b8c7e22558e2b5035e87b33

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

In Long Range Zip (aka lrzip) 0.631, there is a use-after-free in read_stream in stream.c, because decompress_file in lrzip.c lacks certain size validation.

CVSS3: 6.5
nvd
больше 7 лет назад

In Long Range Zip (aka lrzip) 0.631, there is a use-after-free in read_stream in stream.c, because decompress_file in lrzip.c lacks certain size validation.

CVSS3: 6.5
github
больше 3 лет назад

In Long Range Zip (aka lrzip) 0.631, there is a use-after-free in read_stream in stream.c, because decompress_file in lrzip.c lacks certain size validation.