The read_1g function in stream.c in liblrzip.so in lrzip 0.631 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.616-1ubuntu0.1~esm1", "binary_name": "lrzip" }, { "binary_version": "0.616-1ubuntu0.1~esm1", "binary_name": "lrzip-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.621-1ubuntu0.1~esm1", "binary_name": "lrzip" }, { "binary_version": "0.621-1ubuntu0.1~esm1", "binary_name": "lrzip-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.631-1+deb9u1build0.18.04.1", "binary_name": "lrzip" }, { "binary_version": "0.631-1+deb9u1build0.18.04.1", "binary_name": "lrzip-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.631+git180528-1", "binary_name": "lrzip" }, { "binary_version": "0.631+git180528-1", "binary_name": "lrzip-dbgsym" } ] }