The read_1g function in stream.c in liblrzip.so in lrzip 0.631 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_name": "lrzip", "binary_version": "0.616-1ubuntu0.1~esm1" }, { "binary_name": "lrzip-dbgsym", "binary_version": "0.616-1ubuntu0.1~esm1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_name": "lrzip", "binary_version": "0.621-1ubuntu0.1~esm1" }, { "binary_name": "lrzip-dbgsym", "binary_version": "0.621-1ubuntu0.1~esm1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_name": "lrzip", "binary_version": "0.631-1+deb9u1build0.18.04.1" }, { "binary_name": "lrzip-dbgsym", "binary_version": "0.631-1+deb9u1build0.18.04.1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_name": "lrzip", "binary_version": "0.631+git180528-1" }, { "binary_name": "lrzip-dbgsym", "binary_version": "0.631+git180528-1" } ] }