Summary: | app-arch/lrzip: DoS via invalid arithmetic shifts | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | minor | CC: | gentoo.qxrin, maintainer-needed |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://github.com/ckolivas/lrzip/issues/224 | ||
Whiteboard: | B3 [upstream] | ||
Package list: | Runtime testing required: | --- |
Description
John Helmert III
![]() ![]() ![]() ![]() CVE-2021-33451 (https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d): https://github.com/ckolivas/lrzip/issues/198 An issue was discovered in lrzip version 0.641. There are memory leaks in fill_buffer() in stream.c. CVE-2021-33453 (https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d): https://github.com/ckolivas/lrzip/issues/199 An issue was discovered in lrzip version 0.641. There is a use-after-free in ucompthread() in stream.c:1538. Seems upstream can't reproduce.. |