The read_stream function in stream.c in liblrzip.so in lrzip 0.631 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted archive.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/05/07/lrzip-use-after-free-in-read_stream-stream-c/ | Third Party Advisory VDB Entry |
https://github.com/ckolivas/lrzip/issues/71 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/08/msg00001.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202005-01 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-05-08T14:00:00
Updated: 2021-08-01T23:06:26
Reserved: 2017-05-08T00:00:00
Link: CVE-2017-8846
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-05-08T14:29:00.310
Modified: 2022-12-09T16:01:53.933
Link: CVE-2017-8846
JSON object: View
Redhat Information
No data.
CWE