Lucene search

K
debianDebianDEBIAN:DLA-2981-1:693A2
HistoryApr 13, 2022 - 1:47 p.m.

[SECURITY] [DLA 2981-1] lrzip security update

2022-04-1313:47:25
lists.debian.org
11

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.7 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

54.8%


Debian LTS Advisory DLA-2981-1 [email protected]
https://www.debian.org/lts/security/ Sylvain Beucler
April 13, 2022 https://wiki.debian.org/LTS


Package : lrzip
Version : 0.631-1+deb9u2
CVE ID : CVE-2018-5786 CVE-2020-25467 CVE-2021-27345 CVE-2021-27347
CVE-2022-26291
Debian Bug : 888506 990583

Several security vulnerabilities have been discovered in lrzip, a
compression program. Invalid pointers, use-after-free and infinite
loops would allow attackers to cause a denial of service or possibly
other unspecified impact via a crafted compressed file.

CVE-2018-5786

There is an infinite loop and application hang in the get_fileinfo
function (lrzip.c). Remote attackers could leverage this
vulnerability to cause a denial of service via a crafted lrz file.

CVE-2020-25467

A null pointer dereference was discovered lzo_decompress_buf in
stream.c which allows an attacker to cause a denial of service
(DOS) via a crafted compressed file.

CVE-2021-27345

A null pointer dereference was discovered in ucompthread in
stream.c which allows attackers to cause a denial of service (DOS)
via a crafted compressed file.

CVE-2021-27347

Use after free in lzma_decompress_buf function in stream.c in
allows attackers to cause Denial of Service (DoS) via a crafted
compressed file.

CVE-2022-26291

lrzip was discovered to contain a multiple concurrency
use-after-free between the functions zpaq_decompress_buf() and
clear_rulist(). This vulnerability allows attackers to cause a
Denial of Service (DoS) via a crafted lrz file.

For Debian 9 stretch, these problems have been fixed in version
0.631-1+deb9u2.

We recommend that you upgrade your lrzip packages.

For the detailed security status of lrzip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lrzip

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

OSVersionArchitecturePackageVersionFilename
Debian9alllrzip< 0.631-1+deb9u2lrzip_0.631-1+deb9u2_all.deb

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

6.7 Medium

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

54.8%