{"id":"CVE-2018-10195","details":"lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.","modified":"2026-04-16T04:34:28.432358222Z","published":"2021-06-02T14:15:07.817Z","related":["SUSE-SU-2018:1066-1","SUSE-SU-2018:1070-1","openSUSE-SU-2024:11363-1"],"references":[{"type":"ADVISORY","url":"https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931"},{"type":"ADVISORY","url":"https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931"},{"type":"ADVISORY","url":"http://www.ohse.de/uwe/software/lrzsz.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1572058"},{"type":"REPORT","url":"https://lists.debian.org/debian-lts-announce/2022/01/msg00027.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10195.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"0.12.20"}]},{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]},{"events":[{"introduced":"0"},{"last_affected":"12-sp3"}]},{"events":[{"introduced":"0"},{"last_affected":"11-sp4"}]},{"events":[{"introduced":"0"},{"last_affected":"12-sp3"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}