Heap-based Buffer Overflow Affecting lz4-libs package, versions *


medium

Snyk CVSS

    Attack Complexity High
    Confidentiality High
    Integrity High
    Availability High
Expand this section
NVD
8.1 high
Expand this section
SUSE
7.4 high
Expand this section
Red Hat
8.1 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CENTOS8-LZ4LIBS-1945846
  • published 26 Jul 2021
  • disclosed 17 Jul 2019

How to fix?

There is no fixed version for Centos:8 lz4-libs.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lz4-libs package and not the lz4-libs package as distributed by Centos:8. See How to fix? for Centos:8 relevant fixed versions and status.

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."