CVE-2019-17543

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
lz4_projectlz4
𝑥
< 1.9.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lz4
bullseye
1.9.3-2
fixed
buster
ignored
stretch
ignored
jessie
no-dsa
bookworm
1.9.4-1
fixed
sid
1.9.4-3
fixed
trixie
1.9.4-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lz4
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
ignored
disco
ignored
bionic
not-affected
xenial
not-affected
trusty
not-affected
References