CVE-2019-17543

EUVD-2019-7893
LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
Affected Products (NVD)
VendorProductVersion
lz4_projectlz4
𝑥
< 1.9.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lz4
bookworm
1.9.4-1
fixed
bullseye
1.9.3-2
fixed
buster
ignored
jessie
no-dsa
sid
1.9.4-3
fixed
stretch
ignored
trixie
1.9.4-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lz4
bionic
not-affected
disco
ignored
eoan
ignored
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
trusty
not-affected
xenial
not-affected
References