Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17543

Опубликовано: 14 окт. 2019
Источник: debian
EPSS Низкий

Описание

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lz4fixed1.9.2-1package
lz4ignoredbusterpackage
lz4ignoredstretchpackage
lz4no-dsajessiepackage

Примечания

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941

  • https://github.com/lz4/lz4/pull/756

  • https://github.com/lz4/lz4/pull/760

EPSS

Процентиль: 84%
0.02354
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 6 лет назад

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."

CVSS3: 8.1
redhat
около 6 лет назад

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."

CVSS3: 8.1
nvd
почти 6 лет назад

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."

suse-cvrf
почти 6 лет назад

Security update for lz4

suse-cvrf
почти 6 лет назад

Security update for lz4

EPSS

Процентиль: 84%
0.02354
Низкий