Your submission was sent successfully! Close

CVE-2019-11922

Published: 25 July 2019

A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.

Priority

Medium

CVSS 3 base score: 8.1

Status

Package Release Status
libzstd
Launchpad, Ubuntu, Debian
Upstream
Released (1.3.8+dfsg-2)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(1.3.8+dfsg-2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.3.8+dfsg-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.3.8+dfsg-2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.3.3+dfsg-2ubuntu1.1)
Ubuntu 16.04 ESM (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://github.com/facebook/zstd/commit/3e5cdf1b6a85843e991d7d10f6a2567c15580da0