Your submission was sent successfully! Close

CVE-2019-17543

Published: 14 October 2019

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."

Priority

Low

CVSS 3 base score: 8.1

Status

Package Release Status
lz4
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(0.0~r131-2ubuntu3.1)
disco Ignored
(reached end-of-life)
eoan Ignored
(reached end-of-life)
focal Not vulnerable
(1.9.2-2)
groovy Not vulnerable
(1.9.2-2)
hirsute Not vulnerable
(1.9.2-2)
impish Not vulnerable
(1.9.2-2)
jammy Not vulnerable
(1.9.2-2)
precise Does not exist

trusty Not vulnerable
(0.0~r114-2ubuntu1)
upstream
Released (1.9.2-1)
xenial Not vulnerable
(0.0~r131-2ubuntu2)
Patches:
upstream: https://github.com/lz4/lz4/commit/690009e2c2f9e5dcb0d40e7c0c40610ce6006eda (pre)
upstream: https://github.com/lz4/lz4/commit/6bc6f836a18d1f8fd05c8fc2b42f1d800bc25de1
upstream: https://github.com/lz4/lz4/commit/13a2d9e34ffc4170720ce417c73e396d0ac1471a