CVE-2019-17543

Published: 14 October 2019

LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."

Priority

Low

CVSS 3 base score: 8.1

Status

Package Release Status
lz4
Launchpad, Ubuntu, Debian
Upstream
Released (1.9.2-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(1.9.2-2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.9.2-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.9.2-2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(0.0~r131-2ubuntu3.1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(0.0~r131-2ubuntu2)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(0.0~r114-2ubuntu1)
Patches:
Upstream: https://github.com/lz4/lz4/commit/690009e2c2f9e5dcb0d40e7c0c40610ce6006eda (pre)
Upstream: https://github.com/lz4/lz4/commit/6bc6f836a18d1f8fd05c8fc2b42f1d800bc25de1
Upstream: https://github.com/lz4/lz4/commit/13a2d9e34ffc4170720ce417c73e396d0ac1471a