Severity
7.5HIGHNVD
EPSS
0.3%
top 51.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateApr 28

Description

A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

debiandebian/libzstd< libzstd 1.5.4+dfsg2-1 (bookworm)
SwiftURLgithub.com/facebook_zstd< 1.5.4
NVDfacebook/zstandard1.4.10

Patches

🔴Vulnerability Details

4
GHSA
zstd vulnerable to buffer overrun2023-03-31
OSV
CVE-2022-4899: A vulnerability was found in zstd v12023-03-31
OSV
zstd vulnerable to buffer overrun2023-03-31
OSV
zstd vulnerable to buffer overrun2023-03-31

📋Vendor Advisories

7
Red Hat
kernel: mm/slub: fix to return errno if kmalloc() fails2024-04-28
Oracle
Oracle Oracle Communications Risk Matrix: Internal Tools (Zstandard) — CVE-2022-48992023-10-15
Oracle
Oracle Oracle MySQL Risk Matrix: Cluster: General (Zstandard) — CVE-2022-48992023-07-15
Microsoft
A vulnerability was found in zstd v1.4.10 where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.2023-03-14
Red Hat
zstd: mysql: buffer overrun in util.c2022-07-17