Debian Libzstd vulnerabilities
4 known vulnerabilities affecting debian/libzstd.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2022-4899HIGHCVSS 7.5fixed in libzstd 1.5.4+dfsg2-1 (bookworm)2022
CVE-2022-4899 [HIGH] CVE-2022-4899: libzstd - A vulnerability was found in zstd v1.4.10, where an attacker can supply empty st...
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
Scope: local
bookworm: resolved (fixed in 1.5.4+dfsg2-1)
bullseye: open
forky: resolved (fixed in 1.5.4+dfsg2-1)
sid: resolved (fixed in 1.5.4+dfsg2-1)
trixie: resolved (fixed in 1.5.4+dfsg2-1)
debian
CVE-2021-24032MEDIUMCVSS 5.5fixed in libzstd 1.4.8+dfsg-2 (bookworm)2021
CVE-2021-24032 [MEDIUM] CVE-2021-24032: libzstd - Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-2...
Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.
Scope: local
bookworm: resolved (fixed in 1.4.8+dfsg-2
debian
CVE-2021-24031MEDIUMCVSS 5.5fixed in libzstd 1.4.8+dfsg-1 (bookworm)2021
CVE-2021-24031 [MEDIUM] CVE-2021-24031: libzstd - In the Zstandard command-line utility prior to v1.4.1, output files were created...
In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
Scope: local
bookworm: resolved (fixed in 1.4.8+dfsg-1)
bullseye: resolved (fixed in 1.4.8+dfsg-1)
debian
CVE-2019-11922HIGHCVSS 8.1fixed in libzstd 1.3.8+dfsg-2 (bookworm)2019
CVE-2019-11922 [HIGH] CVE-2019-11922: libzstd - A race condition in the one-pass compression functions of Zstandard prior to ver...
A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
Scope: local
bookworm: resolved (fixed in 1.3.8+dfsg-2)
bullseye: resolved (fixed in 1.3.8+dfsg-2)
forky: resolved (fixed in 1.3.8+dfsg-2)
sid: resolved (fixed
debian