Lz4 Project Lz4 vulnerabilities

4 known vulnerabilities affecting lz4_project/lz4.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2021-3520CRITICALCVSS 9.8≥ 1.8.3, < 1.9.4vlz4-1.8.32021-06-02
CVE-2021-3520 [CRITICAL] CWE-190 CVE-2021-3520: There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and i
cvelistv5nvdosv
CVE-2019-17543HIGHCVSS 8.1fixed in 1.9.22019-10-14
CVE-2019-17543 [HIGH] CWE-787 CVE-2019-17543: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
nvdosv
CVE-2014-4715MEDIUMCVSS 5.0≥ 0, < 0.0~r119-12014-07-03
CVE-2014-4715 [MEDIUM] CVE-2014-4715: Yann Collet LZ4 before r119, when used on certain 32-bit platforms that allocate memory beyond 0x80000000, does not properly detect integer overflows, Yann Collet LZ4 before r119, when used on certain 32-bit platforms that allocate memory beyond 0x80000000, does not properly detect integer overflows, which allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run, a
osv
CVE-2014-4611MEDIUMCVSS 5.0≥ 0, < 0.0~r119-12014-07-03
CVE-2014-4611 [MEDIUM] CVE-2014-4611: Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompr Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly
osv