Description
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2657-1 | lz4 security update |
Debian DSA |
DSA-4919-1 | lz4 security update |
Ubuntu USN |
USN-4968-1 | LZ4 vulnerability |
Ubuntu USN |
USN-4968-2 | LZ4 vulnerability |
References
History
No history.
Subscriptions
Lz4 Project
Subscribe
Lz4
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
Cloud Backup
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Oracle
Subscribe
Communications Cloud Native Core Policy
Subscribe
Zfs Storage Appliance Kit
Subscribe
Redhat
Subscribe
Amq Streams
Subscribe
Camel Quarkus
Subscribe
Enterprise Linux
Subscribe
Integration
Subscribe
Rhmt
Subscribe
Splunk
Subscribe
Universal Forwarder
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:07.870Z
Reserved: 2021-04-28T00:00:00.000Z
Link: CVE-2021-3520
No data.
Status : Modified
Published: 2021-06-02T13:15:13.170
Modified: 2024-11-21T06:21:44.987
Link: CVE-2021-3520
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN