MGASA-2021-0229

Source
https://advisories.mageia.org/MGASA-2021-0229.html
Import Source
https://advisories.mageia.org/MGASA-2021-0229.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0229
Related
Published
2021-06-08T14:33:02Z
Modified
2021-06-07T08:35:52Z
Summary
Updated lz4 packages fix a security vulnerability
Details

An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well (CVE-2021-3520).

References
Credits

Affected packages

Mageia:7 / lz4

Package

Name
lz4
Purl
pkg:rpm/mageia/lz4?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2-1.1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / lz4

Package

Name
lz4
Purl
pkg:rpm/mageia/lz4?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.3-1.1.mga8

Ecosystem specific

{
    "section": "core"
}