Mageia 2021-0229: lz4 security update
Summary
An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well (CVE-2021-3520).
References
- https://bugs.mageia.org/show_bug.cgi?id=28990
- https://www.debian.org/security/2021/dsa-4919
- https://ubuntu.com/security/notices/USN-4968-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
Resolution
MGASA-2021-0229 - Updated lz4 packages fix a security vulnerability
SRPMS
- 8/core/lz4-1.9.3-1.1.mga8
- 7/core/lz4-1.9.2-1.1.mga7