Mageia 2021-0229: lz4 security update

Advisories

MGASA-2021-0229 - Updated lz4 packages fix a security vulnerability

Publication date: 08 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0229.html
Type: security
Affected Mageia releases: 7, 8
CVE: CVE-2021-3520

An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well (CVE-2021-3520).

References:
- https://bugs.mageia.org/show_bug.cgi?id=28990
- https://www.debian.org/security/2021/dsa-4919
- https://ubuntu.com/security/notices/USN-4968-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520

SRPMS:
- 8/core/lz4-1.9.3-1.1.mga8
- 7/core/lz4-1.9.2-1.1.mga7

Mageia 2021-0229: lz4 security update

An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, ca...

Summary

An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well (CVE-2021-3520).

References

- https://bugs.mageia.org/show_bug.cgi?id=28990

- https://www.debian.org/security/2021/dsa-4919

- https://ubuntu.com/security/notices/USN-4968-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520

Resolution

MGASA-2021-0229 - Updated lz4 packages fix a security vulnerability

SRPMS

- 8/core/lz4-1.9.3-1.1.mga8

- 7/core/lz4-1.9.2-1.1.mga7

Severity
Publication date: 08 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0229.html
Type: security
CVE: CVE-2021-3520

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.