A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
References
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00008.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00062.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00078.html - | |
References | () https://github.com/facebook/zstd/pull/1404/commits/3e5cdf1b6a85843e991d7d10f6a2567c15580da0 - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/4108-1/ - | |
References | () https://www.facebook.com/security/advisories/cve-2019-11922 - Vendor Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - |
Information
Published : 2019-07-25 21:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11922
Mitre link : CVE-2019-11922
CVE.ORG link : CVE-2019-11922
JSON object : View
Products Affected
- zstandard
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')