LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4write32 (related to LZ4compressdestSize), affecting applications that call LZ4compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
{ "vanir_signatures": [ { "id": "CVE-2019-17543-b1728100", "digest": { "length": 6841.0, "function_hash": "61011784323741544421519885770648292192" }, "signature_type": "Function", "target": { "file": "tests/frametest.c", "function": "fuzzerTests" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/lz4/lz4/commit/fdf2ef5809ca875c454510610764d9125ef2ebbd" }, { "id": "CVE-2019-17543-f2e73d94", "digest": { "line_hashes": [ "325100058228336016223022397709697290259", "200105775490831143229869207908691188226", "165779088698909068794914726885539428532", "83614538809166404914961511938413066878" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "tests/frametest.c" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/lz4/lz4/commit/fdf2ef5809ca875c454510610764d9125ef2ebbd" } ] }