First published: Mon Mar 20 2023(Updated: )
A vulnerability was found in zstd v1.4.10, where an attacker can supply an empty string as an argument to the command line tool to cause buffer overrun.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/zstd | <1.5.4.0 | 1.5.4.0 |
swift/github.com/facebook/zstd | <1.5.4 | 1.5.4 |
Facebook Zstandard | =1.4.10 | |
redhat/mysql | <8.0.34 | 8.0.34 |
=1.4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4899 is high with a CVSS score of 7.5.
CVE-2022-4899 affects zstd version 1.4.10 by allowing an attacker to supply an empty string as a command line argument, causing buffer overrun.
CVE-2022-4899 affects zstd version 1.4.10 in the pip package, zstd version 1.4.10 in the swift package, and all versions of Facebook Zstandard up to and excluding 1.5.4.
To fix CVE-2022-4899, update to zstd version 1.5.4 or later for the pip package, update to zstd version 1.5.4 or later for the swift package, or update to Facebook Zstandard version 1.5.4 or later.
You can find more information about CVE-2022-4899 at the following references: - [NIST NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-4899) - [GitHub Issue](https://github.com/facebook/zstd/issues/3200) - [GitHub Pull Request](https://github.com/facebook/zstd/pull/3220)