First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: lz4: fix LZ4_decompress_safe_partial read out of bound When partialDecoding, it is EOF if we've either filled the output buffer or can't proceed with reading an offset for following match. In some extreme corner cases when compressed data is suitably corrupted, UAF will occur. As reported by KASAN [1], LZ4_decompress_safe_partial may lead to read out of bound problem during decoding. lz4 upstream has fixed it [2] and this issue has been disscussed here [3] before. current decompression routine was ported from lz4 v1.8.3, bumping lib/lz4 to v1.9.+ is certainly a huge work to be done later, so, we'd better fix it first. [1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/ [2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad# [3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
LZ4 | >=1.8.3 | |
Linux Kernel | <5.4.189 | |
Linux Kernel | >=5.5<5.10.111 | |
Linux Kernel | >=5.11<5.15.34 | |
Linux Kernel | >=5.16<5.16.20 | |
Linux Kernel | >=5.17<5.17.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49078 has a medium severity level, considering the potential impact on system memory and data integrity.
To fix CVE-2022-49078, upgrade the lz4 package to at least version 1.8.3 or later.
CVE-2022-49078 affects all versions of lz4 prior to version 1.8.3.
The vulnerability could lead to a read out of bounds condition, which may compromise memory and expose sensitive data.
As of the latest updates, there is no indication that CVE-2022-49078 is being actively exploited in the wild.