{"id":"CVE-2021-3520","details":"There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.","modified":"2026-04-16T04:37:19.043919187Z","published":"2021-06-02T13:15:13.170Z","related":["ALSA-2021:2575","RUSTSEC-2022-0051","SUSE-SU-2021:1613-1","SUSE-SU-2021:1647-1","SUSE-SU-2021:1825-1","openSUSE-SU-2021:0760-1","openSUSE-SU-2021:1825-1","openSUSE-SU-2024:11562-1","openSUSE-SU-2024:12902-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211104-0005/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954559"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lz4/lz4","events":[{"introduced":"641b453d9db536ee020851bfcb1dc39f61006f0a"},{"fixed":"5ff839680134437dbf4678f3d0c7b371d84f4964"}],"database_specific":{"versions":[{"introduced":"1.8.3"},{"fixed":"1.9.4"}]}}],"versions":["v1.8.3","v1.9.0","v1.9.1","v1.9.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3520.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]},{"events":[{"introduced":"8.2.0"},{"fixed":"8.2.12"}]},{"events":[{"introduced":"9.0.0"},{"fixed":"9.0.6"}]},{"events":[{"introduced":"0"},{"last_affected":"9.1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}