{"id":"UBUNTU-CVE-2022-4899","details":"A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.","modified":"2025-09-08T16:49:53Z","published":"2023-03-31T20:15:00Z","upstream":["CVE-2022-4899"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-4899"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4899"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-4899"}],"affected":[{"package":{"name":"libzstd","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/libzstd@1.4.8+dfsg-3build1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.4.8+dfsg-2.1","1.4.8+dfsg-2.1build1","1.4.8+dfsg-3","1.4.8+dfsg-3build1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzstd-dev","binary_version":"1.4.8+dfsg-3build1"},{"binary_name":"libzstd1","binary_version":"1.4.8+dfsg-3build1"},{"binary_name":"zstd","binary_version":"1.4.8+dfsg-3build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-4899.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}