{"schema_version":"1.7.2","id":"OESA-2023-1213","modified":"2023-04-14T11:05:08Z","published":"2023-04-14T11:05:08Z","upstream":["CVE-2022-4899"],"summary":"zstd security update","details":"Zstd is a fast lossless compression algorithm. It's backed by a very fast entropy stage,provided by Huff0 and FSE library. It's a real-time compression scenario for zlib levels and has a better compression ratio.\r\n\r\nSecurity Fix(es):\r\n\r\nA vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.(CVE-2022-4899)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"zstd","purl":"pkg:rpm/openEuler/zstd\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-4.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["zstd-devel-1.5.0-4.oe2203sp1.aarch64.rpm","zstd-debugsource-1.5.0-4.oe2203sp1.aarch64.rpm","zstd-1.5.0-4.oe2203sp1.aarch64.rpm","zstd-debuginfo-1.5.0-4.oe2203sp1.aarch64.rpm"],"noarch":["zstd-help-1.5.0-4.oe2203sp1.noarch.rpm"],"src":["zstd-1.5.0-4.oe2203sp1.src.rpm"],"x86_64":["zstd-devel-1.5.0-4.oe2203sp1.x86_64.rpm","zstd-debuginfo-1.5.0-4.oe2203sp1.x86_64.rpm","zstd-debugsource-1.5.0-4.oe2203sp1.x86_64.rpm","zstd-1.5.0-4.oe2203sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1213"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4899"}],"database_specific":{"severity":"High"}}