{"id":"CVE-2022-4899","details":"A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.","aliases":["GHSA-5c9c-6x87-f9vm","PYSEC-2023-121"],"modified":"2026-04-16T00:06:09.720982017Z","published":"2023-03-31T20:15:07.213Z","related":["ALSA-2024:0894","ALSA-2024:1141","SUSE-SU-2023:1688-1","SUSE-SU-2023:2074-1","openSUSE-SU-2024:13613-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230725-0005/"},{"type":"FIX","url":"https://github.com/facebook/zstd/issues/3200"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/facebook/zstd","events":[{"introduced":"0"},{"last_affected":"b53da1f6f499f0d44c5f40795b080d967b24e5fa"}],"database_specific":{"cpe":"cpe:2.3:a:facebook:zstandard:1.4.10:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.4.10"}],"source":"CPE_FIELD"}}],"versions":["fuzz-corpora","fuzz-corpora2","v0.1.0","v0.1.1","v0.4.3","v0.4.4","v0.4.5","v0.4.6","v0.4.7","v0.5.0","v0.5.1","v0.6.0","v0.6.1","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v1.1.0","v1.1.1","v1.1.2","v1.3.7","v1.3.8","v1.4.10","v1.4.7","vxyz","zstd-0.1.2","zstd-0.1.3","zstd-0.2.0","zstd-0.2.1","zstd-0.2.2","zstd-0.3.0","zstd-0.3.1","zstd-0.3.2","zstd-0.3.3","zstd-0.3.4","zstd-0.3.5","zstd-0.3.6","zstd-0.4.0","zstd-0.4.1","zstd-0.4.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4899.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}