### [CVE-2019-11922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11922) ![](https://img.shields.io/static/v1?label=Product&message=Zstandard&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%201.3.8%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20Write%20(CWE-ID%20787)&color=brighgreen) ### Description A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/security-alerts/cpuoct2020.html #### Github No PoCs found on GitHub currently.