| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vvp9-7p8x-rfvv | lz4_flex's decompression can leak information from uninitialized memory or reused output buffer |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1. |
| Title | lz4_flex: lz4_flex's decompression can leak information from uninitialized memory or reused output buffer | lz4_flex: Decompression can leak information from uninitialized memory or reused output buffer |
| Weaknesses | CWE-201 | |
| References |
| |
| Metrics |
cvssV4_0
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pseitz
Pseitz lz4 Flex |
|
| Vendors & Products |
Pseitz
Pseitz lz4 Flex |
Thu, 19 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | lz4_flex: lz4_flex's decompression can leak information from uninitialized memory or reused output buffer | |
| Weaknesses | CWE-823 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T00:49:12.893Z
Reserved: 2026-03-16T17:35:36.698Z
Link: CVE-2026-32829
No data.
Status : Awaiting Analysis
Published: 2026-03-20T01:15:56.277
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-32829
OpenCVE Enrichment
Updated: 2026-03-20T10:43:34Z
Github GHSA