CVE-2026-32829 PUBLISHED

lz4_flex: Decompression can leak information from uninitialized memory or reused output buffer

Assigner: GitHub_M
Reserved: 16.03.2026 Published: 20.03.2026 Updated: 20.03.2026

lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions (decompress_into, decompress_into_with_dict, and others when safe-decode is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor PSeitz
Product lz4_flex
Versions
  • Version < 0.11.6 is affected
  • Version >= 0.12.0, < 0.12.1 is affected

References

Problem Types

  • CWE-201: Insertion of Sensitive Information Into Sent Data CWE
  • CWE-823: Use of Out-of-range Pointer Offset CWE