Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-32829

lz4_flex's decompression can leak information from uninitialized memory or reused output buffer
Back to all
CVE

CVE-2026-32829

lz4_flex's decompression can leak information from uninitialized memory or reused output buffer

Summary

Decompressing invalid LZ4 data can leak data from uninitialized memory, or can leak content from previous decompression operations when reusing an output buffer.

Details

The LZ4 block format defines a "match copy operation" which duplicates previously written data or data from the user-supplied dict. The position of that data is defined by an offset. The data is copied within the output buffer from the offset to the current output position.

However, lz4flex did not properly detect invalid and out-of-bounds offset_ values properly, causing it to copy uninitialized data from the output buffer.

Only the block based API functions are affected: 

lz4flex::block::{decompressinto, decompressintowith_dict}

When safe-decode is disabled additionally these functions are affected

lz4flex::block::{decompress, decompresswithdict, decompresssizeprepended, decompresssizeprependedwith_dict}

All frame APIs are not affected.

There are two affected use cases:

  • decompressing LZ4 data with the unsafe implementation (safe-decode feature flag disabled, which is enabled by default):

can leak content of uninitialized memory as decompressed result

  • decompressing LZ4 data into a reused, user-supplied output buffer (affects the safe-decode feature as well):

can leak the previous contents of the output buffer as decompressed result

Impact

Leakage of data from uninitialized memory or content from previous decompression operations, possibly revealing sensitive information and secrets.

Mitigation

lz4_flex 0.12.1 and 0.11.6 fixes this issue without requiring changes in user code.

If you cannot upgrade, you can mitigate this vulnerability by zeroing the output buffer before calling block::decompress_into or  block::decompressintowith_dict (only block based API is affected, frame API is not affected). Additionally the the safe-decode feature flag should be enabled.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.2
-
4.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://github.com/PSeitz/lz4flex/security/advisories/GHSA-vvp9-7p8x-rfvv, https://nvd.nist.gov/vuln/detail/CVE-2026-32829, https://github.com/PSeitz/lz4flex/commit/055502ee5d297ecd6bf448ac91c055c7f6df9b6d, https://github.com/PSeitz/lz4_flex, https://rustsec.org/advisories/RUSTSEC-2026-0041.html

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0.00015%
EPSS Percentile
0.03216%
Introduced Version
0,0.12.0
Fix Available
0.11.6,0.12.1,0.54.0-r3

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading