CVE-2025-67721

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-67721
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-67721.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-67721
Aliases
Published
2025-12-12T22:11:10.971Z
Modified
2025-12-15T19:47:55.298581Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Aircompressor's Snappy and LZ4 Java-based decompressor implementation can leak information from reused output buffer
Details

Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/67xxx/CVE-2025-67721.json",
    "cwe_ids": [
        "CWE-125",
        "CWE-201"
    ]
}
References

Affected packages

Git / github.com/airlift/aircompressor

Affected ranges

Type
GIT
Repo
https://github.com/airlift/aircompressor
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1
0.10
0.11
0.12
0.13
0.14
0.15
0.16
0.17
0.18
0.19
0.2
0.20
0.21
0.22
0.23
0.24
0.25
0.26
0.3
0.4
0.5
0.6
0.7
0.8
0.9

2.*

2.0

3.*

3.0
3.1
3.2
3.3