It was discovered that LZ4 incorrectly handled certain memory operations. If a user or automated system were tricked into uncompressing a specially- crafted LZ4 file, a remote attacker could use this issue to cause LZ4 to crash, resulting in a denial of service, or possibly execute arbitrary code.
{
"binaries": [
{
"binary_name": "liblz4-1",
"binary_version": "0.0~r131-2ubuntu3.1"
},
{
"binary_name": "liblz4-dev",
"binary_version": "0.0~r131-2ubuntu3.1"
},
{
"binary_name": "liblz4-tool",
"binary_version": "0.0~r131-2ubuntu3.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "liblz4-1",
"binary_version": "1.9.2-2ubuntu0.20.04.1"
},
{
"binary_name": "liblz4-dev",
"binary_version": "1.9.2-2ubuntu0.20.04.1"
},
{
"binary_name": "liblz4-tool",
"binary_version": "1.9.2-2ubuntu0.20.04.1"
},
{
"binary_name": "lz4",
"binary_version": "1.9.2-2ubuntu0.20.04.1"
}
],
"availability": "No subscription required"
}