It was discovered that LZ4 incorrectly handled certain memory operations. If a user or automated system were tricked into uncompressing a specially- crafted LZ4 file, a remote attacker could use this issue to cause LZ4 to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "0.0~r131-2ubuntu3.1", "binary_name": "liblz4-1" }, { "binary_version": "0.0~r131-2ubuntu3.1", "binary_name": "liblz4-1-dbg" }, { "binary_version": "0.0~r131-2ubuntu3.1", "binary_name": "liblz4-dev" }, { "binary_version": "0.0~r131-2ubuntu3.1", "binary_name": "liblz4-tool" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.9.2-2ubuntu0.20.04.1", "binary_name": "liblz4-1" }, { "binary_version": "1.9.2-2ubuntu0.20.04.1", "binary_name": "liblz4-1-dbgsym" }, { "binary_version": "1.9.2-2ubuntu0.20.04.1", "binary_name": "liblz4-dev" }, { "binary_version": "1.9.2-2ubuntu0.20.04.1", "binary_name": "liblz4-tool" }, { "binary_version": "1.9.2-2ubuntu0.20.04.1", "binary_name": "lz4" }, { "binary_version": "1.9.2-2ubuntu0.20.04.1", "binary_name": "lz4-dbgsym" } ] }