It was discovered that LZ4 incorrectly handled certain memory operations. If a user or automated system were tricked into uncompressing a specially- crafted LZ4 file, a remote attacker could use this issue to cause LZ4 to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "liblz4-1", "binary_version": "0.0~r131-2ubuntu3.1" }, { "binary_name": "liblz4-1-dbg", "binary_version": "0.0~r131-2ubuntu3.1" }, { "binary_name": "liblz4-dev", "binary_version": "0.0~r131-2ubuntu3.1" }, { "binary_name": "liblz4-tool", "binary_version": "0.0~r131-2ubuntu3.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "liblz4-1", "binary_version": "1.9.2-2ubuntu0.20.04.1" }, { "binary_name": "liblz4-1-dbgsym", "binary_version": "1.9.2-2ubuntu0.20.04.1" }, { "binary_name": "liblz4-dev", "binary_version": "1.9.2-2ubuntu0.20.04.1" }, { "binary_name": "liblz4-tool", "binary_version": "1.9.2-2ubuntu0.20.04.1" }, { "binary_name": "lz4", "binary_version": "1.9.2-2ubuntu0.20.04.1" }, { "binary_name": "lz4-dbgsym", "binary_version": "1.9.2-2ubuntu0.20.04.1" } ] }