CVE-2026-32829
March 20, 2026
lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions ("decompress_into", "decompress_into_with_dict", and others when "safe-decode" is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1.
Affected Packages
https://github.com/PSeitz/lz4_flex.git (GITHUB):
Affected version(s) >=0.9 <0.11.6Fix Suggestion:
Update to version 0.11.6https://github.com/PSeitz/lz4_flex.git (GITHUB):
Affected version(s) =0.12.0 <0.12.1Fix Suggestion:
Update to version 0.12.1lz4_flex (RUST):
Affected version(s) >=0.3.0 <0.11.6Fix Suggestion:
Update to version 0.11.6lz4_flex (RUST):
Affected version(s) =0.12.0 <0.12.1Fix Suggestion:
Update to version 0.12.1Related Resources (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.2
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
EPSS
Base Score:
0.02