Skip to content

chore(deps): update rust crate lz4_flex to v0.11.6 [security]#478

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/crate-lz4_flex-vulnerability
Open

chore(deps): update rust crate lz4_flex to v0.11.6 [security]#478
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/crate-lz4_flex-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Mar 20, 2026

This PR contains the following updates:

Package Type Update Change
lz4_flex dependencies patch 0.11.50.11.6

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


lz4_flex's decompression can leak information from uninitialized memory or reused output buffer

CVE-2026-32829 / GHSA-vvp9-7p8x-rfvv

More information

Details

Summary

Decompressing invalid LZ4 data can leak data from uninitialized memory, or can leak content from previous decompression operations when reusing an output buffer.

Details

The LZ4 block format defines a "match copy operation" which duplicates previously written data or data from the user-supplied dict. The position of that data is defined by an offset. The data is copied within the output buffer from the offset to the current output position.
However, lz4_flex did not properly detect invalid and out-of-bounds offset values properly, causing it to copy uninitialized data from the output buffer.

Only the block based API functions are affected:
lz4_flex::block::{decompress_into, decompress_into_with_dict}

When safe-decode is disabled additionally these functions are affected
lz4_flex::block::{decompress, decompress_with_dict, decompress_size_prepended, decompress_size_prepended_with_dict}

All frame APIs are not affected.

There are two affected use cases:

  • decompressing LZ4 data with the unsafe implementation (safe-decode feature flag disabled, which is enabled by default):
    can leak content of uninitialized memory as decompressed result
  • decompressing LZ4 data into a reused, user-supplied output buffer (affects the safe-decode feature as well):
    can leak the previous contents of the output buffer as decompressed result
Impact

Leakage of data from uninitialized memory or content from previous decompression operations, possibly revealing sensitive information and secrets.

Mitigation

lz4_flex 0.12.1 and 0.11.6 fixes this issue without requiring changes in user code.

If you cannot upgrade, you can mitigate this vulnerability by zeroing the output buffer before calling block::decompress_into or block::decompress_into_with_dict (only block based API is affected, frame API is not affected). Additionally the the safe-decode feature flag should be enabled.

Severity

  • CVSS Score: 8.2 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

pseitz/lz4_flex (lz4_flex)

v0.11.6

Compare Source

==================

Security Fix
Invalid match offsets (offset == 0) during decompression were not properly
handled, which could lead to invalid memory reads on untrusted input.
Users on 0.11.x should upgrade to 0.11.6.

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner March 20, 2026 00:36
@renovate renovate Bot changed the title chore(deps): update rust crate lz4_flex to v0.11.6 [security] chore(deps): update rust crate lz4_flex to v0.11.6 [security] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/crate-lz4_flex-vulnerability branch March 27, 2026 04:23
@renovate renovate Bot changed the title chore(deps): update rust crate lz4_flex to v0.11.6 [security] - autoclosed chore(deps): update rust crate lz4_flex to v0.11.6 [security] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/crate-lz4_flex-vulnerability branch 2 times, most recently from b4a2097 to 029d14d Compare March 30, 2026 20:29
@renovate renovate Bot changed the title chore(deps): update rust crate lz4_flex to v0.11.6 [security] chore(deps): update rust crate lz4_flex to v0.11.6 [security] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
@renovate renovate Bot changed the title chore(deps): update rust crate lz4_flex to v0.11.6 [security] - autoclosed chore(deps): update rust crate lz4_flex to v0.11.6 [security] Apr 27, 2026
@renovate renovate Bot reopened this Apr 27, 2026
@renovate renovate Bot force-pushed the renovate/crate-lz4_flex-vulnerability branch 2 times, most recently from 029d14d to 8410509 Compare April 27, 2026 20:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants