Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.
History

Mon, 15 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Airlift
Airlift aircompressor
Vendors & Products Airlift
Airlift aircompressor

Fri, 12 Dec 2025 22:30:00 +0000

Type Values Removed Values Added
Description Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.
Title Aircompressor's Snappy and LZ4 Java-based decompressor implementation can leak information from reused output buffer
Weaknesses CWE-125
CWE-201
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-15T15:04:15.629Z

Reserved: 2025-12-10T18:46:14.762Z

Link: CVE-2025-67721

cve-icon Vulnrichment

Updated: 2025-12-15T15:04:07.531Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-12T23:15:42.067

Modified: 2025-12-15T18:22:40.637

Link: CVE-2025-67721

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-14T21:15:11Z