{
  "threat_severity" : "Important",
  "public_date" : "2025-12-05T18:10:16Z",
  "bugzilla" : {
    "description" : "lz4-java: lz4-java: Information Disclosure via Insufficient Output Buffer Clearing",
    "id" : "2419500",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2419500"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-908",
  "details" : [ "yawkat LZ4 Java provides LZ4 compression for Java. Insufficient clearing of the output buffer in Java-based decompressor implementations in lz4-java 1.10.0 and earlier allows remote attackers to read previous buffer contents via crafted compressed input. In applications where the output buffer is reused without being cleared, this may lead to disclosure of sensitive data. JNI-based implementations are not affected. This vulnerability is fixed in 1.10.1.", "A flaw was found in lz4-java. This vulnerability allows disclosure of sensitive data via crafted compressed input due to insufficient clearing of the output buffer in Java-based decompressor implementations." ],
  "statement" : "This vulnerability is rated IMPORTANT because it allows for information disclosure when Java-based decompressor implementations reuse output buffers without proper clearing, potentially exposing sensitive data via crafted compressed input. JNI-based implementations of lz4-java are not affected by this issue.",
  "affected_release" : [ {
    "product_name" : "Cryostat 4 on RHEL 9",
    "release_date" : "2026-01-19T00:00:00Z",
    "advisory" : "RHSA-2026:0761",
    "cpe" : "cpe:/a:redhat:cryostat:4::el9",
    "package" : "cryostat/cryostat-reports-rhel9:4.1.0-16"
  }, {
    "product_name" : "Cryostat 4 on RHEL 9",
    "release_date" : "2026-01-19T00:00:00Z",
    "advisory" : "RHSA-2026:0761",
    "cpe" : "cpe:/a:redhat:cryostat:4::el9",
    "package" : "cryostat/cryostat-rhel9:4.1.0-16"
  }, {
    "product_name" : "Cryostat 4 on RHEL 9",
    "release_date" : "2026-01-19T00:00:00Z",
    "advisory" : "RHSA-2026:0761",
    "cpe" : "cpe:/a:redhat:cryostat:4::el9",
    "package" : "cryostat/jfr-datasource-rhel9:4.1.0-16"
  }, {
    "product_name" : "Red Hat Build of Apache Camel 4.10 for Quarkus 3.20",
    "release_date" : "2026-01-12T00:00:00Z",
    "advisory" : "RHSA-2026:0467",
    "cpe" : "cpe:/a:redhat:apache_camel_quarkus:3.20",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat build of Apache Camel 4.14.2.P1 for Spring Boot 3.5.9",
    "release_date" : "2026-01-15T00:00:00Z",
    "advisory" : "RHSA-2026:0726",
    "cpe" : "cpe:/a:redhat:apache_camel_spring_boot:4.14",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat Build of Apache Camel 4.14 for Quarkus 3.27",
    "release_date" : "2026-01-12T00:00:00Z",
    "advisory" : "RHSA-2026:0468",
    "cpe" : "cpe:/a:redhat:apache_camel_quarkus:3.27",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat build of Quarkus 3.20.4.SP1",
    "release_date" : "2026-01-06T00:00:00Z",
    "advisory" : "RHSA-2026:0131",
    "cpe" : "cpe:/a:redhat:quarkus:3.20::el8",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat build of Quarkus 3.27.1.SP1",
    "release_date" : "2026-01-06T00:00:00Z",
    "advisory" : "RHSA-2026:0134",
    "cpe" : "cpe:/a:redhat:quarkus:3.27::el8",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-01-19T00:00:00Z",
    "advisory" : "RHSA-2026:0752",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9::crb",
    "package" : "jmc-0:8.2.0-18.el9_7.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-02-03T00:00:00Z",
    "advisory" : "RHSA-2026:1823",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4::crb",
    "package" : "jmc-0:8.2.0-17.el9_4.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-01-19T00:00:00Z",
    "advisory" : "RHSA-2026:0751",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6::crb",
    "package" : "jmc-0:8.2.0-18.el9_6.2"
  }, {
    "product_name" : "Red Hat JBoss EAP XP 5.0 Update 4.0",
    "release_date" : "2026-03-05T00:00:00Z",
    "advisory" : "RHSA-2026:3951",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat JBoss EAP XP 6.0 Update 2.0",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1935",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9",
    "package" : "lz4-java"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8.1",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1872",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1870",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el8",
    "package" : "eap8-wildfly-0:8.1.4-2.GA_redhat_00005.1.el8eap"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 9",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1871",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9",
    "package" : "eap8-wildfly-0:8.1.4-2.GA_redhat_00005.1.el9eap"
  } ],
  "package_state" : [ {
    "product_name" : "Logging Subsystem for Red Hat OpenShift",
    "fix_state" : "Will not fix",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:logging:5"
  }, {
    "product_name" : "Red Hat build of Apache Camel 4 for Quarkus 3",
    "fix_state" : "Affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:camel_quarkus:3"
  }, {
    "product_name" : "Red Hat build of Apache Camel - HawtIO 4",
    "fix_state" : "Not affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:apache_camel_hawtio:4"
  }, {
    "product_name" : "Red Hat build of Apicurio Registry 2",
    "fix_state" : "Affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:service_registry:2"
  }, {
    "product_name" : "Red Hat build of Apicurio Registry 3",
    "fix_state" : "Affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:apicurio_registry:3"
  }, {
    "product_name" : "Red Hat build of Debezium 2",
    "fix_state" : "Will not fix",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:debezium:2"
  }, {
    "product_name" : "Red Hat build of Debezium 3",
    "fix_state" : "Will not fix",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:debezium:3"
  }, {
    "product_name" : "Red Hat Data Grid 8",
    "fix_state" : "Not affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "jmc:rhel8/lz4-java",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Fuse 7",
    "fix_state" : "Will not fix",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 7",
    "fix_state" : "Not affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8",
    "fix_state" : "Not affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "fix_state" : "Affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jbosseapxp"
  }, {
    "product_name" : "Red Hat JBoss Web Server 6",
    "fix_state" : "Not affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:6"
  }, {
    "product_name" : "Red Hat Process Automation 7",
    "fix_state" : "Affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_bpms_platform:7"
  }, {
    "product_name" : "streams for Apache Kafka 3",
    "fix_state" : "Affected",
    "package_name" : "lz4-java",
    "cpe" : "cpe:/a:redhat:amq_streams:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-66566\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-66566\nhttps://github.com/yawkat/lz4-java/commit/33d180cb70c4d93c80fb0dc3ab3002f457e93840\nhttps://github.com/yawkat/lz4-java/security/advisories/GHSA-cmp6-m4wj-q63q" ],
  "name" : "CVE-2025-66566",
  "csaw" : false
}