Versions mentioned in the description apply to the upstream
Remediation section below for
Debian:9 relevant versions.
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
lz4 to version 0.0~r131-2+deb9u1 or higher.