CVE-2014-4607

NameCVE-2014-4607
DescriptionInteger overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-35-1, DSA-2995-1
Debian Bugs752861, 768945

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
busybox (PTS)bullseye1:1.30.1-6fixed
bookworm1:1.35.0-4fixed
sid, trixie1:1.37.0-4fixed
lzo2 (PTS)bookworm, bullseye2.10-2fixed
sid, trixie2.10-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
busyboxsourcejessie1:1.22.0-9+deb8u1
busyboxsource(unstable)1:1.22.0-10768945
lzosource(unstable)(unfixed)
lzo2sourcesqueeze2.03-2+deb6u1DLA-35-1
lzo2sourcewheezy2.06-1+deb7u1DSA-2995-1
lzo2source(unstable)2.08-1752861

Notes

[wheezy] - busybox <no-dsa> (Minor issue)
[squeeze] - busybox <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems