CVE-2014-4611

NameCVE-2014-4611
DescriptionInteger overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.115-1fixed
bookworm (security)6.1.112-1fixed
trixie6.11.7-1fixed
sid6.11.9-1fixed
lz4 (PTS)bullseye1.9.3-2fixed
bookworm1.9.4-1fixed
sid, trixie1.9.4-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcewheezy(not affected)
linuxsource(unstable)3.14.9-1unimportant
linux-2.6source(unstable)(not affected)
lz4source(unstable)0.0~r119-1

Notes

[wheezy] - linux <not-affected> (LZ4 support introduced in 3.11)
- linux-2.6 <not-affected> (LZ4 support introduced in 3.11)
possible fix in https://lkml.org/lkml/2014/7/4/288
https://bugzilla.suse.com/show_bug.cgi?id=883949#c12
Not exploitable for lz* compressed kernel images: http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html
for lz4: https://code.google.com/p/lz4/issues/detail?id=52 and https://code.google.com/p/lz4/source/detail?r=118

Search for package or bug name: Reporting problems