CVE-2014-4607

NameCVE-2014-4607
DescriptionInteger overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-35-1, DSA-2995-1, ELA-20-1
Debian Bugs752861, 768945

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
busybox (PTS)jessie, jessie (lts)1:1.22.0-9+deb8u5fixed
stretch (security), stretch (lts), stretch1:1.22.0-19+deb9u2fixed
buster1:1.30.1-4fixed
bullseye1:1.30.1-6fixed
bookworm1:1.35.0-4fixed
sid, trixie1:1.37.0-4fixed
lzo2 (PTS)jessie, stretch2.08-1.2fixed
buster2.10-0.1fixed
bullseye, bookworm2.10-2fixed
sid, trixie2.10-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
busyboxsourcewheezy1:1.20.0-7+deb7u1ELA-20-1
busyboxsourcejessie1:1.22.0-9+deb8u1
busyboxsource(unstable)1:1.22.0-10768945
lzosource(unstable)(unfixed)
lzo2sourcesqueeze2.03-2+deb6u1DLA-35-1
lzo2sourcewheezy2.06-1+deb7u1DSA-2995-1
lzo2source(unstable)2.08-1752861

Notes

[wheezy] - busybox <no-dsa> (Minor issue)
[squeeze] - busybox <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems