CVE-2014-4715

NameCVE-2014-4715
DescriptionYann Collet LZ4 before r119, when used on certain 32-bit platforms that allocate memory beyond 0x80000000, does not properly detect integer overflows, which allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run, a different vulnerability than CVE-2014-4611.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lz4 (PTS)jessie, jessie (lts)0.0~r122-2+deb8u1fixed
stretch (security), stretch (lts), stretch0.0~r131-2+deb9u1fixed
buster (security), buster, buster (lts)1.8.3-1+deb10u1fixed
bullseye1.9.3-2fixed
bookworm1.9.4-1fixed
sid, trixie1.9.4-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lz4source(unstable)0.0~r119-1

Notes

https://code.google.com/p/lz4/issues/detail?id=134
https://code.google.com/p/lz4/source/detail?r=119

Search for package or bug name: Reporting problems