First published: Tue Jun 24 2014(Updated: )
Don A. Bailey of Lab Mouse Security reported an integer overflow issue in various implementations of LZO (Lempel–Ziv–Oberhumer) and LZ4 compression algorithms. The issue is in the handling of "literal runs" during decompression, and can lead to application crash and, possibly, code execution. This bug is for LZ4 and LZ4 copy embedded in the Linux kernel (as of version 3.11). This issue can not be triggered on 64bit systems today, as it would require input of the size that is beyond capabilities of modern computers. On 32bit systems, this can only affect applications using sufficiently large decompression blocks (16mb+).
Affected Software | Affected Version | How to fix |
---|---|---|
LZ4 | >=3.11 | |
Linux kernel | >=3.11 | |
LZO |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1112436 is high due to potential application crashes and code execution risks.
Fixing REDHAT-BUG-1112436 typically involves updating to the patched versions of the affected LZO and LZ4 libraries.
The affected software includes various implementations of the LZO and LZ4 compression algorithms, particularly versions of LZ4 from 3.11 onwards.
REDHAT-BUG-1112436 is an integer overflow vulnerability that occurs during the decompression process of specific compression algorithms.
The potential impacts of REDHAT-BUG-1112436 include application crashes and the possibility of arbitrary code execution.