Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 515238 - <dev-libs/lzo-2.08: LZO Denial of Service and arbitrary code execution (CVE-2014-4607)
Summary: <dev-libs/lzo-2.08: LZO Denial of Service and arbitrary code execution (CVE-2...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://seclists.org/oss-sec/2014/q2/665
Whiteboard: A3 [glsa cve]
Keywords:
Depends on:
Blocks: 374699 CVE-2014-4607
  Show dependency tree
 
Reported: 2014-06-26 20:53 UTC by Kristian Fiskerstrand (RETIRED)
Modified: 2017-01-02 15:20 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-06-26 20:53:42 UTC
Vulnerability Class: Integer Overflow
Vulnerability Effect: Memory Corruption
Vulnerability Impact: DoS, RCE
Vulnerability DoS Practicality: Practical
Vulnerability RCE Practicality: Impractical
Vulnerability Criticality: High

Vulnerability Scope:
liblzo1:
	- All versions of lzo1 are affected
liblzo2:
	- All versions of lzo2 are affected
	- Except for platforms that set both of the
	  LZO_UNALIGNED_OK_8 and LZO_UNALIGNED_OK_4 preprocessor macros

More information in ${URL}
Comment 1 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-06-26 20:59:09 UTC
From http://www.oberhumer.com/opensource/lzo/: 

LZO 2.07 has been released:

Fixed a potential integer overflow condition in the "safe" decompressor variants which could result in a possible buffer overrun when processing maliciously crafted compressed input data.

As this issue only affects 32-bit systems and also can only happen if you use uncommonly huge buffer sizes where you have to decompress more than 16 MiB (2^24 bytes) compressed bytes within a single function call, the practical implications are limited.
Comment 2 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-06-26 21:16:11 UTC
Just to hilight the matrix of tested arches and versions from ${URL}: 

Vulnerability Tested:
liblzo1:
	x86_64: vulnerable
	i386: vulnerable
	ARM: vulnerable

liblzo2:
	x86_64: not vulnerable
	i386: vulnerable
	ARM: vulnerable
Comment 3 Samuli Suominen (RETIRED) gentoo-dev 2014-06-30 12:22:49 UTC
Please test and stabilize:

=dev-libs/lzo-2.08
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2014-06-30 14:46:54 UTC
Stable for HPPA.
Comment 5 Agostino Sarubbo gentoo-dev 2014-07-04 19:32:37 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-07-05 10:51:48 UTC
x86 stable
Comment 7 Agostino Sarubbo gentoo-dev 2014-07-05 11:31:58 UTC
alpha stable
Comment 8 Agostino Sarubbo gentoo-dev 2014-07-05 12:41:06 UTC
ia64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2014-07-05 12:51:35 UTC
ppc64 stable
Comment 10 Agostino Sarubbo gentoo-dev 2014-07-05 12:54:34 UTC
ppc stable
Comment 11 Agostino Sarubbo gentoo-dev 2014-07-05 12:56:15 UTC
sparc stable
Comment 12 Markus Meier gentoo-dev 2014-07-06 17:46:46 UTC
arm stable, all arches done!
Comment 13 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-07-09 10:29:48 UTC
Cleanup, please!
Comment 14 Yury German Gentoo Infrastructure gentoo-dev 2014-07-10 05:17:22 UTC
Arches, Thank you for your work
Maintainer(s), please drop the vulnerable version(s).

New GLSA Request filed.
Comment 15 Yury German Gentoo Infrastructure gentoo-dev 2014-08-01 03:40:53 UTC
Maintainer(s), please drop the vulnerable version(s).
Comment 16 Yury German Gentoo Infrastructure gentoo-dev 2014-09-16 00:14:36 UTC
Vulnerable versions have been around for two months. 

Maintaner(s): Please drop affected versions, security will remove in 30 days if no response.
Comment 17 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2014-12-26 18:48:47 UTC
Cleanup done
Comment 18 GLSAMaker/CVETool Bot gentoo-dev 2017-01-02 15:20:34 UTC
This issue was resolved and addressed in
 GLSA 201701-14 at https://security.gentoo.org/glsa/201701-14
by GLSA coordinator Thomas Deutschmann (whissi).