FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

LZO -- potential buffer overrun when processing malicious input data

Affected packages
lzo2 < 2.07
busybox < 1.22.1_2

Details

VuXML ID d1f5e12a-fd5a-11e3-a108-080027ef73ec
Discovery 2014-06-25
Entry 2014-06-26
Modified 2015-01-06

Markus Franz Xaver Johannes Oberhumer reports, in the package's NEWS file:

Fixed a potential integer overflow condition in the "safe" decompressor variants which could result in a possible buffer overrun when processing maliciously crafted compressed input data.

As this issue only affects 32-bit systems and also can only happen if you use uncommonly huge buffer sizes where you have to decompress more than 16 MiB (2^24 bytes) compressed bytes within a single function call, the practical implications are limited.

References

CVE Name CVE-2014-4608
URL http://www.oberhumer.com/opensource/lzo/download/lzo-2.07.tar.gz