Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1112418 - (CVE-2014-4607) CVE-2014-4607 lzo: lzo1x_decompress_safe() integer overflow
CVE-2014-4607 lzo: lzo1x_decompress_safe() integer overflow
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140626,repor...
: Security
Depends On: 1131795 1112539 1112540 1112541 1112542 1112927 1112928 1113874 1113875 1131789 1131790 1131791 1131792 1131793 1131794 1131796 1132282
Blocks: 1112414
  Show dependency treegraph
 
Reported: 2014-06-23 18:55 EDT by Kurt Seifried
Modified: 2015-11-25 05:07 EST (History)
33 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An integer overflow flaw was found in the way the lzo library decompressed certain archives compressed with the LZO algorithm. An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library, would cause that application to crash or, potentially, execute arbitrary code.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-07-10 00:35:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Backported patch (13.53 KB, patch)
2014-06-30 08:46 EDT, Jaroslav Škarvada
no flags Details | Diff
Backported patch (7.22 KB, patch)
2014-06-30 12:40 EDT, Jaroslav Škarvada
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0861 normal SHIPPED_LIVE Moderate: lzo security update 2014-07-09 16:38:41 EDT

  None (edit)
Description Kurt Seifried 2014-06-23 18:55:47 EDT
Don A. Bailey of securitymouse.com reports:

Vulnerability Description
-------------------------
An integer overflow may occur when processing any variant of a "literal run"
in the lzo1x_decompress_safe function. Each of these three locations is 
subject to an integer overflow when processing zero bytes. 

This exposes the code that copies literals to memory corruption.

It should be noted that if the target is 64bit liblzo2, the overflow is still
possible, but impractical. An overflow would require so much input data that
an attack would be infeasible even in modern computers.

This issue is LAZARUS.1
Comment 4 Vincent Danen 2014-06-26 22:47:36 EDT
This is now public:

http://seclists.org/oss-sec/2014/q2/665
Comment 5 Murray McAllister 2014-06-27 02:12:52 EDT
Created lzo tracking bugs for this issue:

Affects: fedora-all [bug 1113874]
Affects: epel-5 [bug 1113875]
Comment 7 Huzaifa S. Sidhpurwala 2014-06-27 05:01:15 EDT
This issue affects the version of lzo as shipped with Red Hat Enterprise Linux 6. 

Red Hat Enterprise Linux 7 only support 64-bit architectures. Since exploiting this issue on 64-bit platforms is not feasible given the amount of input data that is necessary to trigger the integer overflow, we are currently not planning planning to fix this issue in Red Hat Enterprise Linux 7.
Comment 8 Huzaifa S. Sidhpurwala 2014-06-30 00:51:34 EDT
This issue is fixed in lzo-2.0.7. Upstream mentions the following on its website:

Fixed a potential integer overflow condition in the "safe" decompressor variants which could result in a possible buffer overrun when processing maliciously crafted compressed input data.

POTENTIAL SECURITY ISSUE. CVE-2014-4607. All users are recommended to upgrade immediately.

Fortunately this issue only affects 32-bit systems and also can only happen if you use uncommonly huge buffer sizes where you have to decompress more than 16 MiB (> 2^24 bytes) untrusted compressed bytes within a single function call, so the practical implications are limited.

Also I personally do not know about any client program that uses such a huge logical block size and actually is affected.

http://www.oberhumer.com/opensource/lzo/#news
Comment 9 Jaroslav Škarvada 2014-06-30 08:46:49 EDT
Created attachment 913398 [details]
Backported patch

Backport from lzo-2.07.
Comment 10 Jaroslav Škarvada 2014-06-30 12:40:41 EDT
Created attachment 913482 [details]
Backported patch
Comment 15 Martin Prpič 2014-07-03 08:08:25 EDT
Acknowledgements:

Red Hat would like to thank Don A. Bailey from Lab Mouse Security for reporting this issue.
Comment 16 Martin Prpič 2014-07-04 04:55:26 EDT
IssueDescription:

An integer overflow flaw was found in the way the lzo library decompressed certain archives compressed with the LZO algorithm. An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library, would cause that application to crash or, potentially, execute arbitrary code.
Comment 17 errata-xmlrpc 2014-07-09 07:21:33 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2014:0861 https://rhn.redhat.com/errata/RHSA-2014-0861.html
Comment 18 Murray McAllister 2014-08-04 02:49:35 EDT
The kdenetwork package may be affected, as it includes krfb:

http://www.kde.org/info/security/advisory-20140803-1.txt
Comment 20 Fedora Update System 2014-08-15 20:26:53 EDT
krfb-4.13.3-4.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 21 Fedora Update System 2014-08-15 20:29:01 EDT
krfb-4.11.5-3.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 22 Murray McAllister 2014-08-20 01:27:50 EDT
Created remmina tracking bugs for this issue:

Affects: fedora-all [bug 1131796]
Comment 23 Murray McAllister 2014-08-20 01:27:56 EDT
Created icecream tracking bugs for this issue:

Affects: fedora-all [bug 1131794]
Affects: epel-all [bug 1131795]
Comment 24 Murray McAllister 2014-08-20 01:28:00 EDT
Created distcc tracking bugs for this issue:

Affects: fedora-all [bug 1131791]
Affects: epel-6 [bug 1131792]
Comment 25 Murray McAllister 2014-08-20 01:28:04 EDT
Created grub2 tracking bugs for this issue:

Affects: fedora-all [bug 1131793]
Comment 26 Murray McAllister 2014-08-20 01:28:08 EDT
Created krfb tracking bugs for this issue:

Affects: fedora-all [bug 1131789]
Comment 27 Murray McAllister 2014-08-20 01:28:12 EDT
Created blender tracking bugs for this issue:

Affects: fedora-all [bug 1131790]
Comment 28 Murray McAllister 2014-08-20 01:30:13 EDT
According to https://bugs.mageia.org/show_bug.cgi?id=13943 a number of other packages may embed lzo. I checked the build logs for the above bugs and believe they do embed it.
Comment 29 David Walser 2014-08-20 17:02:48 EDT
Hi Murray,

I believe you missed the dump package.  I checked the dump-debuginfo package in Fedora Rawhide and found these files, which suggests that the bundled minilzo is indeed built:
/usr/src/debug/dump-0.4b44/compat/lib/minilzo.c
/usr/src/debug/dump-0.4b44/compat/include/minilzo.h
/usr/src/debug/dump-0.4b44/compat/include/lzoconf.h
Comment 30 Murray McAllister 2014-08-21 00:05:49 EDT
Created dump tracking bugs for this issue:

Affects: fedora-all [bug 1132282]
Comment 31 Murray McAllister 2014-08-21 00:06:32 EDT
(In reply to David Walser from comment #29)
> Hi Murray,
> 
> I believe you missed the dump package.  I checked the dump-debuginfo package
> in Fedora Rawhide and found these files, which suggests that the bundled
> minilzo is indeed built:
> /usr/src/debug/dump-0.4b44/compat/lib/minilzo.c
> /usr/src/debug/dump-0.4b44/compat/include/minilzo.h
> /usr/src/debug/dump-0.4b44/compat/include/lzoconf.h

I did miss it, thank you!
Comment 32 Fedora Update System 2014-08-29 23:52:50 EDT
distcc-3.2rc1-4.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 33 Fedora Update System 2014-08-29 23:55:27 EDT
distcc-3.2rc1-8.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 34 Fedora Update System 2014-09-06 16:31:57 EDT
distcc-3.2rc1-2.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 35 Fedora Update System 2014-09-23 00:26:34 EDT
icecream-1.0.1-8.20140822git.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 36 Fedora Update System 2014-11-19 10:57:31 EST
icecream-1.0.1-8.20140822git.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 37 Fedora Update System 2014-11-19 10:58:47 EST
icecream-1.0.1-8.20140822git.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 38 Fedora Update System 2014-12-11 23:23:52 EST
grub2-2.02-0.13.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 39 Fedora Update System 2014-12-11 23:31:27 EST
grub2-2.00-27.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 40 Fedora Update System 2014-12-16 23:44:50 EST
grub2-2.00-27.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 41 Fedora Update System 2015-02-25 08:29:52 EST
dump-0.4-0.24.b44.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.