Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:30916
HistoryJun 28, 2014 - 12:00 a.m.

[oss-security] LMS-2014-06-16-5: Linux Kernel LZ4

2014-06-2800:00:00
vulners.com
26

Hello All,

A vulnerability has been identified in the Linux kernel LZ4 implementation.
Please find the bug report attached inline.

Best,
Don A. Bailey
Founder / CEO
Lab Mouse Security
https://www.securitymouse.com/

#############################################################################

Lab Mouse Security Report

LMS-2014-06-16-5

Report ID: LMS-2014-06-16-5

CVE ID: CVE-2014-4611

Researcher Name: Don A. Bailey
Researcher Organization: Lab Mouse Security
Researcher Email: donb at securitymouse.com
Researcher Website: www.securitymouse.com

Vulnerability Status: Patched
Vulnerability Embargo: Broken

Vulnerability Class: Integer Overflow
Vulnerability Effect: Memory Corruption
Vulnerability Impact: DoS, RCE
Vulnerability DoS Practicality: Practical
Vulnerability RCE Practicality: Practical
Vulnerability Criticality: High

Vulnerability Scope:
All versions of the Linux kernel (3x/2x) with LZ4 support (lib/lz4).

Functions Affected:
lib/lz4/lz4_decompress.c:lz4_uncompress

Criticality Reasoning

Due to the design of the algorithm, an attacker can specify any desired
offset to a write pointer. The attacker can instrument the write in such
a way as to only write four bytes at a specified offset. Subsequent code
will allow the attacker to escape from the decompression algorithm without
further memory corruption. This may allow the attacker to overwrite
critical structures in memory that affect flow of execution.

Vulnerability Description

An integer overflow can occur when processing any variant of a "literal run"
in the lz4_uncompress function.

Vulnerability Resolution

The Linux kernel team has resolved this vulnerability.