Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.
References
Configurations
History
28 Sep 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Sep 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Sep 2021, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Sep 2021, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Sep 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Sep 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2014-07-03 04:22
Updated : 2024-02-04 18:35
NVD link : CVE-2014-4611
Mitre link : CVE-2014-4611
CVE.ORG link : CVE-2014-4611
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation