CVSS 7.3 · HIGH
CVE-2014-4608
Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype.
View on NVDSeverity
Score: 7.3(HIGH)
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LAV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE):
CWE-190EPSS
Probability of exploitation (next 30 days): 0.0860 (8.6%)
Percentile: 92.4%
EPSS: 2026-05-06
Affects
linux:linux_kernelopensuse:opensusesuse:linux_enterprise_real_time_extensionsuse:linux_enterprise_servercanonical:ubuntu_linuxTechnical description
Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype.
Published: 7/3/2014, 4:22:15 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2015-0062.html
- http://secunia.com/advisories/60011
- http://secunia.com/advisories/60174