Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. lz4
  4. ›
  5. GMS-2014-14

GMS-2014-14: Remote code execution

July 7, 2014

An integer overflow can occur when processing any variant of a “literal run”. When certain payloads are processed, a pointer to an output buffer can be set to an address outside the output buffer. Since the attacker can specify exact offsets in memory, it is very easy to create a reliable Remote Code Execution exploit.

References

  • blog.securitymouse.com/2014/07/hacking-cern-exploiting-python-lz4-for.html

Code Behaviors & Features

Detect and mitigate GMS-2014-14 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.7.0

Fixed versions

  • 0.7.0

Solution

Upgrade to version 0.7.0 or above.

Source file

pypi/lz4/GMS-2014-14.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:11 +0000.