It is suspected that this package is vulnerable to a security vulnerability in LZO. As such we ask maintainers with packages suspected to be vulnerable to verify if the package is (or have been) affected. Please see the information contained in the tracker bug 515246. "An integer overflow may occur when processing any variant of a "literal run" in the lzo1x_decompress_safe function. Each of these three locations is subject to an integer overflow when processing zero bytes.", additional information about the upstream vulnerability is available at http://seclists.org/oss-sec/2014/q2/665 Reproducible: Always
Xen project uses kernel's lzo.c. Since release v4.5.0 it is carrying http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=504f70b624063bbb32d43cdfe6e8409eaac1fa8e which fixed the problem in kernel and since release v4.5.3 it contains the final improved fix http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=10a94ddbd2eb97365872cd14be93837c4613e09d v4.5.0 hit Gentoo repository via https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/app-emulation/xen-tools/xen-tools-4.5.0.ebuild?hideattic=0&view=log Our current stable versions: =app-emulation/xen-4.6.3-r3 =app-emulation/xen-tools-4.6.3-r2 =app-emulation/xen-pvgrub-4.6.3 ...so nothing left for us todo. @ Security: Please vote!
GLSA Vote: No