It is suspected that this package is vulnerable to a security vulnerability in LZO. As such we ask maintainers with packages suspected to be vulnerable to verify if the package is (or have been) affected.
Please see the information contained in the tracker bug 515246. "An integer overflow may occur when processing any variant of a "literal run" in the lzo1x_decompress_safe function. Each of these three locations is subject to an integer overflow when processing zero bytes.", additional information about the upstream vulnerability is available at http://seclists.org/oss-sec/2014/q2/665
Upstream bug filed at https://bugs.busybox.net/show_bug.cgi?id=7238
The upstream bug is has been acted upon and this is "Fixed in git". As far as I can see the commit in question is http://git.busybox.net/busybox/commit/?id=a9dc7c2f59dc5e92870d2d46316ea5c1f14740e3
Commit message: Add lzop fix from upstream
Commit a9dc7c2f59dc5e92870d2d46316ea5c1f14740e3 can also be cherry-picked to 1.20 and 1.21 branches, which are the marked as stable in Gentoo tree. Should we bump those ebuilds too?
1.23.1 (which I just added to the tree) has this fix as well as addressing bug 537978 - (CVE-2014-9645).
This issue was resolved and addressed in
GLSA 201503-13 at https://security.gentoo.org/glsa/201503-13
by GLSA coordinator Mikle Kolyada (Zlogene).