Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is not affected; media hype.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | - | 3.15.2 |
| suse / linux_enterprise_real_time_extension | 11-sp3 | 11-sp3.x |
| opensuse / opensuse | 11.4 | 11.4.x |
| suse / linux_enterprise_server | 11-sp2 | 11-sp2.x |
| canonical / ubuntu_linux | 14.10 | 14.10.x |
| canonical / ubuntu_linux | 12.04 | 12.04.x |
| canonical / ubuntu_linux | 14.04 | 14.04.x |
| canonical / ubuntu_linux | 10.04 | 10.04.x |