...
Don Bailey [Bailey 2014] describes an unsigned integer overflow wrap vulnerability in the LZO compression algorithm which can be exploited in some implementations.
...
...
Don Bailey [Bailey 2014] describes an unsigned integer overflow wrap vulnerability in the LZO compression algorithm which can be exploited in some implementations.
...