Integer overflow in the get_len function in libavutil/lzo.c in Libav before 0.8.13, 9.x before 9.14, and 10.x before 10.2 allows remote attackers to execute arbitrary code via a crafted Literal Run.Referenceshttp://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.htmlhttp://www.openwall.com/lists/oss-security/2014/06/26/22https://libav.org/news/#2014-06-27