Activity log for bug #1335313

Date Who What changed Old value New value Message
2014-06-27 20:13:58 John Johansen bug added bug
2014-06-27 20:14:00 John Johansen tags kernel-cve-tracking-bug
2014-06-27 20:14:01 John Johansen information type Public Public Security
2014-06-27 20:14:02 John Johansen cve linked 2014-4608
2014-06-27 20:14:13 John Johansen nominated for series Ubuntu Utopic
2014-06-27 20:14:14 John Johansen bug task added linux (Ubuntu Utopic)
2014-06-27 20:14:14 John Johansen bug task added linux-fsl-imx51 (Ubuntu Utopic)
2014-06-27 20:14:14 John Johansen bug task added linux-mvl-dove (Ubuntu Utopic)
2014-06-27 20:14:14 John Johansen bug task added linux-ec2 (Ubuntu Utopic)
2014-06-27 20:14:14 John Johansen bug task added linux-ti-omap4 (Ubuntu Utopic)
2014-06-27 20:14:14 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Utopic)
2014-06-27 20:14:14 John Johansen bug task added linux-lts-backport-natty (Ubuntu Utopic)
2014-06-27 20:14:17 John Johansen nominated for series Ubuntu Trusty
2014-06-27 20:14:19 John Johansen bug task added linux (Ubuntu Trusty)
2014-06-27 20:14:19 John Johansen bug task added linux-fsl-imx51 (Ubuntu Trusty)
2014-06-27 20:14:19 John Johansen bug task added linux-mvl-dove (Ubuntu Trusty)
2014-06-27 20:14:19 John Johansen bug task added linux-ec2 (Ubuntu Trusty)
2014-06-27 20:14:19 John Johansen bug task added linux-ti-omap4 (Ubuntu Trusty)
2014-06-27 20:14:19 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Trusty)
2014-06-27 20:14:19 John Johansen bug task added linux-lts-backport-natty (Ubuntu Trusty)
2014-06-27 20:14:21 John Johansen nominated for series Ubuntu Saucy
2014-06-27 20:14:22 John Johansen bug task added linux (Ubuntu Saucy)
2014-06-27 20:14:22 John Johansen bug task added linux-fsl-imx51 (Ubuntu Saucy)
2014-06-27 20:14:22 John Johansen bug task added linux-mvl-dove (Ubuntu Saucy)
2014-06-27 20:14:22 John Johansen bug task added linux-ec2 (Ubuntu Saucy)
2014-06-27 20:14:22 John Johansen bug task added linux-ti-omap4 (Ubuntu Saucy)
2014-06-27 20:14:22 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Saucy)
2014-06-27 20:14:22 John Johansen bug task added linux-lts-backport-natty (Ubuntu Saucy)
2014-06-27 20:14:24 John Johansen nominated for series Ubuntu Precise
2014-06-27 20:14:25 John Johansen bug task added linux (Ubuntu Precise)
2014-06-27 20:14:25 John Johansen bug task added linux-fsl-imx51 (Ubuntu Precise)
2014-06-27 20:14:25 John Johansen bug task added linux-mvl-dove (Ubuntu Precise)
2014-06-27 20:14:25 John Johansen bug task added linux-ec2 (Ubuntu Precise)
2014-06-27 20:14:25 John Johansen bug task added linux-ti-omap4 (Ubuntu Precise)
2014-06-27 20:14:25 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Precise)
2014-06-27 20:14:25 John Johansen bug task added linux-lts-backport-natty (Ubuntu Precise)
2014-06-27 20:14:28 John Johansen nominated for series Ubuntu Lucid
2014-06-27 20:14:29 John Johansen bug task added linux (Ubuntu Lucid)
2014-06-27 20:14:29 John Johansen bug task added linux-fsl-imx51 (Ubuntu Lucid)
2014-06-27 20:14:29 John Johansen bug task added linux-mvl-dove (Ubuntu Lucid)
2014-06-27 20:14:29 John Johansen bug task added linux-ec2 (Ubuntu Lucid)
2014-06-27 20:14:29 John Johansen bug task added linux-ti-omap4 (Ubuntu Lucid)
2014-06-27 20:14:29 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Lucid)
2014-06-27 20:14:29 John Johansen bug task added linux-lts-backport-natty (Ubuntu Lucid)
2014-06-27 20:14:44 John Johansen linux-armadaxp (Ubuntu Saucy): status New Invalid
2014-06-27 20:14:47 John Johansen linux-armadaxp (Ubuntu Trusty): status New Invalid
2014-06-27 20:14:50 John Johansen linux-armadaxp (Ubuntu Lucid): status New Invalid
2014-06-27 20:14:53 John Johansen linux-armadaxp (Ubuntu Utopic): status New Invalid
2014-06-27 20:14:56 John Johansen linux-ec2 (Ubuntu Precise): status New Invalid
2014-06-27 20:14:59 John Johansen linux-ec2 (Ubuntu Saucy): status New Invalid
2014-06-27 20:15:04 John Johansen linux-ec2 (Ubuntu Trusty): status New Invalid
2014-06-27 20:15:08 John Johansen linux-ec2 (Ubuntu Utopic): status New Invalid
2014-06-27 20:15:11 John Johansen linux-lts-quantal (Ubuntu Saucy): status New Invalid
2014-06-27 20:15:14 John Johansen linux-lts-quantal (Ubuntu Trusty): status New Invalid
2014-06-27 20:15:18 John Johansen linux-lts-quantal (Ubuntu Lucid): status New Invalid
2014-06-27 20:15:22 John Johansen linux-lts-quantal (Ubuntu Utopic): status New Invalid
2014-06-27 20:15:26 John Johansen linux-mvl-dove (Ubuntu Precise): status New Invalid
2014-06-27 20:15:28 John Johansen linux-mvl-dove (Ubuntu Saucy): status New Invalid
2014-06-27 20:15:32 John Johansen linux-mvl-dove (Ubuntu Trusty): status New Invalid
2014-06-27 20:15:37 John Johansen linux-mvl-dove (Ubuntu Utopic): status New Invalid
2014-06-27 20:15:39 John Johansen linux-lts-saucy (Ubuntu Saucy): status New Invalid
2014-06-27 20:15:43 John Johansen linux-lts-saucy (Ubuntu Trusty): status New Invalid
2014-06-27 20:15:46 John Johansen linux-lts-saucy (Ubuntu Lucid): status New Invalid
2014-06-27 20:15:49 John Johansen linux-lts-saucy (Ubuntu Utopic): status New Invalid
2014-06-27 20:15:52 John Johansen linux-ti-omap4 (Ubuntu Trusty): status New Invalid
2014-06-27 20:15:56 John Johansen linux-ti-omap4 (Ubuntu Lucid): status New Invalid
2014-06-27 20:16:00 John Johansen linux-ti-omap4 (Ubuntu Utopic): status New Invalid
2014-06-27 20:16:03 John Johansen linux-fsl-imx51 (Ubuntu Precise): status New Invalid
2014-06-27 20:16:07 John Johansen linux-fsl-imx51 (Ubuntu Saucy): status New Invalid
2014-06-27 20:16:11 John Johansen linux-fsl-imx51 (Ubuntu Trusty): status New Invalid
2014-06-27 20:16:15 John Johansen linux-fsl-imx51 (Ubuntu Utopic): status New Invalid
2014-06-27 20:16:18 John Johansen linux-lts-raring (Ubuntu Saucy): status New Invalid
2014-06-27 20:16:22 John Johansen linux-lts-raring (Ubuntu Trusty): status New Invalid
2014-06-27 20:16:25 John Johansen linux-lts-raring (Ubuntu Lucid): status New Invalid
2014-06-27 20:16:28 John Johansen linux-lts-raring (Ubuntu Utopic): status New Invalid
2014-06-27 20:16:31 John Johansen description Placeholder All versions of the Linux kernel (3x/2x) with LZO support (lib/lzo) that set the HAVE_EFFICIENT_UNALIGNED_ACCESS configuration option. Currently, this seems to include PowerPC and i386. Vulnerability Tested: - Via btrfs - Stand alone Functions Affected: lib/lzo/lzo1x_decompress_safe.c:lzo1x_decompress_safe Criticality Reasoning --------------------- While some variants of this LZO algorithm flaw result in Remote Code Execution (RCE), it is unlikely that the Linux kernel variant can. This is due to the fact that control of the memory region that is overwritten can not be controlled in a fashion that will result in the overwrite of objects critical to the flow of execution. However, it may be possible to overwrite "business logic" data in certain circumstances, by corrupting adjacent objects in memory. Linux's guard pages should mitigate this, however. Because RCE is impractical, Object Over Write (OOM) is only practical in constrained scenarios (read: impractical), and DoS is practical, the criticality level of this issue should be defined as Moderate. Furthermore, a Moderate definition is needed because of the use of LZO in btrfs, and the potential use of LZO in networking, opening up the potential for remote instrumentation of this vulnerability. It is notable that SuSE recently reported that they will start using btrfs by default later this year. Lastly, only certain platforms are affected, decreasing impact. Vulnerability Description ------------------------- An integer overflow can occur when processing any variant of a "literal run" in the lzo1x_decompress_safe function. Each of these three locations is subject to an integer overflow when processing zero bytes. The following code depicts how the size of the literal array is generated: if (likely(state == 0)) { if (unlikely(t == 0)) { while (unlikely(*ip == 0)) { t += 255; ip++; NEED_IP(1); } t += 15 + *ip++; } t += 3; As long as a zero byte (0x00) is encountered, the variable 't' will be incremented by 255. Using approximately sixteen megabytes of zeros, 't' will accumulate to a maximum unsigned integer value on a 32bit architecture. In combination with the following code, the value of 't' will overflow: copy_literal_run: #if defined(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) if (likely(HAVE_IP(t + 15) && HAVE_OP(t + 15))) { const unsigned char *ie = ip + t; unsigned char *oe = op + t; do { COPY8(op, ip); op += 8; ip += 8; COPY8(op, ip); op += 8; ip += 8; } while (ip < ie); ip = ie; op = oe; The HAVE_OP() check will always pass in this case, because the size check within the macro will evaluate based on the overflown integer, not the value of 't'. This exposes the code that copies literals to memory corruption. An interesting side effect of the vulnerable code shown above is that the value of 'op' can point to a region of memory just before the start of 'out'. It should be noted that the following code unintentionally saves all other architectures from exposure: #endif { NEED_OP(t); NEED_IP(t + 3); do { *op++ = *ip++; } while (--t > 0); } NEED_OP() correctly tests the value of 't' here, disallowing the potential for overflow. It should be noted that if 't' is a 64bit integer, the overflow is still possible, but impractical. An overflow would require so much input data that an attack would obviously be infeasible even on modern computers. Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 206a81c18401c0cde6e579164f752c4b147324ce
2014-06-27 20:16:33 John Johansen linux-armadaxp (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:16:36 John Johansen linux-armadaxp (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:16:39 John Johansen linux-armadaxp (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:16:42 John Johansen linux-armadaxp (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:16:46 John Johansen linux-armadaxp (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:16:49 John Johansen linux-ec2 (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:16:52 John Johansen linux-ec2 (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:16:55 John Johansen linux-ec2 (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:16:57 John Johansen linux-ec2 (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:16:59 John Johansen linux-ec2 (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:17:03 John Johansen linux-lts-quantal (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:17:05 John Johansen linux-lts-quantal (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:17:08 John Johansen linux-lts-quantal (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:17:11 John Johansen linux-lts-quantal (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:17:13 John Johansen linux-lts-quantal (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:17:16 John Johansen linux-mvl-dove (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:17:20 John Johansen linux-mvl-dove (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:17:23 John Johansen linux-mvl-dove (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:17:26 John Johansen linux-mvl-dove (Ubuntu Lucid): status New Invalid
2014-06-27 20:17:28 John Johansen linux-mvl-dove (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:17:31 John Johansen linux-mvl-dove (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:17:34 John Johansen linux-lts-saucy (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:17:36 John Johansen linux-lts-saucy (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:17:39 John Johansen linux-lts-saucy (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:17:42 John Johansen linux-lts-saucy (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:17:45 John Johansen linux-lts-saucy (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:17:48 John Johansen linux (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:17:52 John Johansen linux (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:17:54 John Johansen linux (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:17:58 John Johansen linux (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:18:02 John Johansen linux (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:18:05 John Johansen linux-ti-omap4 (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:18:20 John Johansen linux-ti-omap4 (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:18:23 John Johansen linux-ti-omap4 (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:18:27 John Johansen linux-ti-omap4 (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:18:30 John Johansen linux-ti-omap4 (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:18:33 John Johansen linux-fsl-imx51 (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:18:35 John Johansen linux-fsl-imx51 (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:18:38 John Johansen linux-fsl-imx51 (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:18:42 John Johansen linux-fsl-imx51 (Ubuntu Lucid): status New Invalid
2014-06-27 20:18:46 John Johansen linux-fsl-imx51 (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:18:48 John Johansen linux-fsl-imx51 (Ubuntu Utopic): importance Undecided Medium
2014-06-27 20:18:50 John Johansen linux-lts-raring (Ubuntu Precise): importance Undecided Medium
2014-06-27 20:18:53 John Johansen linux-lts-raring (Ubuntu Saucy): importance Undecided Medium
2014-06-27 20:18:55 John Johansen linux-lts-raring (Ubuntu Trusty): importance Undecided Medium
2014-06-27 20:18:58 John Johansen linux-lts-raring (Ubuntu Lucid): importance Undecided Medium
2014-06-27 20:19:00 John Johansen linux-lts-raring (Ubuntu Utopic): importance Undecided Medium
2014-07-01 03:38:03 John Johansen linux (Ubuntu Utopic): status New Fix Committed
2014-07-03 14:35:44 Launchpad Janitor branch linked lp:ubuntu/precise-proposed/linux-lts-trusty
2014-07-08 12:07:53 John Johansen linux-armadaxp (Ubuntu Precise): status New Fix Committed
2014-07-08 12:07:58 John Johansen linux-ec2 (Ubuntu Lucid): status New Fix Committed
2014-07-08 12:08:01 John Johansen linux-lts-quantal (Ubuntu Precise): status New Fix Committed
2014-07-08 12:08:05 John Johansen linux-lts-saucy (Ubuntu Precise): status New Fix Committed
2014-07-08 12:08:09 John Johansen linux (Ubuntu Precise): status New Fix Committed
2014-07-08 12:08:13 John Johansen linux (Ubuntu Saucy): status New Fix Committed
2014-07-08 12:08:16 John Johansen linux (Ubuntu Trusty): status New Fix Committed
2014-07-08 12:08:19 John Johansen linux (Ubuntu Lucid): status New Fix Committed
2014-07-08 12:08:21 John Johansen linux-lts-raring (Ubuntu Precise): status New Fix Committed
2014-07-10 08:01:41 John Johansen description All versions of the Linux kernel (3x/2x) with LZO support (lib/lzo) that set the HAVE_EFFICIENT_UNALIGNED_ACCESS configuration option. Currently, this seems to include PowerPC and i386. Vulnerability Tested: - Via btrfs - Stand alone Functions Affected: lib/lzo/lzo1x_decompress_safe.c:lzo1x_decompress_safe Criticality Reasoning --------------------- While some variants of this LZO algorithm flaw result in Remote Code Execution (RCE), it is unlikely that the Linux kernel variant can. This is due to the fact that control of the memory region that is overwritten can not be controlled in a fashion that will result in the overwrite of objects critical to the flow of execution. However, it may be possible to overwrite "business logic" data in certain circumstances, by corrupting adjacent objects in memory. Linux's guard pages should mitigate this, however. Because RCE is impractical, Object Over Write (OOM) is only practical in constrained scenarios (read: impractical), and DoS is practical, the criticality level of this issue should be defined as Moderate. Furthermore, a Moderate definition is needed because of the use of LZO in btrfs, and the potential use of LZO in networking, opening up the potential for remote instrumentation of this vulnerability. It is notable that SuSE recently reported that they will start using btrfs by default later this year. Lastly, only certain platforms are affected, decreasing impact. Vulnerability Description ------------------------- An integer overflow can occur when processing any variant of a "literal run" in the lzo1x_decompress_safe function. Each of these three locations is subject to an integer overflow when processing zero bytes. The following code depicts how the size of the literal array is generated: if (likely(state == 0)) { if (unlikely(t == 0)) { while (unlikely(*ip == 0)) { t += 255; ip++; NEED_IP(1); } t += 15 + *ip++; } t += 3; As long as a zero byte (0x00) is encountered, the variable 't' will be incremented by 255. Using approximately sixteen megabytes of zeros, 't' will accumulate to a maximum unsigned integer value on a 32bit architecture. In combination with the following code, the value of 't' will overflow: copy_literal_run: #if defined(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) if (likely(HAVE_IP(t + 15) && HAVE_OP(t + 15))) { const unsigned char *ie = ip + t; unsigned char *oe = op + t; do { COPY8(op, ip); op += 8; ip += 8; COPY8(op, ip); op += 8; ip += 8; } while (ip < ie); ip = ie; op = oe; The HAVE_OP() check will always pass in this case, because the size check within the macro will evaluate based on the overflown integer, not the value of 't'. This exposes the code that copies literals to memory corruption. An interesting side effect of the vulnerable code shown above is that the value of 'op' can point to a region of memory just before the start of 'out'. It should be noted that the following code unintentionally saves all other architectures from exposure: #endif { NEED_OP(t); NEED_IP(t + 3); do { *op++ = *ip++; } while (--t > 0); } NEED_OP() correctly tests the value of 't' here, disallowing the potential for overflow. It should be noted that if 't' is a 64bit integer, the overflow is still possible, but impractical. An overflow would require so much input data that an attack would obviously be infeasible even on modern computers. Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 206a81c18401c0cde6e579164f752c4b147324ce ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 206a81c18401c0cde6e579164f752c4b147324ce
2014-07-11 16:45:17 Launchpad Janitor branch linked lp:ubuntu/trusty-proposed/linux-keystone
2014-07-16 19:35:14 Launchpad Janitor linux (Ubuntu Lucid): status Fix Committed Fix Released
2014-07-16 19:35:14 Launchpad Janitor cve linked 2014-4699
2014-07-16 19:35:14 Launchpad Janitor cve linked 2014-4943
2014-07-16 19:35:42 Launchpad Janitor linux-ec2 (Ubuntu Lucid): status Fix Committed Fix Released
2014-07-16 19:35:58 Launchpad Janitor linux-ec2 (Ubuntu Lucid): status Fix Committed Fix Released
2014-07-16 19:41:07 Launchpad Janitor linux-lts-saucy (Ubuntu Precise): status Fix Committed Fix Released
2014-07-16 19:41:07 Launchpad Janitor cve linked 2014-4611
2014-07-16 19:53:21 Launchpad Janitor linux (Ubuntu Saucy): status Fix Committed Fix Released
2014-07-16 19:59:27 Launchpad Janitor linux (Ubuntu Trusty): status Fix Committed Fix Released
2014-07-17 22:10:46 John Johansen linux-ti-omap4 (Ubuntu Precise): status New Fix Committed
2014-10-20 15:19:35 John Johansen bug task deleted linux-armadaxp (Ubuntu Saucy)
2014-10-20 15:19:37 John Johansen bug task deleted linux-ec2 (Ubuntu Saucy)
2014-10-20 15:19:38 John Johansen bug task deleted linux-lts-saucy (Ubuntu Saucy)
2014-10-20 15:19:40 John Johansen bug task deleted linux-lts-quantal (Ubuntu Saucy)
2014-10-20 15:19:41 John Johansen bug task deleted linux-mvl-dove (Ubuntu Saucy)
2014-10-20 15:19:45 John Johansen bug task deleted linux (Ubuntu Saucy)
2014-10-20 15:19:46 John Johansen bug task deleted linux-fsl-imx51 (Ubuntu Saucy)
2014-10-20 15:19:48 John Johansen bug task deleted linux-ti-omap4 (Ubuntu Saucy)
2014-10-20 15:19:51 John Johansen bug task deleted linux-lts-raring (Ubuntu Saucy)
2014-10-20 15:19:53 John Johansen linux-lts-quantal (Ubuntu Precise): status Fix Committed Fix Released
2014-10-20 15:19:59 John Johansen linux (Ubuntu Precise): status Fix Committed Fix Released
2014-10-20 15:20:04 John Johansen linux-ti-omap4 (Ubuntu Precise): status Fix Committed Fix Released
2014-10-20 15:20:07 John Johansen linux-lts-raring (Ubuntu Precise): status Fix Committed Fix Released
2014-10-20 15:20:11 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 206a81c18401c0cde6e579164f752c4b147324ce ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 206a81c18401c0cde6e579164f752c4b147324ce Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4
2014-10-27 19:49:58 John Johansen nominated for series Ubuntu Vivid
2014-10-27 19:49:59 John Johansen bug task added linux (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-fsl-imx51 (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-mvl-dove (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-ec2 (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-ti-omap4 (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-lts-backport-natty (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-armadaxp (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-lts-quantal (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-lts-raring (Ubuntu Vivid)
2014-10-27 19:49:59 John Johansen bug task added linux-lts-saucy (Ubuntu Vivid)
2014-11-24 16:09:34 Launchpad Janitor linux-armadaxp (Ubuntu Precise): status Fix Committed Fix Released
2014-11-24 16:09:35 Launchpad Janitor linux-armadaxp (Ubuntu Precise): status Fix Committed Fix Released
2014-12-02 18:10:50 John Johansen linux (Ubuntu Utopic): status Fix Committed Fix Released
2014-12-02 18:10:58 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 206a81c18401c0cde6e579164f752c4b147324ce Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
2014-12-02 18:11:05 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4
2014-12-03 11:52:38 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
2014-12-03 11:52:46 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4
2014-12-03 12:02:26 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
2014-12-03 12:02:31 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4
2014-12-03 12:24:10 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
2014-12-03 12:24:20 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4
2014-12-04 10:47:53 John Johansen description ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype." Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 72cf90124e87d975d0b2114d930808c58b4c05e4 Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1 af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
2014-12-05 07:05:29 Rolf Leggewie linux-lts-backport-maverick (Ubuntu Saucy): status New Won't Fix
2014-12-05 07:05:37 Rolf Leggewie linux-lts-backport-natty (Ubuntu Saucy): status New Won't Fix
2014-12-08 17:29:36 John Johansen linux-lts-trusty (Ubuntu Precise): status New Fix Released
2014-12-08 17:29:42 John Johansen linux-lts-trusty (Ubuntu Precise): importance Undecided Medium
2014-12-08 17:29:45 John Johansen linux-lts-trusty (Ubuntu Trusty): status New Invalid
2014-12-08 17:29:49 John Johansen linux-lts-trusty (Ubuntu Trusty): importance Undecided Medium
2014-12-08 17:29:51 John Johansen linux-lts-trusty (Ubuntu Lucid): status New Invalid
2014-12-08 17:29:56 John Johansen linux-lts-trusty (Ubuntu Lucid): importance Undecided Medium
2014-12-08 17:29:58 John Johansen linux-lts-trusty (Ubuntu Vivid): status New Invalid
2014-12-08 17:30:01 John Johansen linux-lts-trusty (Ubuntu Vivid): importance Undecided Medium
2014-12-08 17:30:05 John Johansen linux-lts-trusty (Ubuntu Utopic): status New Invalid
2014-12-08 17:30:09 John Johansen linux-lts-trusty (Ubuntu Utopic): importance Undecided Medium
2014-12-08 17:30:13 John Johansen linux-lts-utopic (Ubuntu Precise): status New Invalid
2014-12-08 17:30:17 John Johansen linux-lts-utopic (Ubuntu Precise): importance Undecided Medium
2014-12-08 17:30:20 John Johansen linux-lts-utopic (Ubuntu Trusty): status New Invalid
2014-12-08 17:30:24 John Johansen linux-lts-utopic (Ubuntu Trusty): importance Undecided Medium
2014-12-08 17:30:28 John Johansen linux-lts-utopic (Ubuntu Lucid): status New Invalid
2014-12-08 17:30:32 John Johansen linux-lts-utopic (Ubuntu Lucid): importance Undecided Medium
2014-12-08 17:30:35 John Johansen linux-lts-utopic (Ubuntu Vivid): status New Invalid
2014-12-08 17:30:39 John Johansen linux-lts-utopic (Ubuntu Vivid): importance Undecided Medium
2014-12-08 17:30:41 John Johansen linux-lts-utopic (Ubuntu Utopic): status New Invalid
2014-12-08 17:30:45 John Johansen linux-lts-utopic (Ubuntu Utopic): importance Undecided Medium
2015-01-28 17:35:17 John Johansen linux-flo (Ubuntu Precise): status New Invalid
2015-01-28 17:35:22 John Johansen linux-flo (Ubuntu Precise): importance Undecided Medium
2015-01-28 17:35:25 John Johansen linux-flo (Ubuntu Trusty): status New Invalid
2015-01-28 17:35:29 John Johansen linux-flo (Ubuntu Trusty): importance Undecided Medium
2015-01-28 17:35:32 John Johansen linux-flo (Ubuntu Lucid): status New Invalid
2015-01-28 17:35:37 John Johansen linux-flo (Ubuntu Lucid): importance Undecided Medium
2015-01-28 17:35:40 John Johansen linux-flo (Ubuntu Vivid): importance Undecided Medium
2015-01-28 17:35:44 John Johansen linux-flo (Ubuntu Utopic): importance Undecided Medium
2015-01-28 17:35:47 John Johansen linux-goldfish (Ubuntu Precise): status New Invalid
2015-01-28 17:35:51 John Johansen linux-goldfish (Ubuntu Precise): importance Undecided Medium
2015-01-28 17:35:54 John Johansen linux-goldfish (Ubuntu Trusty): status New Invalid
2015-01-28 17:35:58 John Johansen linux-goldfish (Ubuntu Trusty): importance Undecided Medium
2015-01-28 17:36:01 John Johansen linux-goldfish (Ubuntu Lucid): status New Invalid
2015-01-28 17:36:06 John Johansen linux-goldfish (Ubuntu Lucid): importance Undecided Medium
2015-01-28 17:36:09 John Johansen linux-goldfish (Ubuntu Vivid): importance Undecided Medium
2015-01-28 17:36:13 John Johansen linux-goldfish (Ubuntu Utopic): importance Undecided Medium
2015-01-28 17:36:15 John Johansen linux-mako (Ubuntu Precise): status New Invalid
2015-01-28 17:36:19 John Johansen linux-mako (Ubuntu Precise): importance Undecided Medium
2015-01-28 17:36:21 John Johansen linux-mako (Ubuntu Trusty): status New Invalid
2015-01-28 17:36:25 John Johansen linux-mako (Ubuntu Trusty): importance Undecided Medium
2015-01-28 17:36:28 John Johansen linux-mako (Ubuntu Lucid): status New Invalid
2015-01-28 17:36:32 John Johansen linux-mako (Ubuntu Lucid): importance Undecided Medium
2015-01-28 17:36:34 John Johansen linux-mako (Ubuntu Vivid): importance Undecided Medium
2015-01-28 17:36:38 John Johansen linux-mako (Ubuntu Utopic): importance Undecided Medium
2015-01-28 17:36:41 John Johansen linux-manta (Ubuntu Precise): status New Invalid
2015-01-28 17:36:45 John Johansen linux-manta (Ubuntu Precise): importance Undecided Medium
2015-01-28 17:36:49 John Johansen linux-manta (Ubuntu Trusty): status New Invalid
2015-01-28 17:36:53 John Johansen linux-manta (Ubuntu Trusty): importance Undecided Medium
2015-01-28 17:36:57 John Johansen linux-manta (Ubuntu Lucid): status New Invalid
2015-01-28 17:37:02 John Johansen linux-manta (Ubuntu Lucid): importance Undecided Medium
2015-01-28 17:37:04 John Johansen linux-manta (Ubuntu Vivid): importance Undecided Medium
2015-01-28 17:37:08 John Johansen linux-manta (Ubuntu Utopic): importance Undecided Medium
2015-03-25 06:58:51 Mathew Hodson linux (Ubuntu Vivid): status Fix Committed Invalid
2015-05-04 23:09:39 John Johansen bug task deleted linux-lts-trusty (Ubuntu Lucid)
2015-05-04 23:09:40 John Johansen bug task deleted linux-armadaxp (Ubuntu Lucid)
2015-05-04 23:09:42 John Johansen bug task deleted linux-ec2 (Ubuntu Lucid)
2015-05-04 23:09:44 John Johansen bug task deleted linux-goldfish (Ubuntu Lucid)
2015-05-04 23:09:45 John Johansen bug task deleted linux-lts-saucy (Ubuntu Lucid)
2015-05-04 23:09:47 John Johansen bug task deleted linux-lts-quantal (Ubuntu Lucid)
2015-05-04 23:09:48 John Johansen bug task deleted linux-mvl-dove (Ubuntu Lucid)
2015-05-04 23:09:49 John Johansen bug task deleted linux-ti-omap4 (Ubuntu Lucid)
2015-05-04 23:09:51 John Johansen bug task deleted linux (Ubuntu Lucid)
2015-05-04 23:09:52 John Johansen bug task deleted linux-mako (Ubuntu Lucid)
2015-05-04 23:09:54 John Johansen bug task deleted linux-fsl-imx51 (Ubuntu Lucid)
2015-05-04 23:09:55 John Johansen bug task deleted linux-lts-utopic (Ubuntu Lucid)
2015-05-04 23:09:56 John Johansen bug task deleted linux-flo (Ubuntu Lucid)
2015-05-04 23:09:59 John Johansen bug task deleted linux-lts-raring (Ubuntu Lucid)
2015-05-04 23:10:00 John Johansen bug task deleted linux-manta (Ubuntu Lucid)
2015-05-08 17:53:11 John Johansen nominated for series Ubuntu Wily
2015-05-08 17:53:12 John Johansen bug task added linux (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-fsl-imx51 (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-mvl-dove (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-ec2 (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-ti-omap4 (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-backport-maverick (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-backport-natty (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-armadaxp (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-quantal (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-raring (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-saucy (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-mako (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-manta (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-goldfish (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-flo (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-trusty (Ubuntu Wily)
2015-05-08 17:53:12 John Johansen bug task added linux-lts-utopic (Ubuntu Wily)
2015-05-08 17:53:18 John Johansen linux-lts-vivid (Ubuntu Precise): status New Invalid
2015-05-08 17:53:22 John Johansen linux-lts-vivid (Ubuntu Precise): importance Undecided Medium
2015-05-08 17:53:25 John Johansen linux-lts-vivid (Ubuntu Vivid): status New Invalid
2015-05-08 17:53:28 John Johansen linux-lts-vivid (Ubuntu Vivid): importance Undecided Medium
2015-05-08 17:53:31 John Johansen linux-lts-vivid (Ubuntu Wily): status New Invalid
2015-05-08 17:53:35 John Johansen linux-lts-vivid (Ubuntu Wily): importance Undecided Medium
2015-05-08 17:53:37 John Johansen linux-lts-vivid (Ubuntu Utopic): status New Invalid
2015-05-08 17:53:39 John Johansen linux-lts-vivid (Ubuntu Utopic): importance Undecided Medium
2015-05-08 17:53:41 John Johansen linux-lts-vivid (Ubuntu Trusty): status New Fix Committed
2015-05-08 17:53:43 John Johansen linux-lts-vivid (Ubuntu Trusty): importance Undecided Medium
2015-06-17 12:22:46 Rolf Leggewie linux-lts-backport-maverick (Ubuntu Lucid): status New Won't Fix
2015-06-17 12:22:55 Rolf Leggewie linux-lts-backport-natty (Ubuntu Lucid): status New Won't Fix
2015-07-28 11:44:06 John Johansen bug task deleted linux-lts-trusty (Ubuntu Utopic)
2015-07-28 11:44:08 John Johansen bug task deleted linux-armadaxp (Ubuntu Utopic)
2015-07-28 11:44:09 John Johansen bug task deleted linux-ec2 (Ubuntu Utopic)
2015-07-28 11:44:10 John Johansen bug task deleted linux-goldfish (Ubuntu Utopic)
2015-07-28 11:44:12 John Johansen bug task deleted linux-lts-saucy (Ubuntu Utopic)
2015-07-28 11:44:13 John Johansen bug task deleted linux-lts-quantal (Ubuntu Utopic)
2015-07-28 11:44:15 John Johansen bug task deleted linux-mvl-dove (Ubuntu Utopic)
2015-07-28 11:44:16 John Johansen bug task deleted linux-ti-omap4 (Ubuntu Utopic)
2015-07-28 11:44:18 John Johansen bug task deleted linux-lts-vivid (Ubuntu Utopic)
2015-07-28 11:44:20 John Johansen bug task deleted linux (Ubuntu Utopic)
2015-07-28 11:44:21 John Johansen bug task deleted linux-mako (Ubuntu Utopic)
2015-07-28 11:44:23 John Johansen bug task deleted linux-fsl-imx51 (Ubuntu Utopic)
2015-07-28 11:44:26 John Johansen bug task deleted linux-lts-utopic (Ubuntu Utopic)
2015-07-28 11:44:27 John Johansen bug task deleted linux-flo (Ubuntu Utopic)
2015-07-28 11:44:29 John Johansen bug task deleted linux-lts-raring (Ubuntu Utopic)
2015-07-28 11:44:30 John Johansen bug task deleted linux-manta (Ubuntu Utopic)
2015-10-28 07:08:42 Steve Beattie nominated for series Ubuntu Xenial
2015-10-28 07:08:43 Steve Beattie bug task added linux (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-fsl-imx51 (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-mvl-dove (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-ec2 (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-ti-omap4 (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-backport-maverick (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-backport-natty (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-armadaxp (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-quantal (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-raring (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-saucy (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-mako (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-manta (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-goldfish (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-flo (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-trusty (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-utopic (Ubuntu Xenial)
2015-10-28 07:08:43 Steve Beattie bug task added linux-lts-vivid (Ubuntu Xenial)
2015-11-10 21:55:11 Steve Beattie linux-lts-wily (Ubuntu Precise): status New Invalid
2015-11-10 21:55:16 Steve Beattie linux-lts-wily (Ubuntu Precise): importance Undecided Medium
2015-11-10 21:55:19 Steve Beattie linux-lts-wily (Ubuntu Wily): status New Invalid
2015-11-10 21:55:22 Steve Beattie linux-lts-wily (Ubuntu Wily): importance Undecided Medium
2015-11-10 21:55:24 Steve Beattie linux-lts-wily (Ubuntu Xenial): status New Invalid
2015-11-10 21:55:28 Steve Beattie linux-lts-wily (Ubuntu Xenial): importance Undecided Medium
2015-11-10 21:55:30 Steve Beattie linux-lts-wily (Ubuntu Trusty): status New Invalid
2015-11-10 21:55:34 Steve Beattie linux-lts-wily (Ubuntu Trusty): importance Undecided Medium
2015-11-10 21:55:36 Steve Beattie linux-lts-wily (Ubuntu Vivid): status New Invalid
2015-11-10 21:55:41 Steve Beattie linux-lts-wily (Ubuntu Vivid): importance Undecided Medium
2015-11-16 18:07:17 Steve Beattie linux-raspi2 (Ubuntu Precise): status New Invalid
2015-11-16 18:07:20 Steve Beattie linux-raspi2 (Ubuntu Precise): importance Undecided Medium
2015-11-16 18:07:24 Steve Beattie linux-raspi2 (Ubuntu Wily): status New Invalid
2015-11-16 18:07:27 Steve Beattie linux-raspi2 (Ubuntu Wily): importance Undecided Medium
2015-11-16 18:07:31 Steve Beattie linux-raspi2 (Ubuntu Xenial): status New Invalid
2015-11-16 18:07:35 Steve Beattie linux-raspi2 (Ubuntu Xenial): importance Undecided Medium
2015-11-16 18:07:38 Steve Beattie linux-raspi2 (Ubuntu Trusty): status New Invalid
2015-11-16 18:07:42 Steve Beattie linux-raspi2 (Ubuntu Trusty): importance Undecided Medium
2015-11-16 18:07:45 Steve Beattie linux-raspi2 (Ubuntu Vivid): status New Invalid
2015-11-16 18:07:48 Steve Beattie linux-raspi2 (Ubuntu Vivid): importance Undecided Medium
2015-12-03 13:03:21 Steve Beattie linux-raspi2 (Ubuntu Xenial): status Invalid Fix Committed
2016-02-10 23:14:41 Steve Beattie linux-lts-xenial (Ubuntu Precise): status New Invalid
2016-02-10 23:14:46 Steve Beattie linux-lts-xenial (Ubuntu Precise): importance Undecided Medium
2016-02-10 23:14:48 Steve Beattie linux-lts-xenial (Ubuntu Wily): status New Invalid
2016-02-10 23:14:51 Steve Beattie linux-lts-xenial (Ubuntu Wily): importance Undecided Medium
2016-02-10 23:14:54 Steve Beattie linux-lts-xenial (Ubuntu Xenial): status New Invalid
2016-02-10 23:14:58 Steve Beattie linux-lts-xenial (Ubuntu Xenial): importance Undecided Medium
2016-02-10 23:15:01 Steve Beattie linux-lts-xenial (Ubuntu Trusty): status New Fix Committed
2016-02-10 23:15:04 Steve Beattie linux-lts-xenial (Ubuntu Trusty): importance Undecided Medium
2016-04-19 02:33:00 Steve Beattie linux-manta (Ubuntu Xenial): status New Invalid
2016-04-24 10:49:10 Rolf Leggewie linux-lts-backport-maverick (Ubuntu Utopic): status New Won't Fix
2016-04-24 10:49:17 Rolf Leggewie linux-lts-backport-natty (Ubuntu Utopic): status New Won't Fix
2016-04-27 11:23:40 Steve Beattie nominated for series Ubuntu Yakkety
2016-04-27 11:23:41 Steve Beattie bug task added linux (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-fsl-imx51 (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-mvl-dove (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-ec2 (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-ti-omap4 (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-backport-maverick (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-backport-natty (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-armadaxp (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-quantal (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-raring (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-saucy (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-mako (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-manta (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-goldfish (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-flo (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-trusty (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-utopic (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-vivid (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-wily (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-raspi2 (Ubuntu Yakkety)
2016-04-27 11:23:41 Steve Beattie bug task added linux-lts-xenial (Ubuntu Yakkety)
2016-05-05 22:41:58 Steve Beattie linux-snapdragon (Ubuntu Precise): status New Invalid
2016-05-05 22:42:05 Steve Beattie linux-snapdragon (Ubuntu Precise): importance Undecided Medium
2016-05-05 22:42:08 Steve Beattie linux-snapdragon (Ubuntu Wily): status New Invalid
2016-05-05 22:42:11 Steve Beattie linux-snapdragon (Ubuntu Wily): importance Undecided Medium
2016-05-05 22:42:13 Steve Beattie linux-snapdragon (Ubuntu Xenial): status New Invalid
2016-05-05 22:42:16 Steve Beattie linux-snapdragon (Ubuntu Xenial): importance Undecided Medium
2016-05-05 22:42:19 Steve Beattie linux-snapdragon (Ubuntu Yakkety): status New Invalid
2016-05-05 22:42:24 Steve Beattie linux-snapdragon (Ubuntu Yakkety): importance Undecided Medium
2016-05-05 22:42:26 Steve Beattie linux-snapdragon (Ubuntu Trusty): status New Invalid
2016-05-05 22:42:30 Steve Beattie linux-snapdragon (Ubuntu Trusty): importance Undecided Medium
2017-10-17 15:39:08 Andy Whitcroft linux-flo (Ubuntu Vivid): status New Won't Fix
2017-10-17 16:02:20 Andy Whitcroft linux-goldfish (Ubuntu Vivid): status New Won't Fix
2017-10-17 17:46:58 Andy Whitcroft linux-manta (Ubuntu Vivid): status New Won't Fix
2021-10-14 01:49:42 Steve Langasek linux-lts-backport-maverick (Ubuntu Precise): status New Won't Fix
2021-10-14 01:49:49 Steve Langasek linux-lts-backport-natty (Ubuntu Precise): status New Won't Fix