CVE 2015-0274
The XFS implementation in the Linux kernel before 3.15 improperly uses an old size value during remote attribute replacement, which allows local users to cause a denial of service (transaction overrun and data corruption) or possibly gain privileges by leveraging XFS filesystem access.
Related bugs and status
CVE-2015-0274 (Candidate) is related to these bugs:
Bug #1400215: Atheros BT devices(ath3k) fail to work on USB3.0 buses
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | HWE Next | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Trusty) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Utopic) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Vivid) | High | Fix Released | ||
1400215 | Atheros BT devices(ath3k) fail to work on USB3.0 buses | linux (Ubuntu Precise) | High | Fix Released |
Bug #1408972: openvswitch: failed to flow_del (No such file or directory)
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1408972 | openvswitch: failed to flow_del (No such file or directory) | linux (Ubuntu) | High | Invalid | ||
1408972 | openvswitch: failed to flow_del (No such file or directory) | openvswitch (Ubuntu) | Undecided | Invalid | ||
1408972 | openvswitch: failed to flow_del (No such file or directory) | linux (Ubuntu Trusty) | High | Fix Released | ||
1408972 | openvswitch: failed to flow_del (No such file or directory) | openvswitch (Ubuntu Trusty) | Undecided | New |
Bug #1410704: [HP 14 Notebook PC] mute LED does not work
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1410704 | [HP 14 Notebook PC] mute LED does not work | linux (Ubuntu) | Medium | Fix Released | ||
1410704 | [HP 14 Notebook PC] mute LED does not work | HWE Next | Medium | Fix Released | ||
1410704 | [HP 14 Notebook PC] mute LED does not work | linux (Ubuntu Utopic) | Undecided | Fix Released | ||
1410704 | [HP 14 Notebook PC] mute LED does not work | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1416498: CVE-2014-7822
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1416498 | CVE-2014-7822 | linux (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | New | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-ec2 (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-fsl-imx51 (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-mvl-dove (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Won't Fix | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-trusty (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-armadaxp (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-goldfish (Ubuntu Vivid) | Medium | New | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-saucy (Ubuntu Vivid) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1416498 | CVE-2014-7822 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid |
Bug #1423292: [Anders 2]GPU driver throws a call trace in dmesg
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1423292 | [Anders 2]GPU driver throws a call trace in dmesg | linux (Ubuntu) | Medium | Invalid | ||
1423292 | [Anders 2]GPU driver throws a call trace in dmesg | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1423292 | [Anders 2]GPU driver throws a call trace in dmesg | linux (Ubuntu Utopic) | Medium | Fix Released |
Bug #1427438: Trusty update to 3.13.11-ckt16 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427438 | Trusty update to 3.13.11-ckt16 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1427438 | Trusty update to 3.13.11-ckt16 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1427733: linux: 3.13.0-47.78 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1427733 | linux: 3.13.0-47.78 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Confirmed | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | In Progress | ||
1427733 | linux: 3.13.0-47.78 -proposed tracker | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1428291: linux-keystone: 3.13.0-23.37 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | linux-keystone (Ubuntu) | Medium | Invalid | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | linux-keystone (Ubuntu Trusty) | Medium | Fix Released | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow | Medium | In Progress | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Confirmed | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | New | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | New | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Invalid | ||
1428291 | linux-keystone: 3.13.0-23.37 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1429821: CVE-2015-0274
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1429821 | CVE-2015-0274 | linux (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Vivid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Vivid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Utopic) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Utopic) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Trusty) | High | Fix Released | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Trusty) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Trusty) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ec2 (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-fsl-imx51 (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Precise) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Precise) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-mvl-dove (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-ti-omap4 (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-maverick (Ubuntu Lucid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-backport-natty (Ubuntu Lucid) | Undecided | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu Precise) | High | Fix Released | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-trusty (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-armadaxp (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-goldfish (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu Precise) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu Trusty) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-saucy (Ubuntu Vivid) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-quantal (Ubuntu) | High | Invalid | ||
1429821 | CVE-2015-0274 | linux-lts-quantal (Ubuntu Precise) | High | Invalid |
Bug #1431263: linux: 3.13.0-48.80 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431263 | linux: 3.13.0-48.80 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1431263 | linux: 3.13.0-48.80 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1431489: linux-keystone: 3.13.0-24.38 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | linux-keystone (Ubuntu) | Medium | Invalid | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | linux-keystone (Ubuntu Trusty) | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Invalid | ||
1431489 | linux-keystone: 3.13.0-24.38 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1431491: linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1431491 | linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.