** Changed in: linux (Ubuntu Utopic)
Status: Fix Committed => Fix Released
** Description changed:
** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe
function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in
the Linux kernel before 3.15.2 allow context-dependent attackers to
cause a denial of service (memory corruption) via a crafted Literal Run.
NOTE: the author of the LZO algorithms says "the Linux kernel is *not*
affected; media hype."
- Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
206a81c18401c0cde6e579164f752c4b147324ce
+ Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
72cf90124e87d975d0b2114d930808c58b4c05e4
Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
- Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
72cf90124e87d975d0b2114d930808c58b4c05e4
** Description changed:
** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe
function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in
the Linux kernel before 3.15.2 allow context-dependent attackers to
cause a denial of service (memory corruption) via a crafted Literal Run.
NOTE: the author of the LZO algorithms says "the Linux kernel is *not*
affected; media hype."
Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
72cf90124e87d975d0b2114d930808c58b4c05e4
Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
af958a38a60c7ca3d8a39c918c1baa2ff7b6b233
+ Break-Fix: 64c70b1cf43de158282bc1675918d503e5b15cc1
72cf90124e87d975d0b2114d930808c58b4c05e4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1335313
Title:
CVE-2014-4608
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1335313/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs