This bug was fixed in the package linux - 3.13.0-119.166 --------------- linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718) * CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation (LP: #1687107) - rose: limit sk_filter trim to payload - tcp: take care of truncations done by sk_filter() linux (3.13.0-118.165) trusty; urgency=low * linux: 3.13.0-118.165 -proposed tracker (LP: #1686154) * linux_3.13.0-*.*: nVMX: Check current_vmcs12 before accessing in handle_invept() (LP: #1678676) - SAUCE: KVM has a flaw in INVEPT emulation that could crash the host * Please backport fix to reference leak in cgroup blkio throttle (LP: #1683976) - block: fix module reference leak on put_disk() call for cgroups throttle -- Thadeu Lima de Souza Cascardo <casca...@canonical.com> Tue, 02 May 2017 15:14:50 -0300 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-8645 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1687107 Title: CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Released Bug description: [Impact] From CVE description: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-8645.html "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c." [Test Case] See references in the CVE page. [Regression Potential] This modifies the code that handles all tcp packets, so it could cause problems with network traffic, although unlikely since it's been applied upstream and to various stable kernels (but not the 3.13.y stable branch). [Other Info] The patch appears to have been pulled into xenial through the 4.4.y stable tree, but it doesn't appear that the patch will be applied to the 3.13.y stable tree, so this bug is track manually adding the patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1687107/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp