This bug was fixed in the package linux - 3.13.0-98.145 --------------- linux (3.13.0-98.145) trusty; urgency=low
* Fix GRO recursion overflow for tunneling protocols (LP: #1631287) - tunnels: Don't apply GRO to multiple layers of encapsulation. * CVE-2016-7039 - SAUCE: net: add recursion limit to GRO linux (3.13.0-97.144) trusty; urgency=low [ Joseph Salisbury ] * Release Tracking Bug - LP: #1626604 * Altering use_tempaddr drops all IPv6 addresses (LP: #994931) - Revert "UBUNTU: SAUCE: (no-up) ipv6: Fix net.ipv6.conf.all.use_tempaddr sysctl" - Revert "UBUNTU: SAUCE: (no-up) ipv6: make the net.ipv6.conf.all.use_tempaddr sysctl propagate to interface settings" - neigh: convert parms to an array - neigh: wrap proc dointvec functions - neigh: use tbl->family to distinguish ipv4 from ipv6 - neigh: restore old behaviour of default parms values - neigh: ipv6: respect default values set before an address is assigned to device * PCI quirk required for correct access to configuration space of NFP 4000/6000 (LP: #1624267) - PCI: Support PCIe devices with short cfg_size - PCI: Add Netronome vendor and device IDs - PCI: Limit config space size for Netronome NFP6000 family - PCI: Add Netronome NFP4000 PF device ID - PCI: Limit config space size for Netronome NFP4000 * CVE-2016-6136 - audit: fix a double fetch in audit_log_single_execve_arg() * CVE-2016-6480 - aacraid: Check size values after double-fetch from user * CVE-2016-6828 - tcp: fix use after free in tcp_xmit_retransmit_queue() * IPv6 with LVS Performance issue in latest 3.13LTS kernels (LP: #1618299) - ipv6: remove prune parameter for fib6_clean_all - ipv6: remove rt6i_genid * lsattr 32bit does not work on 64bit kernel (Inappropriate ioctl error) (LP: #1619918) - btrfs: bugfix: handle FS_IOC32_{GETFLAGS, SETFLAGS, GETVERSION} in btrfs_ioctl * Miscellaneous upstream changes - powerpc/pseries: use pci_host_bridge.release_fn() to kfree(phb) -- Seth Forshee <seth.fors...@canonical.com> Fri, 07 Oct 2016 20:08:32 -0500 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-6136 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-6480 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-6828 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-7039 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1624267 Title: PCI quirk required for correct access to configuration space of NFP 4000/6000 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1624267/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs