This bug was fixed in the package linux - 3.19.0-79.87 --------------- linux (3.19.0-79.87) vivid; urgency=low
[ Thadeu Lima de Souza Cascardo ] * Release Tracking Bug - LP: #1651534 [ Luis Henriques ] * CVE-2016-9756 - KVM: x86: drop error recovery in em_jmp_far and em_ret_far * CVE-2016-9806 - netlink: Fix dump skb leak/double free * CVE-2016-9794 - ALSA: pcm : Call kill_fasync() in stream lock * [Hyper-V] netvsc: fix incorrect receive checksum offloading (LP: #1636656) - netvsc: fix incorrect receive checksum offloading * CVE-2016-9793 - net: avoid signed overflows for SO_{SND|RCV}BUFFORCE * Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty) (LP: #1646857) - serial: 8250_pci: Detach low-level driver during PCI error recovery -- Thadeu Lima de Souza Cascardo <casca...@canonical.com> Tue, 20 Dec 2016 15:35:23 -0200 ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-9756 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-9793 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-9794 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-9806 ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1636656 Title: [Hyper-V] netvsc: fix incorrect receive checksum offloading Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: In Progress Status in linux source package in Vivid: Fix Released Status in linux source package in Xenial: Fix Committed Status in linux source package in Yakkety: Fix Committed Bug description: The Hyper-V netvsc driver was looking at the incorrect status bits in the checksum info. It was setting the receive checksum unnecessary flag based on the IP header checksum being correct. The checksum flag is skb is about TCP and UDP checksum status. Because of this bug, any packet received with bad TCP checksum would be passed up the stack and to the application causing data corruption. The problem is reproducible via netcat and netem. This had a side effect of not doing receive checksum offload on IPv6. The driver was also also always doing checksum offload independent of the checksum setting done via ethtool. Signed-off-by: Stephen Hemminger <sthem...@microsoft.com> https://patchwork.ozlabs.org/patch/685660/ When this patch is committed I will include the commit ID in this bug. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1636656/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp