This bug was fixed in the package linux - 3.13.0-119.166 --------------- linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718) * CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation (LP: #1687107) - rose: limit sk_filter trim to payload - tcp: take care of truncations done by sk_filter() linux (3.13.0-118.165) trusty; urgency=low * linux: 3.13.0-118.165 -proposed tracker (LP: #1686154) * linux_3.13.0-*.*: nVMX: Check current_vmcs12 before accessing in handle_invept() (LP: #1678676) - SAUCE: KVM has a flaw in INVEPT emulation that could crash the host * Please backport fix to reference leak in cgroup blkio throttle (LP: #1683976) - block: fix module reference leak on put_disk() call for cgroups throttle -- Thadeu Lima de Souza Cascardo <casca...@canonical.com> Tue, 02 May 2017 15:14:50 -0300 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-8645 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1683976 Title: Please backport fix to reference leak in cgroup blkio throttle Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Released Status in linux source package in Xenial: Fix Committed Bug description: This is fixed in Linux 4.5 https://github.com/torvalds/linux/commit/39a169b62b415390398291080dafe63aec751e0a Basically the module reference will leak whenever you write to /sys/fs/cgroup/blkio/blkio.throttle.* $ uname -a Linux david-kvm 4.4.0-72-generic #93-Ubuntu SMP Fri Mar 31 14:07:41 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux $ lsmod | grep ^zfs zfs 2813952 1 $ sudo sh -c 'i=100; while [ $i -gt 0 ]; do echo "230:0 1024" > /sys/fs/cgroup/blkio/blkio.throttle.read_bps_device; i=$(($i - 1)); done' $ lsmod | grep ^zfs zfs 2813952 101 This patch should be applied to all kernel < 4.5 Thanks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1683976/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp