** Description changed:

+ [SRU Justification]
+ 
+ == Impact ==
+ 
+ IPv6 packets may be dropped during the neighbor resolution when a
+ userspace program uses IPv6 raw sockets. The commit that introduces
+ this bug has not been identified, but it's here at least from Xenial (4.4).
+ This was fixed in the requested backport (from 5.2).
+ 
+ == Fix ==
+ 
+ Backport the requested patches to Disco (5.0), Bionic (4.15) and
+ Xenial (4.4).
+ 
+ == Risk of Regregression ==
+ 
+ The change slightly modifies the target IPv6 address in neighbor
+ resolution engine. Risk should be low and limited to ipv6.
+ 
+ ---
+ 
  With an IPv6 raw socket, packets may be dropped during the neighbour
  resolution. It is fixed upstream by these patches:
  
  9b1c1ef13b35 ipv6: constify rt6_nexthop()
  2c6b55f45d53 ipv6: fix neighbour resolution with raw socket
  
  
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=9b1c1ef13b35fa35051b635ca9fbda39fe6bbc70
  
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=2c6b55f45d53420d8310d41310e0e2cd41fe073f
  
  The detail of the bug is explained in the second patch.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834465

Title:
  ipv6: fix neighbour resolution with raw socket

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1834465/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to