** Description changed: + [SRU Justification] + + == Impact == + + IPv6 packets may be dropped during the neighbor resolution when a + userspace program uses IPv6 raw sockets. The commit that introduces + this bug has not been identified, but it's here at least from Xenial (4.4). + This was fixed in the requested backport (from 5.2). + + == Fix == + + Backport the requested patches to Disco (5.0), Bionic (4.15) and + Xenial (4.4). + + == Risk of Regregression == + + The change slightly modifies the target IPv6 address in neighbor + resolution engine. Risk should be low and limited to ipv6. + + --- + With an IPv6 raw socket, packets may be dropped during the neighbour resolution. It is fixed upstream by these patches: 9b1c1ef13b35 ipv6: constify rt6_nexthop() 2c6b55f45d53 ipv6: fix neighbour resolution with raw socket https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=9b1c1ef13b35fa35051b635ca9fbda39fe6bbc70 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=2c6b55f45d53420d8310d41310e0e2cd41fe073f The detail of the bug is explained in the second patch.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1834465 Title: ipv6: fix neighbour resolution with raw socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1834465/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs