This bug was fixed in the package linux - 3.13.0-125.174
---------------
linux (3.13.0-125.174) trusty; urgency=low
* linux: 3.13.0-125.174 -proposed tracker (LP: #1703396)
* NULL pointer dereference triggered by openvswitch autopkg testcase
(LP: #1703401)
- Revert "rtnl/do_setlink(): notify when a netdev is modified"
- Revert "rtnl/do_setlink(): last arg is now a set of flags"
- Revert "rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated"
- Revert "rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated"
- Revert "rtnetlink: provide api for getting and setting slave info"
linux (3.13.0-124.173) trusty; urgency=low
* linux: 3.13.0-124.173 -proposed tracker (LP: #1701042)
* CVE-2017-7895
- nfsd: Remove assignments inside conditions
- svcrdma: Do not add XDR padding to xdr_buf page vector
- nfsd4: minor NFSv2/v3 write decoding cleanup
- nfsd: stricter decoding of write-like NFSv2/v3 ops
* CVE-2017-9605
- drm/vmwgfx: Make sure backup_handle is always valid
* CVE-2017-1000380
- ALSA: timer: Fix race between read and ioctl
- ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
* linux <3.18: netlink notification is missing when an interface is modified
(LP: #1690094)
- rtnetlink: provide api for getting and setting slave info
- rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated
- rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated
- rtnl/do_setlink(): last arg is now a set of flags
- rtnl/do_setlink(): notify when a netdev is modified
* CVE-2015-8944
- Make file credentials available to the seqfile interfaces
- /proc/iomem: only expose physical resource addresses to privileged users
* CVE-2016-10088
- sg_write()/bsg_write() is not fit to be called under KERNEL_DS
* CVE-2017-7346
- drm/vmwgfx: limit the number of mip levels in
vmw_gb_surface_define_ioctl()
* CVE-2015-8966
- arm: fix handling of F_OFD_... in oabi_fcntl64()
* Missing IOTLB flush causes DMAR errors with SR-IOV (LP: #1697053)
- iommu/vt-d: Fix missing IOTLB flush in intel_iommu_unmap()
* CVE-2017-8924
- USB: serial: io_ti: fix information leak in completion handler
* CVE-2017-8925
- USB: serial: omninet: fix reference leaks at open
* CVE-2015-8967
- arm64: make sys_call_table const
* CVE-2015-8964
- tty: Prevent ldisc drivers from re-using stale tty fields
* CVE-2015-8955
- arm64: perf: reject groups spanning multiple HW PMUs
* CVE-2015-8962
- sg: Fix double-free when drives detach during SG_IO
* CVE-2015-8963
- perf: Fix race in swevent hash
* CVE-2017-9074
- ipv6: Check ip6_find_1stfragopt() return value properly.
* CVE-2014-9900
- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
-- Thadeu Lima de Souza Cascardo <[email protected]> Mon, 10 Jul
2017 13:02:31 -0300
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9900
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8944
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8955
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8962
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8963
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8964
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8966
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8967
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-10088
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000380
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7346
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7895
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8924
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8925
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9074
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9605
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1690094
Title:
linux <3.18: netlink notification is missing when an interface is
modified
Status in linux package in Ubuntu:
In Progress
Status in linux source package in Trusty:
Fix Released
Bug description:
The following upstream patches are missing:
ba9989069f4e rtnl/do_setlink(): notify when a netdev is modified
90c325e3bfe1 rtnl/do_setlink(): last arg is now a set of flags
1889b0e7efe8 rtnl/do_setlink(): set modified when IFLA_LINKMODE is updated
5d1180fcacc5 rtnl/do_setlink(): set modified when IFLA_TXQLEN is updated
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ba9989069f4e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90c325e3bfe1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1889b0e7efe8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d1180fcacc5
There is several ways to reproduce the problem. Here is an example:
ip monitor link&
ip link set eth1 txqueuelen 18
=> no notification
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1690094/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp