This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE:
This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE:
This bug was fixed in the package linux-lts-trusty -
3.13.0-79.123~precise1
---
linux-lts-trusty (3.13.0-79.123~precise1) precise; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE:
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
I think that unlike the bug title and description suggest, this bug is
not limited to IPv6. I am having the same problem with FreeRADIUS when
RADIUS packets are received over IPv4. This problem is fixed by the
Kernel from trusty-proposed, too.
Actually, this problem looks a lot like a regression
Verified ok in Trusty (3.13.0-78.122) and Precise
(3.13.0-78.122~precise1). The 'jdns' test (comment #20) passes for
3.13.0-78.122 kernels (but fails for the previous versions).
** Tags removed: performing-bisect verification-needed-trusty
** Tags added: verification-done-trusty
--
You
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
Fix released in 3.19.0-47.53
** Changed in: linux (Ubuntu Vivid)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
@Pali- The 3.13 kernel (for Trusty and Precise) including this fix is
planned for this week, so it should appear in 'Proposed' within the next
few days -- then the usual week more of baking time before actual
release. Sorry for the delay, and thanks for your patience!
--
You received this bug
This bug was fixed in the package linux - 4.4.0-2.16
---
linux (4.4.0-2.16) xenial; urgency=low
[ Andy Whitcroft ]
* Release Tracking Bug
- LP: #1539090
* SAUCE: hv: hv_set_ifconfig -- convert to python3
- LP: #1506521
* SAUCE: dm: introduce a target_ioctl op to
Hi Kamal! When will be this bug fixed in precise kernel release?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not
This bug was fixed in the package linux - 4.2.0-27.32
---
linux (4.2.0-27.32) wily; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1536867
[ Andy Whitcroft ]
* SAUCE: (no-up) add compat_uts_machine= kernel command line override
- LP: #1520627
[ Colin
Verified ok in Wily 4.2.0-27.32 (proposed): The bug can't be reproduced
in 4.2 (a separate upstream fix hides it), but this patch doesn't appear
to break anything and does eliminate an unnecessary double checksum
computation.
** Tags removed: verification-needed-wily
** Tags added:
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from
Thanks for verifying that Pali. The fix is in the pipeline for all
affected Ubuntu kernels.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP
@Kamal: I tested your build 3.13.0-69-generic #112~precise1+lp1527902
and it fixed this problem.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6
Verified ok in Vivid 3.19.0-46.52 (proposed): The bug can't be
reproduced in 3.19 (a separate upstream fix hides it), but this patch
doesn't appear to break anything and does eliminate an unnecessary
double checksum computation.
** Tags removed: verification-needed-vivid
** Tags added:
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from
** Changed in: linux-lts-trusty (Ubuntu)
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-lts-trusty (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-lts-trusty
Hello Kamal,
Yes, running, linux-
image-3.13.0-69-generic_3.13.0-69.112~precise1+lp1527902 does indeed
resolve my TFTP issues!
Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Good news, everyone! TL;DR:
Pali, I've (finally) managed to reproduce and fix this bug (IPv6 UDP
DNS), with your recommendation of the program 'jdns'. For reference,
here's my reproduction procedure, on a fresh install of Precise server
(a slight variation on a method Pali developed):
sudo
So it is same error code for recvfrom() on UDP packet. It is possible
that it is same problem...
Anyway, currently I cannot test next kernel, so if you cannot reproduce
that bug, you need to wait some time after I could test next kernel
build...
--
You received this bug notification because you
I am also seeing problems with UDP ... in my case, TFTP failures. Error
message is " service tftp, recvfrom: Resource temporarily unavailable
(errno = 11)" in syslog. I suspect this is the same issue:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808293
** Bug watch added: Debian Bug tracker
I built the next test kernel, up to the following commit:
cc22adac97a74e19fa22f8b1f3ea50827c1b5e3f
The test kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1527902
Can you test that kernel and report back if it has the bug or not? I
will build the next test kernel based on
Sorry for the delay, I was away for holiday break. I'll build the next
test kernel and post it shortly.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6
I tested kernel 3.13.0-68-generic #111~Commit40c4e87e7 and this is good.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not received
Now I tested also v3.13.11-ckt32-trusty kernel and this is bad.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not received
Status in
Looks like that program dig is not affected, so not all stub resolvers
are non working.
Kopete uses libiris xmpp library which uses jdns resolver. It is 100%
reproducable.
I tested also new upstream 4.x kernels and they do not have this
problem. Only ubuntu kernels >= 3.13.0-69.
If you need to
I am able to perform dns lookups on a P+T box with -74 (and the OR has
separatly confirmed -74 as affected), so this appears to not be
systemic:
mru@grovel-x-p64p5:~$ cat /proc/version_signature
Ubuntu 3.13.0-74.118~precise1-generic 3.13.11-ckt30
mru@grovel-x-p64p5:~$ dig www.google.com
I started a kernel bisect between 3.13.0-68 and 3.13.0-69. The kernel
bisect will require testing of about 7-10 test kernels.
I built the first test kernel, up to the following commit:
40c4e87e71354ccad701b7f36e522424e6504bca
The test kernel can be downloaded from:
We may want to perform a reverse bisect as well, since there seems to be
a fix in the latest mainline kernel. Could you test the latest upstream
3.13 stable kernel as well, maybe the fix came down through a stable
update. The latest upstream stable kernel can be downloaded from:
** Tags added: regression-update trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not received
Status in linux package in
Hi Pali,
I'd like to try and reproduce this bug. Can you list the steps I would
need to perform to reproduce the bug? Would it just be to use the
Kopete client and try to connect to a jabber server?
Also, do I need to do some network reconfiguration? I am currently
using IPv4, and do not have
Now I tested version 3.13.0-69.112~precise1 from https://launchpad.net
/~canonical-kernel-team/+archive/ubuntu/ppa/+packages?field.name_filter
=linux-lts-trusty_filter=_filter=precise and
it has same problem as 3.13.0-71. So this bug was introduced somewhere
between -68 and -69.
--
You received
Ok, a new lts-backport-trusty test kernel is available here:
http://kernel.ubuntu.com/~jsalisbury/lp1527902/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71:
Actually that last test kernel for specific to Trusty proper. I'll
build one more, but using the trusty-lts repo.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
thanks for testing , pali. I'm going to build one more test kernel. If
that does not fix the bug, we'll have to perform a bisect.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Now I tested your last build and it does *not* fix this bug :-(
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not received
Status in
For reproducing just try to use Kopete IM client and try to connect to
some jabber server. Kopete must use IPv6 recursive DNS server for
translating jabber SRV or A records. DNS server address is read from
standard file /etc/resolv.conf.
So if you do not have IPv6 connectivity, you can you start
I built a Trusty test kernel with a revert of the three commits
mentioned in comment: #1. The test kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1527902/
Can you test this kernel and see if it resolves this bug? If it does,
then we can narrow which of those three commit
** Tags added: per
** Tags removed: per
** Tags added: performing-bisect
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not received
** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1527902
Title:
3.13.0-71: IPv6 UDP DNS packets are not received
Status in linux-lts-trusty
** Changed in: linux-lts-trusty (Ubuntu)
Status: New => Triaged
** Changed in: linux-lts-trusty (Ubuntu)
Importance: Undecided => High
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: New => Triaged
** Changed
44 matches
Mail list logo