This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage notifications about this bug go
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
I verified the kernel on -proposed (3.13.0-32-generic) and could not
reproduce the bug using our test case. No crashes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage notifications about this bug go
** Description changed:
+ SRU Justification:
+
+ [Impact]
+ A race condition can occur that can be triggered when cleaning up LXC
containers that use NAT/netns.
+
+ [Fix]
+
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=945b2b2d259d1a4364a2799e80e8ff32f8c6ee6f
+
+
I can confirm the test kernels are good. Couldn't reproduce the bug on
our environment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage
** Changed in: linux (Ubuntu Trusty)
Status: In Progress = Fix Committed
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Assignee: Chris J Arges (arges)
Status: In Progress
** Changed in: linux (Ubuntu Utopic)
Status: In Progress = Fix Released
--
You
Looks like there is confirmation on the upstream bug and patch is upstream:
945b2b2d259d1a4364a2799e80e8ff32f8c6ee6f
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in
Request for stable inclusion sent:
http://www.spinics.net/lists/netdev/msg287462.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Chris J Arges (arges)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) = Chris J Arges (arges)
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided = Medium
** Changed in: linux (Ubuntu Trusty)
Status:
I've backported the patch to trusty and utopic. It would be swell if people can
test and then I can start the SRU process.
Thanks,
http://people.canonical.com/~arges/lp1314274.trusty/
http://people.canonical.com/~arges/lp1314274.utopic/
--
You received this bug notification because you are a
Chris, I've tested this patch too and it prevent the crash on our test
case as well. The new patch applied clean on ubuntu kernel.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG
** Tags added: patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage notifications about this bug go to:
Also noticed a newer patch here:
http://patchwork.ozlabs.org/patch/357147/raw/
And I see someone has already built a test package with that patch:
https://github.com/gdm85/tenku/releases/tag/v0.2.0
It may be good to verify that as well in the upstream bug.
--
You received this bug notification
I still didn't had luck generating a crashdump but with small change on
the patch posted on the upstream bug I can confirm the crash doesn't
happen anymore, tested on ubuntu trusty kernel 3.13.0-24-generic.
** Patch added: upstream workaround patch
I still wasn't able to get a kdump loaded for a crashdump on this ec2
instance although I was able to capture lockdep with the container
running and when it get killed that is just before the crash happens.
** Attachment added: lockdep.txt
I assume there wasn't anything else interesting in the kernel logs... this just
looks similar to the existing bug.
Can you get a proper crash dump when this issue occurs?
https://wiki.ubuntu.com/Kernel/CrashdumpRecipe
--
You received this bug notification because you are a member of Ubuntu
Chris,
I work with Steve and was able to reproduce with the lockdep debugging,
the output as follows:
[18075576.538133] BUG: unable to handle kernel paging request at
c900038ebac8
[18075576.538153] IP: [a013d1a1] nf_nat_cleanup_conntrack+0x41/0x70
[nf_nat]
[18075576.538166] PGD
Can you test this kernel built with lockdep debugging on and see what
output it provides? It also may be worthwhile to getting a crashdump if
lockdep debugging is inconclusive.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
And the link to the build is here:
http://people.canonical.com/~arges/lp1314274/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in nf_nat_cleanup_conntrack
To manage
This also happens with the (almost) current mainline kernel,
from here:
http://kernel.ubuntu.com/~kernel-ppa/mainline/daily/current/
Commit for this build was:
ed8c37e158cb697df905d6b4933bc107c69e8936
Traceback (most recent call last):
File /usr/bin/cloud-init, line 618, in module
** Also affects: linux via
http://bugzilla.kernel.org/show_bug.cgi?id=65191
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314274
Title:
BUG in
NOTE: This bug was not reported from the affected machine, but from a
workstation running the same kernel.
This bug appears after adding then removing a number of LXC containers
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Link to upstream bug: https://bugzilla.kernel.org/show_bug.cgi?id=65191
** Changed in: linux (Ubuntu)
Importance: Undecided = Medium
** Changed in: linux (Ubuntu)
Status: New = Confirmed
** Bug watch added: Linux Kernel Bug Tracker #65191
The problem also occurs with the mainline v3.15-rc2-trusty build:
[17345307.967478] BUG: unable to handle kernel paging request at
c90003777a70
[17345307.967497] IP: [a013f0b6] nf_nat_cleanup_conntrack+0x46/0x70
[nf_nat]
[17345307.967510] PGD 1b6425067 PUD 1b6426067 PMD 1b0aed067
28 matches
Mail list logo