ipv6: fix a refcnt leak with peer addr

Bug #1662096 reported by Nicolas Dichtel
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Undecided
Unassigned
Trusty
Fix Released
Undecided
Tim Gardner
Zesty
Fix Released
Undecided
Unassigned

Bug Description

The following upstream patch is missing in ubuntu-14.04:
f24062b07dda ipv6: fix a refcnt leak with peer addr

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f24062b07dda

Revision history for this message
Nicolas Dichtel (nicolas-dichtel) wrote :

There is also two other patches that are needed:
 - e7478dfc4656 ipv6: use addrconf_get_prefix_route() to remove peer addr
 - 8e3d5be73681 ipv6: Avoid double dst_free

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e7478dfc4656f
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e3d5be736810

Revision history for this message
Brad Figg (brad-figg) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:

apport-collect 1662096

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux (Ubuntu Zesty):
status: Incomplete → Fix Released
Changed in linux (Ubuntu Trusty):
assignee: nobody → Tim Gardner (timg-tpi)
status: New → In Progress
Changed in linux (Ubuntu Trusty):
status: In Progress → Fix Committed
Revision history for this message
Brad Figg (brad-figg) wrote :

This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-trusty' to 'verification-done-trusty'. If the problem still exists, change the tag 'verification-needed-trusty' to 'verification-failed-trusty'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-trusty
tags: added: verification-done-trusty
removed: verification-needed-trusty
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 3.13.0-111.158

---------------
linux (3.13.0-111.158) trusty; urgency=low

  [ Thadeu Lima de Souza Cascardo ]

  * Release Tracking Bug
    - LP: #1666905

  [ Andy Whitcroft ]
  * Windows guest got 0x5c BSOD when rebooting (LP: #1660519)
    - KVM: x86: reset RVI upon system reset
    - KVM: x86: Emulator should set DR6 upon GD like real CPU

  * ipv6: fix a refcnt leak with peer addr (LP: #1662096)
    - ipv6: fix a refcnt leak with peer addr
    - ipv6: use addrconf_get_prefix_route() to remove peer addr
    - ipv6: Avoid double dst_free

  * Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel (LP: #1660634)
    - [Config] CONFIG_NET_DROP_MONITOR=m

 -- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 22 Feb 2017 10:53:06 -0300

Changed in linux (Ubuntu Trusty):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.