[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#931047: marked as done (linux-image-4.19.0-4-amd64: bridge igmp snooping is throughly broken)



Your message dated Sat, 08 May 2021 05:42:36 -0700 (PDT)
with message-id <6096873c.1c69fb81.6fdc6.3a44@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #931047,
regarding linux-image-4.19.0-4-amd64: bridge igmp snooping is throughly broken
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
931047: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931047
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-4.19.0-4-amd64
Version: linux-image-4.19.0-4-amd64
Severity: minor

Dear Maintainer,

The multicast/igmp snooping code in the linux bridge is throughly broken:

1. If a program binds to a v4 multicast group a v6 entry is created in the bridge mdb instead
2. As a result multicast appears to be flooded instead of limited to the ports for which there is a known igmp join.

The end result is that it sort-a works, but is not anywhere near correct or performing.

-- System Information:
Debian Release: 9.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: