This bug was fixed in the package linux - 5.4.0-42.46
---------------
linux (5.4.0-42.46) focal; urgency=medium
* focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069)
* linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
- SAUCE: Revert "netprio_cgroup: Fix unlimited memory leak of v2 cgroups"
linux (5.4.0-41.45) focal; urgency=medium
* focal/linux: 5.4.0-41.45 -proposed tracker (LP: #1885855)
* Packaging resync (LP: #1786013)
- update dkms package versions
* CVE-2019-19642
- kernel/relay.c: handle alloc_percpu returning NULL in relay_open
* CVE-2019-16089
- SAUCE: nbd_genl_status: null check for nla_nest_start
* CVE-2020-11935
- aufs: do not call i_readcount_inc()
* ip_defrag.sh in net from ubuntu_kernel_selftests failed with 5.0 / 5.3 / 5.4
kernel (LP: #1826848)
- selftests: net: ip_defrag: ignore EPERM
* Update lockdown patches (LP: #1884159)
- SAUCE: acpi: disallow loading configfs acpi tables when locked down
* seccomp_bpf fails on powerpc (LP: #1885757)
- SAUCE: selftests/seccomp: fix ptrace tests on powerpc
* Introduce the new NVIDIA 418-server and 440-server series, and update the
current NVIDIA drivers (LP: #1881137)
- [packaging] add signed modules for the 418-server and the 440-server
flavours
-- Khalid Elmously <[email protected]> Thu, 09 Jul 2020
19:50:26 -0400
** Changed in: linux (Ubuntu Focal)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-16089
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-19642
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-11935
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1826848
Title:
ip_defrag.sh in net from ubuntu_kernel_selftests failed with 5.0 / 5.3
/ 5.4 kernel
Status in ubuntu-kernel-tests:
Confirmed
Status in linux package in Ubuntu:
Confirmed
Status in linux source package in Disco:
Invalid
Status in linux source package in Eoan:
Fix Committed
Status in linux source package in Focal:
Fix Released
Bug description:
[Impact]
Failure to run ip_defrag deterministically.
[Fix]
Use smaller packets and ignore EPERM.
[Test case]
Run the test multiple times without observing failures.
[Regression potential]
If the test fix is incorrect, it will cause us to miss real kernel bugs. But
as it is now, we are already ignoring its results.
==========================================================================
Test failed becuase:
./ip_defrag: sendto overlap: 1400: Operation not permitted
selftests: net: ip_defrag.sh
========================================
ipv6 tx:17 gso:1 (fail)
OK
ipv4 defrag
PASS
seed = 1556203721
ipv4 defrag with overlaps
PASS
seed = 1556203722
ipv6 defrag
seed = 1556203756
PASS
ipv6 defrag with overlaps
seed = 1556203756
./ip_defrag: sendto overlap: 1400: Operation not permitted
not ok 1..17 selftests: net: ip_defrag.sh [FAIL]
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1826848/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp