This bug was fixed in the package linux-oem-5.6 - 5.6.0-1053.57 --------------- linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium
* focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042) * Packaging resync (LP: #1786013) - update dkms package versions * LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key (LP: #1918134) - [Packaging] sync dkms-build et al from LRMv4 * CVE-2021-29154 - SAUCE: bpf, x86: Validate computation of branch displacements for x86-64 - SAUCE: bpf, x86: Validate computation of branch displacements for x86-32 * xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub- cases (LP: #1909647) - selftests: xfrm: fix test return value override issue in xfrm_policy.sh * ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255 on F-oem-5.6 (LP: #1919147) - selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support * l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on F-OEM-5.6 (LP: #1919277) - l2tp: remove skb_dst_set() from l2tp_xmit_skb() * CVE-2020-0466 - epoll: Keep a reference on files added to the check list - do_epoll_ctl(): clean the failure exits up a bit - fix regression in "epoll: Keep a reference on files added to the check list" * CVE-2021-3178 - nfsd4: readdirplus shouldn't return parent of export * CVE-2020-25285 - mm/hugetlb: fix a race between hugetlb sysctl handlers * CVE-020-10781 - Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()" * CVE-2020-14351 - perf/core: Fix race in the perf_mmap_close() function * CVE-2020-25669 - Input: sunkbd - avoid use-after-free in teardown paths * CVE-2020-14390 - fbcon: remove soft scrollback code * CVE-2021-3411 - x86/kprobes: Fix optprobe to detect INT3 padding correctly * CVE-2020-0423 - binder: fix UAF when releasing todo list * CVE-2020-27830 - speakup: Reject setting the speakup line discipline outside of speakup * CVE-2020-0465 - HID: core: Correctly handle ReportSize being zero - HID: core: Sanitize event code and type when mapping input * CVE-2020-25645 - geneve: add transport ports in route lookup for geneve * CVE-2021-20194 - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou - bpf, cgroup: Fix problematic bounds check * CVE-2020-36158 - mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start -- Stefan Bader <stefan.ba...@canonical.com> Fri, 09 Apr 2021 16:43:44 +0200 ** Changed in: linux-oem-5.6 (Ubuntu Focal) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0423 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0465 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0466 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14351 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14390 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25285 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25645 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25669 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27830 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-36158 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-20194 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29154 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3178 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3411 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5.6 in Ubuntu. https://bugs.launchpad.net/bugs/1919147 Title: ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255 on F-oem-5.6 Status in ubuntu-kernel-tests: In Progress Status in linux-oem-5.6 package in Ubuntu: New Status in linux-oem-5.6 source package in Focal: Fix Released Bug description: [Impact] The ip_defrag.sh test in net from kernel-selftest failed with exit code 255: # selftests: net: ip_defrag.sh not ok 18 selftests: net: ip_defrag.sh # exit=255 [Fix] * aba69d49fb49c9 ("selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support") This patch can be cherry-picked into OEM-5.6 [Test Case] Run this script after building the net test in kselftest directory (linux/tools/testing/selftests) from the kernel tree: make TARGETS=net cd net sudo ./ip_defrag.sh With this patch applied the test will pass without any issue. [Where problems could occur] Change limited to the test case only. And this has already included in other kernels, it's unlikely to cause problems. [Original Bug Report] Issue found on 5.6.0-1050.54 - oem The ip_defrag.sh test failed with: # selftests: net: ip_defrag.sh not ok 18 selftests: net: ip_defrag.sh # exit=255 I don't think this can be called as a regression, since the ubuntu_kernel_selftests test was removed and added back to the test suite until the most recent cycle. And this issue can be reproduced with 5.6.0-1048-oem as well. Note that we have another issue for this test filed against F-oem-5.6 in before, see bug 1908498 It looks like there are several changes after this test since then. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919147/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp