This bug was fixed in the package linux-oem-5.6 - 5.6.0-1053.57
---------------
linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium
* focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)
* Packaging resync (LP: #1786013)
- update dkms package versions
* LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
(LP: #1918134)
- [Packaging] sync dkms-build et al from LRMv4
* CVE-2021-29154
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-32
* xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
cases (LP: #1909647)
- selftests: xfrm: fix test return value override issue in xfrm_policy.sh
* ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
on F-oem-5.6 (LP: #1919147)
- selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support
* l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
"unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
F-OEM-5.6 (LP: #1919277)
- l2tp: remove skb_dst_set() from l2tp_xmit_skb()
* CVE-2020-0466
- epoll: Keep a reference on files added to the check list
- do_epoll_ctl(): clean the failure exits up a bit
- fix regression in "epoll: Keep a reference on files added to the check
list"
* CVE-2021-3178
- nfsd4: readdirplus shouldn't return parent of export
* CVE-2020-25285
- mm/hugetlb: fix a race between hugetlb sysctl handlers
* CVE-020-10781
- Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"
* CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function
* CVE-2020-25669
- Input: sunkbd - avoid use-after-free in teardown paths
* CVE-2020-14390
- fbcon: remove soft scrollback code
* CVE-2021-3411
- x86/kprobes: Fix optprobe to detect INT3 padding correctly
* CVE-2020-0423
- binder: fix UAF when releasing todo list
* CVE-2020-27830
- speakup: Reject setting the speakup line discipline outside of speakup
* CVE-2020-0465
- HID: core: Correctly handle ReportSize being zero
- HID: core: Sanitize event code and type when mapping input
* CVE-2020-25645
- geneve: add transport ports in route lookup for geneve
* CVE-2021-20194
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- bpf, cgroup: Fix problematic bounds check
* CVE-2020-36158
- mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
-- Stefan Bader <[email protected]> Fri, 09 Apr 2021 16:43:44
+0200
** Changed in: linux-oem-5.6 (Ubuntu Focal)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0423
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0465
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0466
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14351
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14390
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25285
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25645
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25669
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27830
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-36158
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-20194
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29154
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3178
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3411
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1919147
Title:
ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code
255 on F-oem-5.6
Status in ubuntu-kernel-tests:
In Progress
Status in linux-oem-5.6 package in Ubuntu:
New
Status in linux-oem-5.6 source package in Focal:
Fix Released
Bug description:
[Impact]
The ip_defrag.sh test in net from kernel-selftest failed with exit
code 255:
# selftests: net: ip_defrag.sh
not ok 18 selftests: net: ip_defrag.sh # exit=255
[Fix]
* aba69d49fb49c9 ("selftests: net: ip_defrag: modprobe missing
nf_defrag_ipv6 support")
This patch can be cherry-picked into OEM-5.6
[Test Case]
Run this script after building the net test in kselftest directory
(linux/tools/testing/selftests) from the kernel tree:
make TARGETS=net
cd net
sudo ./ip_defrag.sh
With this patch applied the test will pass without any issue.
[Where problems could occur]
Change limited to the test case only. And this has already included
in other kernels, it's unlikely to cause problems.
[Original Bug Report]
Issue found on 5.6.0-1050.54 - oem
The ip_defrag.sh test failed with:
# selftests: net: ip_defrag.sh
not ok 18 selftests: net: ip_defrag.sh # exit=255
I don't think this can be called as a regression, since the
ubuntu_kernel_selftests test was removed and added back to the test
suite until the most recent cycle. And this issue can be reproduced
with 5.6.0-1048-oem as well.
Note that we have another issue for this test filed against F-oem-5.6 in
before, see bug 1908498
It looks like there are several changes after this test since then.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1919147/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp