This bug was fixed in the package linux - 5.15.0-138.148

---------------
linux (5.15.0-138.148) jammy; urgency=medium

  * jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587)

  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
    (LP: #2096976)
    - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload

  * CVE-2025-21756
    - vsock: Keep the binding until socket destruction
    - vsock: Orphan socket after transport release

  * CVE-2024-50256
    - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()

  * CVE-2025-21702
    - pfifo_tail_enqueue: Drop new packet when sch->limit == 0

  * CVE-2025-21703
    - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()

  * CVE-2025-21700
    - net: sched: Disallow replacing of child qdisc from one parent to another

  * CVE-2024-46826
    - ELF: fix kernel.randomize_va_space double read

  * CVE-2024-56651
    - can: hi311x: hi3110_can_ist(): fix potential use-after-free

  * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824)
    - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()

  * CVE-2024-50248
    - ntfs3: Add bounds checking to mi_enum_attr()
    - fs/ntfs3: Sequential field availability check in mi_enum_attr()

  * CVE-2022-0995
    - watch_queue: Use the bitmap API when applicable

  * CVE-2024-26837
    - net: bridge: switchdev: Skip MDB replays of deferred events on offload

  * CVE-2025-21701
    - net: avoid race between device unregistration and ethnl ops

  * CVE-2024-57798
    - drm/dp_mst: Skip CSN if topology probing is not done yet
    - drm/dp_mst: Ensure mst_primary pointer is valid in
      drm_dp_mst_handle_up_req()

  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle

  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()

  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Stefan Bader <stefan.ba...@canonical.com>  Fri, 14 Mar 2025 15:32:05
+0100

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2096976

Title:
  ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Released
Status in linux source package in Oracular:
  Fix Released

Bug description:
  [ Impact ]

  selftest: netfilter: after upstream commit 
2cf567f421dbfe7e53b7e5ddee9400da10efb75d
  ipsec_offload test needs its source ip written into  the expected value, 
however the
  complete patchset 
https://lore.kernel.org/lkml/20241010040027.21440-1-liuhang...@gmail.com/
  has a more comprehensive modification so this only fixes the test for the
  current status (only patch 2/3 of the patchset applied).

  Found on Oracular 6.11.0-17.17 and should be found on its derivatives /
  backports.

  Log output:

      # selftests: net: rtnetlink.sh
      # PASS: policy routing
      ---(snip)---
      # PASS: ipsec
      # FAIL: ipsec_offload incorrect driver data
      # FAIL: ipsec_offload
      # PASS: bridge fdb get

  Verbose output should be like:

      COMMAND: modprobe -q netdevsim
      COMMAND: ip x p add dir out src 192.168.123.3/24 dst 192.168.123.4/24 tmpl
  proto esp src 192.168.123.3 dst 192.168.123.4 spi 9 mode transport reqid 42
      COMMAND: ip x p add dir in src 192.168.123.4/24 dst 192.168.123.3/24 tmpl
  proto esp src 192.168.123.4 dst 192.168.123.3 spi 9 mode transport reqid 42
      COMMAND: ip x s add proto esp src 192.168.123.3 dst 192.168.123.4 spi 9 
mode
  transport reqid 42 aead rfc4106(gcm(aes))
  0x3132333435363738393031323334353664636261 128 sel src 192.168.123.3/24 dst
  192.168.123.4/24 offload dev eni0np1 dir out
      COMMAND: ip x s add proto esp src 192.168.123.4 dst 192.168.123.3 spi 9 
mode
  transport reqid 42 aead rfc4106(gcm(aes))
  0x3132333435363738393031323334353664636261 128 sel src 192.168.123.4/24 dst
  192.168.123.3/24 offload dev eni0np1 dir in
      COMMAND: diff /sys/kernel/debug/netdevsim/netdevsim0/ports/0//ipsec -
          2c2
      < sa[0] tx ipaddr=0x00000000 00000000 00000000 047ba8c0
      ---
      > sa[0] tx ipaddr=0x00000000 00000000 00000000 00000000
      FAIL: ipsec_offload incorrect driver data

  [ Fix ]

  Oracular: fixed separately
  Jammy:    fixed separately

  [ Test Plan ]

  Compiled, boot tested and auto-tested on amd64.

  [ Where Problems Could Occur ]

  The fix affects only the failing ipsec_offload of the netfilter test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2096976/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to