This bug was fixed in the package linux-oem-5.6 - 5.6.0-1053.57
---------------
linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium
* focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)
* Packaging resync (LP: #1786013)
- update dkms package versions
* LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
(LP: #1918134)
- [Packaging] sync dkms-build et al from LRMv4
* CVE-2021-29154
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
- SAUCE: bpf, x86: Validate computation of branch displacements for x86-32
* xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
cases (LP: #1909647)
- selftests: xfrm: fix test return value override issue in xfrm_policy.sh
* ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
on F-oem-5.6 (LP: #1919147)
- selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support
* l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
"unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
F-OEM-5.6 (LP: #1919277)
- l2tp: remove skb_dst_set() from l2tp_xmit_skb()
* CVE-2020-0466
- epoll: Keep a reference on files added to the check list
- do_epoll_ctl(): clean the failure exits up a bit
- fix regression in "epoll: Keep a reference on files added to the check
list"
* CVE-2021-3178
- nfsd4: readdirplus shouldn't return parent of export
* CVE-2020-25285
- mm/hugetlb: fix a race between hugetlb sysctl handlers
* CVE-020-10781
- Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"
* CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function
* CVE-2020-25669
- Input: sunkbd - avoid use-after-free in teardown paths
* CVE-2020-14390
- fbcon: remove soft scrollback code
* CVE-2021-3411
- x86/kprobes: Fix optprobe to detect INT3 padding correctly
* CVE-2020-0423
- binder: fix UAF when releasing todo list
* CVE-2020-27830
- speakup: Reject setting the speakup line discipline outside of speakup
* CVE-2020-0465
- HID: core: Correctly handle ReportSize being zero
- HID: core: Sanitize event code and type when mapping input
* CVE-2020-25645
- geneve: add transport ports in route lookup for geneve
* CVE-2021-20194
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
- bpf, cgroup: Fix problematic bounds check
* CVE-2020-36158
- mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start
-- Stefan Bader <[email protected]> Fri, 09 Apr 2021 16:43:44
+0200
** Changed in: linux-oem-5.6 (Ubuntu Focal)
Status: In Progress => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0423
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0465
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-0466
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14351
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14390
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25285
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25645
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25669
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27830
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-36158
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-20194
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29154
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3178
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3411
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1909647
Title:
xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed
sub-cases
Status in ubuntu-kernel-tests:
In Progress
Status in linux package in Ubuntu:
Fix Released
Status in linux-oem-5.6 package in Ubuntu:
Invalid
Status in linux source package in Bionic:
Invalid
Status in linux-oem-5.6 source package in Bionic:
Invalid
Status in linux source package in Focal:
Fix Released
Status in linux-oem-5.6 source package in Focal:
Fix Released
Status in linux source package in Groovy:
Fix Released
Status in linux-oem-5.6 source package in Groovy:
Invalid
Status in linux source package in Hirsute:
Fix Released
Status in linux-oem-5.6 source package in Hirsute:
Invalid
Bug description:
[Impact]
Even with failed cases reported in the xfrm_policy.sh test, the overall
result is still "PASS"
$ sudo ./xfrm_policy.sh
# selftests: net: xfrm_policy.sh
# PASS: policy before exception matches
# FAIL: expected ping to .254 to fail (exceptions)
# PASS: direct policy matches (exceptions)
# PASS: policy matches (exceptions)
# FAIL: expected ping to .254 to fail (exceptions and block policies)
# PASS: direct policy matches (exceptions and block policies)
# PASS: policy matches (exceptions and block policies)
# FAIL: expected ping to .254 to fail (exceptions and block policies after
hresh changes)
# PASS: direct policy matches (exceptions and block policies after hresh
changes)
# PASS: policy matches (exceptions and block policies after hresh changes)
# FAIL: expected ping to .254 to fail (exceptions and block policies after
hthresh change in ns3)
# PASS: direct policy matches (exceptions and block policies after hthresh
change in ns3)
# PASS: policy matches (exceptions and block policies after hthresh change
in ns3)
# FAIL: expected ping to .254 to fail (exceptions and block policies after
htresh change to normal)
# PASS: direct policy matches (exceptions and block policies after htresh
change to normal)
# PASS: policy matches (exceptions and block policies after htresh change to
normal)
# PASS: policies with repeated htresh change
ok 12 selftests: net: xfrm_policy.sh
$ echo $?
0
This is because of the variable "lret" in check_xfrm() is not a local
variable, and it looks like it will override the one in
check_exceptions() thus making the return value become 0 for the
passed test case after the failed one.
[Fix]
* f6e9ceb7a7fc32 (" selftests: xfrm: fix test return value override issue in
xfrm_policy.sh")
Focal kernel got this patch via stable update, and we don't have this
test in Bionic. Only Groovy and OEM-5.6 are affected.
This patch can be cherry-picked into all of the affected kernels.
[Test]
Run the xfrm_policy.sh test, if there is any failed case the final result
will not be 0.
[Regression Potential]
This change is just for testing tools, it's unlikely to affect real kernel
functionality. However it's expected to generate failures in our test report as
it's reflecting the real test result.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1909647/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp