← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1860969] Re: ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

 

These have already been applied to our 5.4 focal tree through upstream
stable updates.

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
       Status: Incomplete

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
       Status: New

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Focal)
       Status: Incomplete => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1860969

Title:
  ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Xenial:
  New
Status in linux source package in Bionic:
  New
Status in linux source package in Eoan:
  New
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [SRU Justification]

  [Impact]

  Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an
  AF_PACKET socket are dropped (no carrier).

  This has been fixed in v5.5 by the following upstream commits
   - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
   - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()")

  https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95224166a903
  https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f042365dbffe

  The bug exists since the beginning of each driver.

  == Fix ==

  Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
  Xenial (4.4).

  == Risk of Regression ==

  This patch affects only the cases described above (when no dst is
  attached to the skb), thus the risk should be low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860969/+subscriptions