** Changed in: linux (Ubuntu Eoan)
       Status: New => Fix Committed

You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.

  ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Xenial:
Status in linux source package in Bionic:
Status in linux source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [SRU Justification]


  Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an
  AF_PACKET socket are dropped (no carrier).

  This has been fixed in v5.5 by the following upstream commits
   - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
   - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()")


  The bug exists since the beginning of each driver.

  == Fix ==

  Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
  Xenial (4.4).

  == Risk of Regression ==

  This patch affects only the cases described above (when no dst is
  attached to the skb), thus the risk should be low.

To manage notifications about this bug go to:

Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to