Described commit for the fix:

 *  commit 9392a27d88b9707145d713654eb26f0c29789e50
 *  Author: Jens Axboe <ax...@kernel.dk>
 *  Date:   Thu Feb 6 21:42:51 2020 -0700
 *
 *  io-wq: add support for inheriting ->fs
 *
 *  commit ff002b30181d30cdfbca316dadd099c3ca0d739c
 *  Author: Jens Axboe <ax...@kernel.dk>
 *  Date:   Fri Feb 7 16:05:21 2020 -0700
 *
 *  io_uring: grab ->fs as part of async preparation

Can be found in G/H.

** Also affects: linux (Ubuntu)
   Importance: Undecided
       Status: New

** Tags added: ubuntu-ltp-syscalls

** Also affects: linux (Ubuntu Hirsute)
   Importance: Undecided
       Status: New

** Also affects: linux (Ubuntu Groovy)
   Importance: Undecided
       Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Groovy)
       Status: New => Fix Released

** Changed in: linux (Ubuntu Hirsute)
       Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-29373

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1916046

Title:
  cve-2020-29373 in cve from ubuntu_ltp failed

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Focal:
  New
Status in linux source package in Groovy:
  Fix Released
Status in linux source package in Hirsute:
  Fix Released

Bug description:
  Not a regression, this is a new test added Feb 8, 2021:
  https://github.com/linux-test-
  project/ltp/commit/c4f669f13106862b6d8be38adf7825ae00ca7ac5

  The log shows:
  13260.        02/08 21:37:31 DEBUG| utils:0153| [stdout] startup='Mon Feb 8 
21:37:30 2021'
  13261.        02/08 21:37:31 DEBUG| utils:0153| [stdout] tst_test.c:1261: 
TINFO: Timeout per run is 0h 05m 00s
  13262.        02/08 21:37:31 DEBUG| utils:0153| [stdout] io_uring02.c:148: 
TFAIL: Write outside chroot succeeded.
  13263.        02/08 21:37:31 DEBUG| utils:0153| [stdout]
  13264.        02/08 21:37:31 DEBUG| utils:0153| [stdout] HINT: You _MAY_ be 
missing kernel fixes, see:
  13265.        02/08 21:37:31 DEBUG| utils:0153| [stdout]
  13266.        02/08 21:37:31 DEBUG| utils:0153| [stdout] 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9392a27d88b9
  13267.        02/08 21:37:31 DEBUG| utils:0153| [stdout] 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff002b30181d
  13268.        02/08 21:37:31 DEBUG| utils:0153| [stdout]
  13269.        02/08 21:37:31 DEBUG| utils:0153| [stdout] HINT: You _MAY_ be 
vulnerable to CVE(s), see:
  13270.        02/08 21:37:31 DEBUG| utils:0153| [stdout]
  13271.        02/08 21:37:31 DEBUG| utils:0153| [stdout] 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29373
  13272.        02/08 21:37:31 DEBUG| utils:0153| [stdout]
  13273.        02/08 21:37:31 DEBUG| utils:0153| [stdout] Summary:
  13274.        02/08 21:37:31 DEBUG| utils:0153| [stdout] passed 0
  13275.        02/08 21:37:31 DEBUG| utils:0153| [stdout] failed 1
  13276.        02/08 21:37:31 DEBUG| utils:0153| [stdout] broken 0
  13277.        02/08 21:37:31 DEBUG| utils:0153| [stdout] skipped 0
  13278.        02/08 21:37:31 DEBUG| utils:0153| [stdout] warnings 0
  13279.        02/08 21:37:31 DEBUG| utils:0153| [stdout] tag=cve-2020-29373 
stime=1612820250 dur=0 exit=exited stat=1 core=no cu=0

  As of Feb 18, 2021, this CVE is not mitigated yet:
  https://ubuntu.com/security/CVE-2020-29373

  Seen with linux-kvm 5.4.0-1033.34.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1916046/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to