ACK: [X][B][D][E][F][SRU][PATCH 0/1] Fix for CVE-2019-19062

Connor Kuehl connor.kuehl at canonical.com
Fri Dec 6 21:11:28 UTC 2019


On 12/6/19 2:08 AM, Po-Hsu Lin wrote:
>  From the commit message:
> In crypto_report, a new skb is created via nlmsg_new(). This skb should
> be released if crypto_report_alg() fails.
> 
> This patch can be cherry-picked into D/E/F.
> For X and B, it needs to be backported with the same logic as the
> crypto_user.c hasn't been renamed into crypto_user_base.c yet.
> 
> Kernel test builds OK.
> 
> Navid Emamdoost (1):
>    crypto: user - fix memory leak in crypto_report
> 
>   crypto/crypto_user_base.c | 4 +++-
>   1 file changed, 3 insertions(+), 1 deletion(-)
> 

Acked-by: Connor Kuehl <connor.kuehl at canonical.com>



More information about the kernel-team mailing list