UN-NAK[D]: [X][B][D][E][F][SRU][PATCH 0/1] Fix for CVE-2019-19062

Kleber Souza kleber.souza at canonical.com
Tue Dec 17 08:38:21 UTC 2019


On 12.12.19 11:52, Kleber Souza wrote:
> On 2019-12-06 11:08, Po-Hsu Lin wrote:
>> From the commit message:
>> In crypto_report, a new skb is created via nlmsg_new(). This skb should
>> be released if crypto_report_alg() fails.
>>
>> This patch can be cherry-picked into D/E/F.
>> For X and B, it needs to be backported with the same logic as the
>> crypto_user.c hasn't been renamed into crypto_user_base.c yet.
>>
>> Kernel test builds OK.
>>
>> Navid Emamdoost (1):
>>   crypto: user - fix memory leak in crypto_report
>>
>>  crypto/crypto_user_base.c | 4 +++-
>>  1 file changed, 3 insertions(+), 1 deletion(-)
>>
> 
> Disco will EOL in January and we are not planning to release another
> kernel SRU for it. So I'm NAK'ing the patches for D.
> 

Although Disco support will end in January, our plan is to continue producing
5.0 kernel updates for a yet to be defined period.

So please disregard my NAK to this patch.

Thanks.



More information about the kernel-team mailing list