APPLIED[X]/NAK[B/D/E]: [X][B][D][E][F][SRU][PATCH 0/1] Fix for CVE-2019-19062

Kleber Souza kleber.souza at canonical.com
Mon Jan 6 12:09:33 UTC 2020


On 2019-12-06 11:08, Po-Hsu Lin wrote:
> From the commit message:
> In crypto_report, a new skb is created via nlmsg_new(). This skb should
> be released if crypto_report_alg() fails.
> 
> This patch can be cherry-picked into D/E/F.
> For X and B, it needs to be backported with the same logic as the
> crypto_user.c hasn't been renamed into crypto_user_base.c yet.
> 
> Kernel test builds OK.
> 
> Navid Emamdoost (1):
>   crypto: user - fix memory leak in crypto_report
> 
>  crypto/crypto_user_base.c | 4 +++-
>  1 file changed, 3 insertions(+), 1 deletion(-)
> 

Applied to xenial/master-next branch.

Already applied to Bionic, Disco and Eoan by stable upstream updates.

Thanks,
Kleber



More information about the kernel-team mailing list