APPLIED[X]/NAK[B/D/E]: [X][B][D][E][F][SRU][PATCH 0/1] Fix for CVE-2019-19062
Kleber Souza
kleber.souza at canonical.com
Mon Jan 6 12:09:33 UTC 2020
On 2019-12-06 11:08, Po-Hsu Lin wrote:
> From the commit message:
> In crypto_report, a new skb is created via nlmsg_new(). This skb should
> be released if crypto_report_alg() fails.
>
> This patch can be cherry-picked into D/E/F.
> For X and B, it needs to be backported with the same logic as the
> crypto_user.c hasn't been renamed into crypto_user_base.c yet.
>
> Kernel test builds OK.
>
> Navid Emamdoost (1):
> crypto: user - fix memory leak in crypto_report
>
> crypto/crypto_user_base.c | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
Applied to xenial/master-next branch.
Already applied to Bionic, Disco and Eoan by stable upstream updates.
Thanks,
Kleber
More information about the kernel-team
mailing list