ACK: [SRU][F/J][PATCH 0/1] CVE-2024-42156

Manuel Diewald manuel.diewald at canonical.com
Thu Oct 17 14:55:11 UTC 2024


On Tue, Oct 15, 2024 at 04:45:42PM +0200, Massimiliano Pellizzer wrote:
> [Impact]
> 
> s390/pkey: Wipe copies of clear-key structures on failure
> 
> Wipe all sensitive data from stack for all IOCTLs, which convert a
> clear-key into a protected- or secure-key.
> 
> [Fix]
> 
> Noble:  Fixed
> Jammy:  Backported from linux-6.9.y
> Focal:  Applied Jammy patch
> Bionic: Sent to ESM ML
> Xenial: Not affected
> 
> [Test Case]
> 
> Compile tested only.
> 
> [Where problems could occur]
> 
> The fix affects the s390/pkey subsystem. An issue with this fix may lead
> to cryptographic operations failing when using the s390 architecture.
> 
> Holger Dengler (1):
>   s390/pkey: Wipe copies of clear-key structures on failure
> 
>  drivers/s390/crypto/pkey_api.c | 16 +++++++++-------
>  1 file changed, 9 insertions(+), 7 deletions(-)
> 
> -- 
> 2.43.0
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

Acked-by: Manuel Diewald <manuel.diewald at canonical.com>

-- 
 Manuel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241017/070cc062/attachment.sig>


More information about the kernel-team mailing list