ACK: [SRU][F/J][PATCH 0/1] CVE-2024-42156
Manuel Diewald
manuel.diewald at canonical.com
Thu Oct 17 14:55:11 UTC 2024
On Tue, Oct 15, 2024 at 04:45:42PM +0200, Massimiliano Pellizzer wrote:
> [Impact]
>
> s390/pkey: Wipe copies of clear-key structures on failure
>
> Wipe all sensitive data from stack for all IOCTLs, which convert a
> clear-key into a protected- or secure-key.
>
> [Fix]
>
> Noble: Fixed
> Jammy: Backported from linux-6.9.y
> Focal: Applied Jammy patch
> Bionic: Sent to ESM ML
> Xenial: Not affected
>
> [Test Case]
>
> Compile tested only.
>
> [Where problems could occur]
>
> The fix affects the s390/pkey subsystem. An issue with this fix may lead
> to cryptographic operations failing when using the s390 architecture.
>
> Holger Dengler (1):
> s390/pkey: Wipe copies of clear-key structures on failure
>
> drivers/s390/crypto/pkey_api.c | 16 +++++++++-------
> 1 file changed, 9 insertions(+), 7 deletions(-)
>
> --
> 2.43.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
Acked-by: Manuel Diewald <manuel.diewald at canonical.com>
--
Manuel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241017/070cc062/attachment.sig>
More information about the kernel-team
mailing list