Bug 1220766 (CVE-2021-47053)

Summary: VUL-0: CVE-2021-47053: kernel: crypto: sun8i-ss - Fix memory leak of pad
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: gabriele.sonnu, vasant.karasulli
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/395500/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Comment 2 Gabriele Sonnu 2024-03-01 16:09:24 UTC
All affected branches already contain the fix. Closing.
Comment 4 Nicolai Stange 2024-04-29 10:00:30 UTC
The commit from the Fixes tag, upstream commit d9b45418a917 ("crypto: sun8i-ss - support hash algorithms") first appeared in upstream v5.10 and has never been backported manually to any of our branches based on earlier kernel versions. The fix, upstream 50274b01ac16 ("crypto: sun8i-ss - Fix memory leak of pad"), is included in upstream v5.13.

So, judging from the Fixes tagging, none of our kernels has ever been vulnerable, there's no backport accordingly and hence there are no References to amend either AFAICT.

Reassigning back to security-team.
Comment 5 Gabriele Sonnu 2024-06-10 12:12:52 UTC
All done, closing.