[{"id":3684777,"web_url":"http://patchwork.ozlabs.org/comment/3684777/","msgid":"<fff93eb9-f31a-4427-a950-c09993f72b3d@canonical.com>","list_archive_url":null,"date":"2026-04-30T15:09:57","subject":"ACK/Cmnt: [SRU][Q/N/J][PATCH 0/3] CVE-2026-31431","submitter":{"id":2898,"url":"http://patchwork.ozlabs.org/api/people/2898/","name":"Stefan Bader","email":"stefan.bader@canonical.com"},"content":"On 30/04/2026 14:30, Massimiliano Pellizzer wrote:\n> https://ubuntu.com/security/CVE-2026-31431\n> \n> [ Impact ]\n> \n> CVE-2026-31431 is a local privilege escalation vulnerability\n> in the Linux kernel's AF_ALG (Algorithm) socket subsystem.\n> \n> The vulnerability allows an unprivileged local user to perform a deterministic,\n> controlled 4-byte write into the kernel page cache of any file that the attacker\n> can read, including setuid-root binaries such as /usr/bin/su.\n> Because the page cache is what the kernel consults when executing a file,\n> the corrupted in-memory copy is immediately visible system-wide without the on-disk\n> checksum being altered.\n> \n> [ Fix ]\n> \n> * Questing, cherry pick the following patches from upstream:\n>    - a664bf3d603d crypto: algif_aead - Revert to operating out-of-place\n>    - 5aa58c3a572b crypto: algif_aead - snapshot IV for async AEAD requests\n>    - e02494114ebf crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption\n>    - 1f48ad3b19a9 crypto: authencesn - Fix src offset when decrypting in-place\n>    - 31d00156e50e crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl\n> \n> * Noble, cherry pick the following patches from linux-6.12.y:\n>    - 41c3aa511e6e crypto: scatterwalk - Backport memcpy_sglist()\n>    - 183137264401 crypto: algif_aead - use memcpy_sglist() instead of null skcipher\n>    - 8b88d99341f1 crypto: algif_aead - Revert to operating out-of-place\n>    - 46fdb39e8322 crypto: algif_aead - snapshot IV for async AEAD requests\n>    - 7bc058a9b82b crypto: authenc - use memcpy_sglist() instead of null skcipher\n>    - 89fe118b6470 crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption\n>    - 129f12934401 crypto: authencesn - Fix src offset when decrypting in-place\n>    - c8369a6d62f5 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl\n> \n> * Jammy, cherry pick the following patches from linux-5.15.y:\n>    - 36435a56cd6b crypto: scatterwalk - Backport memcpy_sglist()\n>    - 17774d99bb43 crypto: algif_aead - use memcpy_sglist() instead of null skcipher\n>    - 19d43105a97b crypto: algif_aead - Revert to operating out-of-place\n>    - a920cabdb0b7 crypto: algif_aead - snapshot IV for async AEAD requests\n>    - e416c41a96c8 crypto: authenc - use memcpy_sglist() instead of null skcipher\n>    - d589abd8b019 crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption\n>    - 723bb1b4a6dd crypto: authencesn - Fix src offset when decrypting in-place\n>    - 2b781d1d4f93 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl\n>    - fd427dd84f22 crypto: algif_aead - Fix minimum RX size check for decryption\n> \n> [ Test Plan ]\n> \n> Compiled and boot tested.\n> Tested using the publicly available exploit.\n> Tested using LTP crypto testsuite for regressions.\n> \n> [ Where Problems Could Occur ]\n> \n> The fix reverts the 2017 in-place optimization entirely, restoring out-of-place\n> operation in algif_aead. A bug in the new out-of-place TX SGL allocation\n> or AAD copy path could produce corrupt ciphertext, failed tag verification,\n> or memory mismanagement under edge-case input lengths, affecting every consumer\n> of the AF_ALG AEAD interface kernel-wide.\n> \n> \nBased on testing done.\n\nAcked-by: Stefan Bader <stefan.bader@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=HmyQSXWw;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g5yKD34f0z1yHZ\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 01:10:23 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wIT1s-0006bU-50; Thu, 30 Apr 2026 15:10:16 +0000","from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <stefan.bader@canonical.com>)\n id 1wIT1r-0006b9-74\n for kernel-team@lists.ubuntu.com; Thu, 30 Apr 2026 15:10:15 +0000","from mail-wr1-f71.google.com (mail-wr1-f71.google.com\n [209.85.221.71])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id EFCA03FE9E\n for <kernel-team@lists.ubuntu.com>; Thu, 30 Apr 2026 15:10:14 +0000 (UTC)","by mail-wr1-f71.google.com with SMTP id\n ffacd0b85a97d-4411a529bc0so908912f8f.0\n for <kernel-team@lists.ubuntu.com>; Thu, 30 Apr 2026 08:10:14 -0700 (PDT)","from [192.168.2.167] ([89.244.127.46])\n by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-48a822c82f2sm70533115e9.11.2026.04.30.08.10.12\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Thu, 30 Apr 2026 08:10:12 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1777561815;\n bh=eciPQzEdQUTQFMPMeGkQb4uwFX/QQG/You5md3zRm1s=;\n h=Message-ID:Date:MIME-Version:Subject:To:References:From:\n In-Reply-To:Content-Type;\n b=HmyQSXWw909/9wurrM3rLOP2bTJ+c8MgDkCz7hqYS6UE/C1xWKsshEIGnlEUYO47g\n B6xYDSBsEpv6UFZri75G2pgj7wA45DsGLUhAHCgJW9VLQHW9xq62F/90oRUgmPMFNe\n Npm1LlVKgcJwFTpVEJvGPlhdIafGdULHoMuA8I2sE6pIJZrWZAN379F1hDhnnQvd/m\n N1MFTrxGNchkvbIcnhnFU8nUlJ3VeorxI9W/2ddwITjbSzKdCU8FkCGYL1zePnH2x0\n vd4XG8oJci9IgOxvPqPxRi1VMyGcZUgyvgrjd2lMxp/U+ntU0L1LX81lLpjsvTeZDe\n BgTtcYrOGcZxaGfxStOaKzI70VqKfF9GNlcr1v2a6zo0YEr0T7z66dxLXscHuCOHs+\n 2z+fX7wpqPy3Q2wtDc2SpNO7YQsFP6uXbSbVfglzB6cLCf4Tvt63l8jmTfxOTQyQic\n PHs6xiBKoDLnaQudVUID7ZLlf3bbjgrIB2CpFakgw5rb4J2jsPs5TRtDMXWyywdcpY\n ARmOEN4AvKna12VCy53Wv9DYfY4SnJQ26SpLfE1rw3VBsq4dfrsaKxedGODlVYTTmK\n ngJ2I7v/gRX4/K31aJX2BgASxfDmDR2ZVrNonsTr66IgvtaMqyKBekPQumrcN+/20L\n lH3YyaKCaxp+PL+5ekZxGTAA=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1777561814; x=1778166614;\n h=in-reply-to:autocrypt:content-language:from:references:to:subject\n :user-agent:mime-version:date:message-id:x-gm-gg:x-gm-message-state\n :from:to:cc:subject:date:message-id:reply-to;\n bh=eciPQzEdQUTQFMPMeGkQb4uwFX/QQG/You5md3zRm1s=;\n b=F361n4TW8kY04jlp6b+82xZhTARdzHS1ntSSrLU/4AO47t0YvynWZfluE3yNYl0Fc3\n 6BlYCP94UVUamYOhkghT3z0ok/AEuY4ODPNpx2NGHNnXxwmAMYEWLETHz4FkeFr9Hh44\n q88o1Xru6wFFQw5eocjZtrwBiXrDUaag7Y9LjgxyEdZvYd/j1rDrzZg0B8xQB+dTLtiG\n WtAbTzoquJ8GOftdrSZtloGtTHETJrwrQt/FnfC6MSVBp8t73ruUPL8laKi0yg7oKwGb\n cMYtns/bR1iVle65UQQex9WTbAMOvlwIz/Qs700RURftpH6XulbGAEB68Ucl21TEY7EO\n ttZQ==","X-Gm-Message-State":"AOJu0Yy20BJ1phQijJuUYmkyEGnJwHmXsNzg1VvGsDkPYx7T3+uDQMAG\n 8cC08ofN5BJHS0MWLyUMwHQvmETTjK5QpYNicczlwo6BgA0k+BanRgYBZf0mFhFJopAtGTt15DD\n K6J4i7OsUl0/iEDC/V4xMeq/3286AadFON8z6FNAsbd0KN984OEPohnXpgwyrEARzuIzg7bSKcy\n 4ngQzuOCtC6R4Azg==","X-Gm-Gg":"AeBDiete8w3WQNzHvHj4Syx+4gTEilSD1FXWg4oKGHMx3Q7cNWx958jUnQ8lnd72Err\n ZyaS8n0KY5yyoSodBNN/j9A9qFVSu/0UGmjtSmrD+pu1nQsdc2+hpYovi4+828a0rIhW1lWn6dY\n An1VEuautNuD7aCqbrbHfwSaPMjDRZi7KNmLJYcOQyW1TuAJvJ6zJwtmPFvP/P06vYG8r0RvBxY\n yEowJEBW5CeW40kSK+C/+x2ocrWcID/WbNIQA/SB8aOBMKPc7096pJ0yMUHe9bv70dLtYSUCpwX\n 8m4yGW0WPwcQlM9B7ilAcz6txRHrpH2oHtGpRDGaagRT8fblkRv5kSqXzxL1EfNyvrRKtXu35Qa\n LRu+MZomenOu3Q54aW8LEwiH4HzpefRUBiaG7d1HrPVMaWA==","X-Received":["by 2002:a05:600c:3e8d:b0:48a:53ea:140b with SMTP id\n 5b1f17b1804b1-48a844a4728mr56883205e9.28.1777561814257;\n Thu, 30 Apr 2026 08:10:14 -0700 (PDT)","by 2002:a05:600c:3e8d:b0:48a:53ea:140b with SMTP id\n 5b1f17b1804b1-48a844a4728mr56882175e9.28.1777561813567;\n Thu, 30 Apr 2026 08:10:13 -0700 (PDT)"],"Message-ID":"<fff93eb9-f31a-4427-a950-c09993f72b3d@canonical.com>","Date":"Thu, 30 Apr 2026 17:09:57 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"ACK/Cmnt: [SRU][Q/N/J][PATCH 0/3] CVE-2026-31431","To":"kernel-team@lists.ubuntu.com","References":"\n <177754965576.503496.12142658280614619991@tuxedo-infinitybook.public>","From":"Stefan Bader <stefan.bader@canonical.com>","Content-Language":"en-US, de-DE","Autocrypt":"addr=stefan.bader@canonical.com; keydata=\n xsFNBE5mmXEBEADoM0yd6ERIuH2sQjbCGtrt0SFCbpAuOgNy7LSDJw2vZHkZ1bLPtpojdQId\n 258o/4V+qLWaWLjbQdadzodnVUsvb+LUKJhFRB1kmzVYNxiu7AtxOnNmUn9dl1oS90IACo1B\n BpaMIunnKu1pp7s3sfzWapsNMwHbYVHXyJeaPFtMqOxd1V7bNEAC9uNjqJ3IG15f5/50+N+w\n LGkd5QJmp6Hs9RgCXQMDn989+qFnJga390C9JPWYye0sLjQeZTuUgdhebP0nvciOlKwaOC8v\n K3UwEIbjt+eL18kBq4VBgrqQiMupmTP9oQNYEgk2FiW3iAQ9BXE8VGiglUOF8KIe/2okVjdO\n nl3VgOHumV+emrE8XFOB2pgVmoklYNvOjaIV7UBesO5/16jbhGVDXskpZkrP/Ip+n9XD/EJM\n ismF8UcvcL4aPwZf9J03fZT4HARXuig/GXdK7nMgCRChKwsAARjw5f8lUx5iR1wZwSa7HhHP\n rAclUzjFNK2819/Ke5kM1UuT1X9aqL+uLYQEDB3QfJmdzVv5vHON3O7GOfaxBICo4Z5OdXSQ\n SRetiJ8YeUhKpWSqP59PSsbJg+nCKvWfkl/XUu5cFO4V/+NfivTttnoFwNhi/4lrBKZDhGVm\n 6Oo/VytPpGHXt29npHb8x0NsQOsfZeam9Z5ysmePwH/53Np8NQARAQABzTVTdGVmYW4gQmFk\n ZXIgKENhbm9uaWNhbCkgPHN0ZWZhbi5iYWRlckBjYW5vbmljYWwuY29tPsLBlwQTAQoAQQIb\n AwULCQgHAwUVCgkICwUWAgMBAAIeAQIXgAIZARYhBNtdfMrzmU4zldpNPuhnXe7L7s6jBQJp\n W2G+BQkdRgtNAAoJEOhnXe7L7s6jKkkQAJVQyg5OSey93jOS5eyVwR2/9OIWllLPx7dfxsqR\n OPB6lWCTSFUPoZDOYyPFCKCtGUDBKopqIFpZcBgCRxzeF9QW9DnGqgMcZj5eUs/s7iNYEaqB\n 2ZwNAZZ9TWdBoTXjgTdpNq/4DrY8DxnI9/6/3QnYQ2sRdWCEzsqIFSRPQw+m94SNytWn8ow4\n PbiycCxYXUbr86j5j/OJmi++JDTEvpidR43Q/oGIOdJi26CKVKjpzyGFwVGOz/O3DPhQDvv9\n gqatT8fwCDHtOW5wEv2vm402jUEROj4wgEDvzak5yv7rgnAFTSZhvyVLbHeiOnamRZgeReGN\n k9jYobAIzA0zn+mm3jvmwvD7zrvaosUdwzaB9m0tkEKaI2seA2UJBiX+XCXIRbFwoOvCMxiU\n +RLcfElVjYMwNcQPkNu8vkk2APDNYpGBEovwX9b8VleOAt8oSMk/wMip+fEcPgdCO9mnVjb6\n R6VuUTTrnqzGMurA3M1b3OQApSQqHt9mEyNCjWEXm8IPzg+b3gsNGLD6N8eYE8zpoG/afCMQ\n ihrg6BOpiRUwIo0FuTteEyKqW7WCT8Dz6Y2mKRYTETAetshOgb7IeYIbf71olfTNZW/VWaUC\n A/KBqtzKPCKz7ymQwMSO/EkFt3MvyTdkIk1OU7wwudMe71ml0new05FeZ/reP1VSC5zWzsFN\n BE5mmXEBEADCkRfuS1cAx02yTsk9gyAapcQnpb6EBay40Ch/IPrMF2iG4F0CX6puKubjjVbq\n L6jEKyksqPb57Vu9WAufy4Rlv3OwzaymmWk00CROCVSuEV+3bikBTnF/l+VVCvccNlpHsADM\n LncaATvSOj1iCXeikxNAk2LA3g9H8uz7lQUhjni05ixBZGDGbaxB6Odmh58q8k/iooREHyqf\n leSg1zpuBxYGKVug2daXLSvQI7w59eYO/L1YpLtu1sMzqRyYdSUyCiNcXDO/Ko221o2NfdqQ\n 9KET1az8QTsBnZeTsjsk4VnYwjc9ZEYN7LATWrhz8vgI2eP80lXxXm9kx81NubnOPxna5vg9\n DhxZEjo8A+zE4c5bQuSCJ3GTnOalXsAz0Lwk1H1nFwizUqvmPI8eAqZGeZoJ409uDcNi2BrR\n +W7MjXxPM5k4M2zMiNfIvNBjclBLE/m7nrcxNLOk1z/KQiFVZQhtHXoOTUWmINZ+E3GIJT2D\n ToFxUoaEW2GdX0rjqEerbUaoo6SBX7HxmjAzseND9IatGTxgN+EhJUiIWK4UOH343erB7Hga\n 98WeEzZTq7W2NvwnqOVAq2ElnPhHrD98nWIBZPOEu6xgiyvVFfXJGmRBMRBR+8hBjfX0643n\n Lq3wYOrZbNfP8dJVQZ4GxI6OLTcwYNgifqp/SIJzE1tgkwARAQABwsF8BBgBCgAmAhsMFiEE\n 2118yvOZTjOV2k0+6Gdd7svuzqMFAmlbYgMFCRz28ZIACgkQ6Gdd7svuzqPdcA/+O2pTiwcb\n DcmERqn1LG1ew8QruGyUXa2sUYGXM239ARnKCaAqJVV0E9pn3oYG6cJ73k/JSvkWJD9iCFcX\n TAwhSrLnC/qT/rzCIHdSUK7PKoj3ixhwwC0rE8ZabzRQyMnoCJ2MusB2MVOA5uJjS3FEEkt1\n bHZ9qti4koRpaNlQHFuNM9CGAIYC+qhlkoVSM+B8YOvH+ymkM6RF8OgJKr+OfziPcPQWEPfs\n TNZ7goRQGbnc+NOHmAtPIF8NHqhCzBEM98pZUz+YAg3HZ0+9KMih4GYI/O5akTA2AtSfLJp8\n VVLL5Nu1uaAfB/B6kFI5MWz7RnewHpkowc6vNJoI/t0tQ8Unp1HKd2vVzbCihcVknuSz6gwx\n /RM/XoZQ/2MfwsOShxt4QI33/WG8Im1+w8bO029xPFaeays27c1WjReTMeorA6JUTDZgoMb+\n EL0u6D0Zkew96rJ+a8BeG/ea+GdOv6+/vICN8QwHqjS1r7bpubzSvxazTVS+mzUABVtYuQPV\n 6E5Svu/b2LFShW+WHItDH7PqfTCWxE+aRhSAMibc/ARaOrzIk5be0wIm3cnUueCPwwqUrIQB\n is3PUWiiBpRwBt8Mcbve8k1zit65Uf1DiBAtO1G31SSpAYgllSe/dWoMPYXzGUCTjCZ3XhSX\n fISKRVkgJQbqVAT2/tZuJz1SvPQ=","In-Reply-To":"\n <177754965576.503496.12142658280614619991@tuxedo-infinitybook.public>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"multipart/mixed; boundary=\"===============1856131018175412417==\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":3684912,"web_url":"http://patchwork.ozlabs.org/comment/3684912/","msgid":"<CAFUb7_Jmh4Y6sqGtfXwfnYNEVVsfUzP6d2oTixQ8SPo6S54pMg@mail.gmail.com>","list_archive_url":null,"date":"2026-04-30T19:28:23","subject":"NACK: [SRU][Q/N/J][PATCH 0/3] CVE-2026-31431","submitter":{"id":89057,"url":"http://patchwork.ozlabs.org/api/people/89057/","name":"Massimiliano Pellizzer","email":"massimiliano.pellizzer@canonical.com"},"content":"On Thu, 30 Apr 2026 at 14:31, Massimiliano Pellizzer\n<massimiliano.pellizzer@canonical.com> wrote:\n>\n> https://ubuntu.com/security/CVE-2026-31431\n>\n> [ Impact ]\n>\n> CVE-2026-31431 is a local privilege escalation vulnerability\n> in the Linux kernel's AF_ALG (Algorithm) socket subsystem.\n>\n> The vulnerability allows an unprivileged local user to perform a deterministic,\n> controlled 4-byte write into the kernel page cache of any file that the attacker\n> can read, including setuid-root binaries such as /usr/bin/su.\n> Because the page cache is what the kernel consults when executing a file,\n> the corrupted in-memory copy is immediately visible system-wide without the on-disk\n> checksum being altered.\n>\n> [ Fix ]\n>\n> * Questing, cherry pick the following patches from upstream:\n>   - a664bf3d603d crypto: algif_aead - Revert to operating out-of-place\n>   - 5aa58c3a572b crypto: algif_aead - snapshot IV for async AEAD requests\n>   - e02494114ebf crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption\n>   - 1f48ad3b19a9 crypto: authencesn - Fix src offset when decrypting in-place\n>   - 31d00156e50e crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl\n>\n> * Noble, cherry pick the following patches from linux-6.12.y:\n>   - 41c3aa511e6e crypto: scatterwalk - Backport memcpy_sglist()\n>   - 183137264401 crypto: algif_aead - use memcpy_sglist() instead of null skcipher\n>   - 8b88d99341f1 crypto: algif_aead - Revert to operating out-of-place\n>   - 46fdb39e8322 crypto: algif_aead - snapshot IV for async AEAD requests\n>   - 7bc058a9b82b crypto: authenc - use memcpy_sglist() instead of null skcipher\n>   - 89fe118b6470 crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption\n>   - 129f12934401 crypto: authencesn - Fix src offset when decrypting in-place\n>   - c8369a6d62f5 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl\n>\n> * Jammy, cherry pick the following patches from linux-5.15.y:\n>   - 36435a56cd6b crypto: scatterwalk - Backport memcpy_sglist()\n>   - 17774d99bb43 crypto: algif_aead - use memcpy_sglist() instead of null skcipher\n>   - 19d43105a97b crypto: algif_aead - Revert to operating out-of-place\n>   - a920cabdb0b7 crypto: algif_aead - snapshot IV for async AEAD requests\n>   - e416c41a96c8 crypto: authenc - use memcpy_sglist() instead of null skcipher\n>   - d589abd8b019 crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption\n>   - 723bb1b4a6dd crypto: authencesn - Fix src offset when decrypting in-place\n>   - 2b781d1d4f93 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl\n>   - fd427dd84f22 crypto: algif_aead - Fix minimum RX size check for decryption\n>\n> [ Test Plan ]\n>\n> Compiled and boot tested.\n> Tested using the publicly available exploit.\n> Tested using LTP crypto testsuite for regressions.\n>\n> [ Where Problems Could Occur ]\n>\n> The fix reverts the 2017 in-place optimization entirely, restoring out-of-place\n> operation in algif_aead. A bug in the new out-of-place TX SGL allocation\n> or AAD copy path could produce corrupt ciphertext, failed tag verification,\n> or memory mismanagement under edge-case input lengths, affecting every consumer\n> of the AF_ALG AEAD interface kernel-wide.\n>\n\nNACK, v2 coming","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=UDvHnqhh;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g643W1MPWz1yHv\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 05:28:54 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wIX3z-0001Ny-JA; Thu, 30 Apr 2026 19:28:43 +0000","from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <massimiliano.pellizzer@canonical.com>)\n id 1wIX3y-0001Nn-7X\n for kernel-team@lists.ubuntu.com; Thu, 30 Apr 2026 19:28:42 +0000","from mail-yw1-f197.google.com (mail-yw1-f197.google.com\n [209.85.128.197])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 0C2783FE9F\n for <kernel-team@lists.ubuntu.com>; Thu, 30 Apr 2026 19:28:42 +0000 (UTC)","by mail-yw1-f197.google.com with SMTP id\n 00721157ae682-7986c067508so28161847b3.2\n for <kernel-team@lists.ubuntu.com>; Thu, 30 Apr 2026 12:28:42 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1777577322;\n bh=2kcIUj7iZEexLvbJhH5cPXWng5G3NgRgeUQt4uf1zdc=;\n h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n To:Content-Type;\n b=UDvHnqhhtkWW9Wd233HGRMgcGuMoD6fIq5qjoGeajEkbXyegoko7Ze/cUDKkoLi4X\n s16Z90ab/ANI4L7VTPDWSE/7RHXKifvOZDSok2TbzCdM7afPJbFKgE+g/TnNTOWj1a\n Fhu3bdUkYS2VMTocOk3mgTqZrjG4wppvXEZPL7Sv6TzA9ZwYMe4qixeEbreu+Ose55\n KtyTlskTXGs5MbSjLBJW1lN4Fd0P27YrU9J8js4xvvodA/8f49YmVKFV57kJ8c1dt2\n +kyW3rWhNWPKqXZGpHpaJT49ihcmvkdxWHzuoCqccoQ9Xv6BRnJAEPGVDBAQCQFyFx\n 97vKQtjgg3eq/U/fFeji9BFaO0JX1Kzluzu07fwt3+gb3jO4VTONZLzso7kBcWzAtf\n 4p6B6eAyk5AHaWgmIPdzKE+kEvfnnnUfrzKZI6r1LNlRk4EaL/5sll4KdFQDEqIuK4\n vcyzKptpwndopWGG8xh7DLfsbMo0uE2ccw6bNJtd51UNrV6NP+K/mLhqot4CcDNsCi\n gHgdouhb5/C9DWzpFkrLHl3AgZuFGv+j0LxlrYf6kAA+Wn9LPwMtUKybTx5K8Z8XRA\n cWOnJbNUMhygN48LyhM/EZp3oVmA8osXDiEhX+HqN1eWuqhosHfBsEcdMBYakZHVjM\n rgRKpFV7h7gTJu0gitxfnzIM=","ARC-Seal":"i=1; a=rsa-sha256; t=1777577321; cv=none;\n d=google.com; s=arc-20240605;\n b=FpK59dyyE9I1VATX9UmfMjnifcKngVtbIArharUns+aTNoD9gB/QMJFEocpvlAdgPQ\n 6Xp1vU2OiZFeqcJAq+LAYlw8qMSn70eA+5avhzQWbvJmwzkDmewoGHOyJbjjYIc3A1Ae\n Bknr5wlbIavbJ/CwKwJ43pNKQBxAKO4TK9PA7MAs1vLWzSmJJABkaj9BX6vyI5YAge0Z\n w7N7O+aZgJkE8i8BLXDapxNlKyr6nbs8ooD+n9jKUc+bIVEiqtiist167VHuGlduiPMR\n fzKPmdL2nY96M63svPhnLHPLdU6wpXf5oDEIrlWACv9q4c8wtO27lsRYNhHY+RrAoxkK\n J05g==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=to:subject:message-id:date:from:in-reply-to:references:mime-version;\n bh=2kcIUj7iZEexLvbJhH5cPXWng5G3NgRgeUQt4uf1zdc=;\n fh=+omZd+Si5sAm2/4YiqjqxCkMtIumFPFe1EIby1yU6Jg=;\n b=hpsk+x511VsB0OEQ8137Y6WwJu0KWzfs0TSBOH2KwWTxr9hGSsds0bPVWW9f1rNJ/+\n rfNdcLg3TKMRJYXTM9orXVh4JHNc2pUJt7ccIfqrvEJCip84QUa3znx8RdEi3dgt+6v3\n aasZBz6JNEohGuttsaCSzGLa4d/k2qwtV+CSQ+yuRkGvvyCzZyws4HW8Oz2cjMUjNjI7\n jaAuodEWIPoyJFx3kNzZA+CL7OkUV9aYdBl+2hBgg1B7v40vTXzz7pKwoI2RPpn5tIA+\n q5vQ7T3+4303NfX6WH5Oyv8uOx2dChGV0x5qyzT2b3L+0JDkeTZ5rxkmd1FFVBeZMTrJ\n ytfQ==; darn=lists.ubuntu.com","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1777577321; x=1778182121;\n h=to:subject:message-id:date:from:in-reply-to:references:mime-version\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=2kcIUj7iZEexLvbJhH5cPXWng5G3NgRgeUQt4uf1zdc=;\n b=EBlEVcFeJtDAIUKnajwHwYumDutj7iqnyvp4TXClxMhEQal7rT6zX+W+ueutXuaahE\n BJo4lCvx6DP5X+TAsGHasOY4TRhwbFYN22G+Bwp9Tbq7sQ5aaqz/A/6ytD7SXB00/bRW\n XvodQ0fSSd7sDrXFt7cFhircZwcfGFDrn2hIoI7igqLms3goyaQIvbMqHPXBE/iSVQ4i\n 1xEzi3ABwTqRLB4jzXYRumRHUpgYg99rD7Y3nb5G8TVOSLHZVVlGDToblfiOTiU0srD+\n Hi08tklman9NJVT5LgAPn8dNITYrhQoH4TW+kgZ3Rx3UO5jRIxWjsWzKaLBRNK5sbpU6\n d0ww==","X-Gm-Message-State":"AOJu0YzXLODv9N6YM5cx955wpNRAyCOE0/imA+HZSxgVbMr3Xryg0faV\n jv7r8Ve/wm34/oKmbGEC7vqmWs6ArOLqG4uOmvTBU+lHwOROldzdxuMn9uLmkjUbfY6OyvSkopO\n T8/fPNAxS7c7mWcBD4pL/Zn1plLRE9WnKL1cjG4G3xoOOqvB9RW8omxi1HMx0M/TRfxNi7lIk6A\n p8T0O7gZaRPKuZffa0tx9F3sP+S28rlLQiCOK2AOsv989zsWoZ3hm399mK/J+GZRkf","X-Gm-Gg":"AeBDietv4a0dn3/OPZATp2J0zIvTV6OL4fTnaUqOkTgB9lMZgHH5iaxKaOo2Snrrvm/\n 9tIe3iuGIg8rnLWIlHuPvKv1Xe+Vh9D0XFdOvRa1QvnUCy/jH5J396YRPFjqtKJTKCq56znpuWD\n jgX33jNzjF5z0cwBe3PUuXf7prsPw25W5+H8yx6/IsYfGJNn9bPV5hqz4dab1pFt6dG7eBKmgL3\n LmB/7O1FKe/gMBsecZly9Fdrb7JQcqejSv0BIm/m1o+3/kTq767Yk4dgufKW7DrgRq9a3XguDc=","X-Received":["by 2002:a53:df49:0:b0:658:f1c8:eab5 with SMTP id\n 956f58d0204a3-65c18aed580mr2558194d50.5.1777577320797;\n Thu, 30 Apr 2026 12:28:40 -0700 (PDT)","by 2002:a53:df49:0:b0:658:f1c8:eab5 with SMTP id\n 956f58d0204a3-65c18aed580mr2558173d50.5.1777577320304; Thu, 30 Apr 2026\n 12:28:40 -0700 (PDT)"],"MIME-Version":"1.0","References":"\n <177754965576.503496.12142658280614619991@tuxedo-infinitybook.public>","In-Reply-To":"\n <177754965576.503496.12142658280614619991@tuxedo-infinitybook.public>","From":"Massimiliano Pellizzer <massimiliano.pellizzer@canonical.com>","Date":"Thu, 30 Apr 2026 21:28:23 +0200","X-Gm-Features":"AVHnY4Iu5K23qharuSlz5s-9uxA0CGzEagl8lsqjMSY1kp7rHP-Yop7k0q_FuKc","Message-ID":"\n <CAFUb7_Jmh4Y6sqGtfXwfnYNEVVsfUzP6d2oTixQ8SPo6S54pMg@mail.gmail.com>","Subject":"NACK: [SRU][Q/N/J][PATCH 0/3] CVE-2026-31431","To":"Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}}]