diff --git a/CVE-2019-19057.patch b/CVE-2019-19057.patch deleted file mode 100644 index fbc3ee2ea6a19..0000000000000 --- a/CVE-2019-19057.patch +++ /dev/null @@ -1,37 +0,0 @@ -From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 -From: Navid Emamdoost -Date: Fri, 4 Oct 2019 15:16:48 -0500 -Subject: [PATCH] mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring - -In mwifiex_pcie_init_evt_ring, a new skb is allocated which should be -released if mwifiex_map_pci_memory() fails. The release for skb and -card->evtbd_ring_vbase is added. - -Fixes: 0732484b47b5 ("mwifiex: separate ring initialization and ring creation routines") -Signed-off-by: Navid Emamdoost -Acked-by: Ganapathi Bhat -Signed-off-by: Kalle Valo ---- - drivers/net/wireless/marvell/mwifiex/pcie.c | 5 ++++- - 1 file changed, 4 insertions(+), 1 deletion(-) - -diff --git a/drivers/net/wireless/marvell/mwifiex/pcie.c b/drivers/net/wireless/marvell/mwifiex/pcie.c -index 1578eaa071bd..fc1706d0647d 100644 ---- a/drivers/net/wireless/marvell/mwifiex/pcie.c -+++ b/drivers/net/wireless/marvell/mwifiex/pcie.c -@@ -687,8 +687,11 @@ static int mwifiex_pcie_init_evt_ring(struct mwifiex_adapter *adapter) - skb_put(skb, MAX_EVENT_SIZE); - - if (mwifiex_map_pci_memory(adapter, skb, MAX_EVENT_SIZE, -- PCI_DMA_FROMDEVICE)) -+ PCI_DMA_FROMDEVICE)) { -+ kfree_skb(skb); -+ kfree(card->evtbd_ring_vbase); - return -1; -+ } - - buf_pa = MWIFIEX_SKB_DMA_ADDR(skb); - --- -https://clearlinux.org - diff --git a/CVE-2019-19063.patch b/CVE-2019-19063.patch deleted file mode 100644 index 004f16a434dfb..0000000000000 --- a/CVE-2019-19063.patch +++ /dev/null @@ -1,42 +0,0 @@ -From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 -From: Navid Emamdoost -Date: Tue, 24 Sep 2019 20:20:21 -0500 -Subject: [PATCH] rtlwifi: prevent memory leak in rtl_usb_probe - -In rtl_usb_probe if allocation for usb_data fails the allocated hw -should be released. In addition the allocated rtlpriv->usb_data should -be released on error handling path. - -Signed-off-by: Navid Emamdoost -Signed-off-by: Kalle Valo ---- - drivers/net/wireless/realtek/rtlwifi/usb.c | 5 ++++- - 1 file changed, 4 insertions(+), 1 deletion(-) - -diff --git a/drivers/net/wireless/realtek/rtlwifi/usb.c b/drivers/net/wireless/realtek/rtlwifi/usb.c -index 4b59f3b46b28..348b0072cdd6 100644 ---- a/drivers/net/wireless/realtek/rtlwifi/usb.c -+++ b/drivers/net/wireless/realtek/rtlwifi/usb.c -@@ -1021,8 +1021,10 @@ int rtl_usb_probe(struct usb_interface *intf, - rtlpriv->hw = hw; - rtlpriv->usb_data = kcalloc(RTL_USB_MAX_RX_COUNT, sizeof(u32), - GFP_KERNEL); -- if (!rtlpriv->usb_data) -+ if (!rtlpriv->usb_data) { -+ ieee80211_free_hw(hw); - return -ENOMEM; -+ } - - /* this spin lock must be initialized early */ - spin_lock_init(&rtlpriv->locks.usb_lock); -@@ -1083,6 +1085,7 @@ int rtl_usb_probe(struct usb_interface *intf, - _rtl_usb_io_handler_release(hw); - usb_put_dev(udev); - complete(&rtlpriv->firmware_loading_complete); -+ kfree(rtlpriv->usb_data); - return -ENODEV; - } - EXPORT_SYMBOL(rtl_usb_probe); --- -https://clearlinux.org - diff --git a/CVE-2019-19070.patch b/CVE-2019-19070.patch deleted file mode 100644 index 6e8c39efd23d6..0000000000000 --- a/CVE-2019-19070.patch +++ /dev/null @@ -1,37 +0,0 @@ -From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 -From: Navid Emamdoost -Date: Mon, 30 Sep 2019 15:52:40 -0500 -Subject: [PATCH] spi: gpio: prevent memory leak in spi_gpio_probe - -In spi_gpio_probe an SPI master is allocated via spi_alloc_master, but -this controller should be released if devm_add_action_or_reset fails, -otherwise memory leaks. In order to avoid leak spi_contriller_put must -be called in case of failure for devm_add_action_or_reset. - -Fixes: 8b797490b4db ("spi: gpio: Make sure spi_master_put() is called in every error path") -Signed-off-by: Navid Emamdoost -Link: https://lore.kernel.org/r/20190930205241.5483-1-navid.emamdoost@gmail.com -Signed-off-by: Mark Brown ---- - drivers/spi/spi-gpio.c | 4 +++- - 1 file changed, 3 insertions(+), 1 deletion(-) - -diff --git a/drivers/spi/spi-gpio.c b/drivers/spi/spi-gpio.c -index 1d3e23ec20a6..f9c5bbb74714 100644 ---- a/drivers/spi/spi-gpio.c -+++ b/drivers/spi/spi-gpio.c -@@ -371,8 +371,10 @@ static int spi_gpio_probe(struct platform_device *pdev) - return -ENOMEM; - - status = devm_add_action_or_reset(&pdev->dev, spi_gpio_put, master); -- if (status) -+ if (status) { -+ spi_master_put(master); - return status; -+ } - - if (of_id) - status = spi_gpio_probe_dt(pdev, master); --- -https://clearlinux.org -