[PATCH 0/2] crypto user API fixes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This series fixes kernel memory disclosures (aka info leaks) and a bug
in the empty string test.

The crypto user API is protected by CAP_NET_ADMIN so one needs some
level of privilege already to exploit the leaks. It still might be
material for stable, though. Your choice.

Please apply!


Mathias Krause (2):
  crypto: user - fix info leaks in report API
  crypto: user - fix empty string test in report API

 crypto/ablkcipher.c  |   12 ++++++------
 crypto/aead.c        |    9 ++++-----
 crypto/ahash.c       |    2 +-
 crypto/blkcipher.c   |    6 +++---
 crypto/crypto_user.c |   24 ++++++++++++------------
 crypto/pcompress.c   |    3 +--
 crypto/rng.c         |    2 +-
 crypto/shash.c       |    3 ++-
 8 files changed, 30 insertions(+), 31 deletions(-)

-- 
1.7.10.4

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux