Am Samstag, 30. Januar 2016, 17:38:28 schrieb Dan Carpenter: Hi Dan, > We're clearing the wrong memory. The memory corruption is likely > harmless because we weren't going to use that stack memory again but not > zeroing is a potential information leak. > > Fixes: e28facde3c39 ('crypto: keywrap - add key wrapping block chaining > mode') Signed-off-by: Dan Carpenter <dan.carpenter@xxxxxxxxxx> Acked-by: Stephan Mueller <smueller@xxxxxxxxxx> Thanks Stephan -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html