Re: [PATCH v2] crypto: AF_ALG - fix AEAD AIO handling of zero buffer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am Donnerstag, 1. Dezember 2016, 21:22:07 CET schrieb Herbert Xu:

Hi Herbert,

> On Thu, Dec 01, 2016 at 08:22:37AM +0100, Stephan Mueller wrote:
> > Hi Herbert,
> > 
> > I split out the bug fix patch from the AD/tag formatting patch as they
> > most likely will come after the next merge window.
> > 
> > ---8<---
> > 
> > Handle the case when the caller provided a zero buffer to
> > sendmsg/sendpage. Such scenario is legal for AEAD ciphers when no
> > plaintext / ciphertext and no AAD is provided and the caller only
> > requests the generation of the tag value.
> > 
> > Signed-off-by: Stephan Mueller <smueller@xxxxxxxxxx>
> 
> Patch applied.  Thanks.

May I suggest to forward that patch to stable as this patch fixes a kernel 
crasher that can be triggered by an unprivileged user?

The bug was introduced in 4.7 with the AEAD AIO addition.

Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux