On Wed, Nov 29, 2017 at 01:24:38AM -0800, Eric Biggers wrote: > > The bug is that the skcipher_walk API doesn't set the IV for zero-length inputs, > while some algorithms (e.g. ChaCha20) access the IV even if the input is > zero-length. So it was dereferencing a pointer which came from uninitialized > stack memory. I've sent out a fix: > > "crypto: skcipher - set walk.iv for zero-length inputs" > #syz fix: crypto: skcipher - set walk.iv for zero-length inputs