lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 Jan 2019 14:31:56 +0800 From: Herbert Xu <herbert@...dor.apana.org.au> To: YueHaibing <yuehaibing@...wei.com> Cc: harsh@...lsio.com, davem@...emloft.net, linux-kernel@...r.kernel.org, linux-crypto@...r.kernel.org Subject: Re: [PATCH -next] crypto: chelsio - check set_msg_len overflow in generate_b0 On Fri, Dec 28, 2018 at 02:41:00PM +0800, YueHaibing wrote: > set_msg_len may fails with -EOVERFLOW, It should be propagate > to upstream. > > Fixes: 2debd3325e55 ("crypto: chcr - Add AEAD algos.") > Signed-off-by: YueHaibing <yuehaibing@...wei.com> > --- > drivers/crypto/chelsio/chcr_algo.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) Patch applied. Thanks. -- Email: Herbert Xu <herbert@...dor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
Powered by blists - more mailing lists