All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
@ 2017-11-27  7:16 ` Eric Biggers
  0 siblings, 0 replies; 10+ messages in thread
From: Eric Biggers @ 2017-11-27  7:16 UTC (permalink / raw)
  To: keyrings, David Howells
  Cc: linux-crypto, Alexander Potapenko, Eric Biggers, stable, Tudor Ambarus

From: Eric Biggers <ebiggers@google.com>

In rsa_get_n(), if the buffer contained all 0's and "FIPS mode" is
enabled, we would read one byte past the end of the buffer while
scanning the leading zeroes.  Fix it by checking 'n_sz' before '!*ptr'.

This bug was reachable by adding a specially crafted key of type
"asymmetric" (requires CONFIG_RSA and CONFIG_X509_CERTIFICATE_PARSER).

KASAN report:

    BUG: KASAN: slab-out-of-bounds in rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
    Read of size 1 at addr ffff88003501a708 by task keyctl/196

    CPU: 1 PID: 196 Comm: keyctl Not tainted 4.14.0-09238-g1d3b78bbc6e9 #26
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-20171110_100015-anatol 04/01/2014
    Call Trace:
     rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
     asn1_ber_decoder+0x82a/0x1fd0 lib/asn1_decoder.c:328
     rsa_set_pub_key+0xd3/0x320 crypto/rsa.c:278
     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
     pkcs1pad_set_pub_key+0xae/0x200 crypto/rsa-pkcs1pad.c:117
     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
     public_key_verify_signature+0x270/0x9d0 crypto/asymmetric_keys/public_key.c:106
     x509_check_for_self_signed+0x2ea/0x480 crypto/asymmetric_keys/x509_public_key.c:141
     x509_cert_parse+0x46a/0x620 crypto/asymmetric_keys/x509_cert_parser.c:129
     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
     SYSC_add_key security/keys/keyctl.c:122 [inline]
     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
     entry_SYSCALL_64_fastpath+0x1f/0x96

    Allocated by task 196:
     __do_kmalloc mm/slab.c:3711 [inline]
     __kmalloc_track_caller+0x118/0x2e0 mm/slab.c:3726
     kmemdup+0x17/0x40 mm/util.c:118
     kmemdup ./include/linux/string.h:414 [inline]
     x509_cert_parse+0x2cb/0x620 crypto/asymmetric_keys/x509_cert_parser.c:106
     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
     SYSC_add_key security/keys/keyctl.c:122 [inline]
     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
     entry_SYSCALL_64_fastpath+0x1f/0x96

Fixes: 5a7de97309f5 ("crypto: rsa - return raw integers for the ASN.1 parser")
Cc: <stable@vger.kernel.org> # v4.8+
Cc: Tudor Ambarus <tudor-dan.ambarus@nxp.com>
Signed-off-by: Eric Biggers <ebiggers@google.com>
---
 crypto/rsa_helper.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/rsa_helper.c b/crypto/rsa_helper.c
index 0b66dc824606..cad395d70d78 100644
--- a/crypto/rsa_helper.c
+++ b/crypto/rsa_helper.c
@@ -30,7 +30,7 @@ int rsa_get_n(void *context, size_t hdrlen, unsigned char tag,
 		return -EINVAL;
 
 	if (fips_enabled) {
-		while (!*ptr && n_sz) {
+		while (n_sz && !*ptr) {
 			ptr++;
 			n_sz--;
 		}
-- 
2.15.0

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
@ 2017-11-27  7:16 ` Eric Biggers
  0 siblings, 0 replies; 10+ messages in thread
From: Eric Biggers @ 2017-11-27  7:16 UTC (permalink / raw)
  To: keyrings, David Howells
  Cc: linux-crypto, Alexander Potapenko, Eric Biggers, stable, Tudor Ambarus

From: Eric Biggers <ebiggers@google.com>

In rsa_get_n(), if the buffer contained all 0's and "FIPS mode" is
enabled, we would read one byte past the end of the buffer while
scanning the leading zeroes.  Fix it by checking 'n_sz' before '!*ptr'.

This bug was reachable by adding a specially crafted key of type
"asymmetric" (requires CONFIG_RSA and CONFIG_X509_CERTIFICATE_PARSER).

KASAN report:

    BUG: KASAN: slab-out-of-bounds in rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
    Read of size 1 at addr ffff88003501a708 by task keyctl/196

    CPU: 1 PID: 196 Comm: keyctl Not tainted 4.14.0-09238-g1d3b78bbc6e9 #26
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-20171110_100015-anatol 04/01/2014
    Call Trace:
     rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
     asn1_ber_decoder+0x82a/0x1fd0 lib/asn1_decoder.c:328
     rsa_set_pub_key+0xd3/0x320 crypto/rsa.c:278
     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
     pkcs1pad_set_pub_key+0xae/0x200 crypto/rsa-pkcs1pad.c:117
     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
     public_key_verify_signature+0x270/0x9d0 crypto/asymmetric_keys/public_key.c:106
     x509_check_for_self_signed+0x2ea/0x480 crypto/asymmetric_keys/x509_public_key.c:141
     x509_cert_parse+0x46a/0x620 crypto/asymmetric_keys/x509_cert_parser.c:129
     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
     SYSC_add_key security/keys/keyctl.c:122 [inline]
     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
     entry_SYSCALL_64_fastpath+0x1f/0x96

    Allocated by task 196:
     __do_kmalloc mm/slab.c:3711 [inline]
     __kmalloc_track_caller+0x118/0x2e0 mm/slab.c:3726
     kmemdup+0x17/0x40 mm/util.c:118
     kmemdup ./include/linux/string.h:414 [inline]
     x509_cert_parse+0x2cb/0x620 crypto/asymmetric_keys/x509_cert_parser.c:106
     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
     SYSC_add_key security/keys/keyctl.c:122 [inline]
     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
     entry_SYSCALL_64_fastpath+0x1f/0x96

Fixes: 5a7de97309f5 ("crypto: rsa - return raw integers for the ASN.1 parser")
Cc: <stable@vger.kernel.org> # v4.8+
Cc: Tudor Ambarus <tudor-dan.ambarus@nxp.com>
Signed-off-by: Eric Biggers <ebiggers@google.com>
---
 crypto/rsa_helper.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/rsa_helper.c b/crypto/rsa_helper.c
index 0b66dc824606..cad395d70d78 100644
--- a/crypto/rsa_helper.c
+++ b/crypto/rsa_helper.c
@@ -30,7 +30,7 @@ int rsa_get_n(void *context, size_t hdrlen, unsigned char tag,
 		return -EINVAL;
 
 	if (fips_enabled) {
-		while (!*ptr && n_sz) {
+		while (n_sz && !*ptr) {
 			ptr++;
 			n_sz--;
 		}
-- 
2.15.0


^ permalink raw reply related	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
  2017-11-27  7:16 ` Eric Biggers
@ 2017-11-27  8:22   ` James Morris
  -1 siblings, 0 replies; 10+ messages in thread
From: James Morris @ 2017-11-27  8:22 UTC (permalink / raw)
  To: Eric Biggers
  Cc: keyrings, David Howells, linux-crypto, Alexander Potapenko,
	Eric Biggers, stable, Tudor Ambarus

On Sun, 26 Nov 2017, Eric Biggers wrote:

> Fixes: 5a7de97309f5 ("crypto: rsa - return raw integers for the ASN.1 parser")
> Cc: <stable@vger.kernel.org> # v4.8+
> Cc: Tudor Ambarus <tudor-dan.ambarus@nxp.com>
> Signed-off-by: Eric Biggers <ebiggers@google.com>
> ---
>  crypto/rsa_helper.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/crypto/rsa_helper.c b/crypto/rsa_helper.c
> index 0b66dc824606..cad395d70d78 100644
> --- a/crypto/rsa_helper.c
> +++ b/crypto/rsa_helper.c
> @@ -30,7 +30,7 @@ int rsa_get_n(void *context, size_t hdrlen, unsigned char tag,
>  		return -EINVAL;
>  
>  	if (fips_enabled) {
> -		while (!*ptr && n_sz) {
> +		while (n_sz && !*ptr) {
>  			ptr++;
>  			n_sz--;
>  		}



Reviewed-by: James Morris <james.l.morris@oracle.com>

-- 
James Morris
<james.l.morris@oracle.com>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
@ 2017-11-27  8:22   ` James Morris
  0 siblings, 0 replies; 10+ messages in thread
From: James Morris @ 2017-11-27  8:22 UTC (permalink / raw)
  To: Eric Biggers
  Cc: keyrings, David Howells, linux-crypto, Alexander Potapenko,
	Eric Biggers, stable, Tudor Ambarus

On Sun, 26 Nov 2017, Eric Biggers wrote:

> Fixes: 5a7de97309f5 ("crypto: rsa - return raw integers for the ASN.1 parser")
> Cc: <stable@vger.kernel.org> # v4.8+
> Cc: Tudor Ambarus <tudor-dan.ambarus@nxp.com>
> Signed-off-by: Eric Biggers <ebiggers@google.com>
> ---
>  crypto/rsa_helper.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/crypto/rsa_helper.c b/crypto/rsa_helper.c
> index 0b66dc824606..cad395d70d78 100644
> --- a/crypto/rsa_helper.c
> +++ b/crypto/rsa_helper.c
> @@ -30,7 +30,7 @@ int rsa_get_n(void *context, size_t hdrlen, unsigned char tag,
>  		return -EINVAL;
>  
>  	if (fips_enabled) {
> -		while (!*ptr && n_sz) {
> +		while (n_sz && !*ptr) {
>  			ptr++;
>  			n_sz--;
>  		}



Reviewed-by: James Morris <james.l.morris@oracle.com>

-- 
James Morris
<james.l.morris@oracle.com>


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
  2017-11-27  7:16 ` Eric Biggers
  (?)
  (?)
@ 2017-11-28 10:54 ` David Howells
  2017-11-28 23:26     ` Herbert Xu
  -1 siblings, 1 reply; 10+ messages in thread
From: David Howells @ 2017-11-28 10:54 UTC (permalink / raw)
  To: Herbert Xu
  Cc: dhowells, keyrings, linux-crypto, Alexander Potapenko,
	Eric Biggers, stable, Tudor Ambarus

Hi Herbert,

Are you going to take this?

David

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
  2017-11-27  7:16 ` Eric Biggers
                   ` (2 preceding siblings ...)
  (?)
@ 2017-11-28 10:55 ` David Howells
  -1 siblings, 0 replies; 10+ messages in thread
From: David Howells @ 2017-11-28 10:55 UTC (permalink / raw)
  To: Eric Biggers
  Cc: dhowells, keyrings, linux-crypto, Alexander Potapenko,
	Eric Biggers, stable, Tudor Ambarus

Eric Biggers <ebiggers3@gmail.com> wrote:

> In rsa_get_n(), if the buffer contained all 0's and "FIPS mode" is
> enabled, we would read one byte past the end of the buffer while
> scanning the leading zeroes.  Fix it by checking 'n_sz' before '!*ptr'.

Reviewed-by: David Howells <dhowells@redhat.com>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
  2017-11-28 10:54 ` David Howells
@ 2017-11-28 23:26     ` Herbert Xu
  0 siblings, 0 replies; 10+ messages in thread
From: Herbert Xu @ 2017-11-28 23:26 UTC (permalink / raw)
  To: David Howells
  Cc: keyrings, linux-crypto, Alexander Potapenko, Eric Biggers,
	stable, Tudor Ambarus

On Tue, Nov 28, 2017 at 10:54:32AM +0000, David Howells wrote:
> Hi Herbert,
> 
> Are you going to take this?

Yes it's in my queue.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
@ 2017-11-28 23:26     ` Herbert Xu
  0 siblings, 0 replies; 10+ messages in thread
From: Herbert Xu @ 2017-11-28 23:26 UTC (permalink / raw)
  To: David Howells
  Cc: keyrings, linux-crypto, Alexander Potapenko, Eric Biggers,
	stable, Tudor Ambarus

On Tue, Nov 28, 2017 at 10:54:32AM +0000, David Howells wrote:
> Hi Herbert,
> 
> Are you going to take this?

Yes it's in my queue.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
  2017-11-27  7:16 ` Eric Biggers
@ 2017-11-29  5:22   ` Herbert Xu
  -1 siblings, 0 replies; 10+ messages in thread
From: Herbert Xu @ 2017-11-29  5:22 UTC (permalink / raw)
  To: Eric Biggers
  Cc: keyrings, dhowells, linux-crypto, glider, ebiggers, stable,
	tudor-dan.ambarus

Eric Biggers <ebiggers3@gmail.com> wrote:
> From: Eric Biggers <ebiggers@google.com>
> 
> In rsa_get_n(), if the buffer contained all 0's and "FIPS mode" is
> enabled, we would read one byte past the end of the buffer while
> scanning the leading zeroes.  Fix it by checking 'n_sz' before '!*ptr'.
> 
> This bug was reachable by adding a specially crafted key of type
> "asymmetric" (requires CONFIG_RSA and CONFIG_X509_CERTIFICATE_PARSER).
> 
> KASAN report:
> 
>    BUG: KASAN: slab-out-of-bounds in rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
>    Read of size 1 at addr ffff88003501a708 by task keyctl/196
> 
>    CPU: 1 PID: 196 Comm: keyctl Not tainted 4.14.0-09238-g1d3b78bbc6e9 #26
>    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-20171110_100015-anatol 04/01/2014
>    Call Trace:
>     rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
>     asn1_ber_decoder+0x82a/0x1fd0 lib/asn1_decoder.c:328
>     rsa_set_pub_key+0xd3/0x320 crypto/rsa.c:278
>     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
>     pkcs1pad_set_pub_key+0xae/0x200 crypto/rsa-pkcs1pad.c:117
>     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
>     public_key_verify_signature+0x270/0x9d0 crypto/asymmetric_keys/public_key.c:106
>     x509_check_for_self_signed+0x2ea/0x480 crypto/asymmetric_keys/x509_public_key.c:141
>     x509_cert_parse+0x46a/0x620 crypto/asymmetric_keys/x509_cert_parser.c:129
>     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
>     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
>     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
>     SYSC_add_key security/keys/keyctl.c:122 [inline]
>     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
>     entry_SYSCALL_64_fastpath+0x1f/0x96
> 
>    Allocated by task 196:
>     __do_kmalloc mm/slab.c:3711 [inline]
>     __kmalloc_track_caller+0x118/0x2e0 mm/slab.c:3726
>     kmemdup+0x17/0x40 mm/util.c:118
>     kmemdup ./include/linux/string.h:414 [inline]
>     x509_cert_parse+0x2cb/0x620 crypto/asymmetric_keys/x509_cert_parser.c:106
>     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
>     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
>     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
>     SYSC_add_key security/keys/keyctl.c:122 [inline]
>     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
>     entry_SYSCALL_64_fastpath+0x1f/0x96
> 
> Fixes: 5a7de97309f5 ("crypto: rsa - return raw integers for the ASN.1 parser")
> Cc: <stable@vger.kernel.org> # v4.8+
> Cc: Tudor Ambarus <tudor-dan.ambarus@nxp.com>
> Signed-off-by: Eric Biggers <ebiggers@google.com>

Patch applied.  Thanks.
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes
@ 2017-11-29  5:22   ` Herbert Xu
  0 siblings, 0 replies; 10+ messages in thread
From: Herbert Xu @ 2017-11-29  5:22 UTC (permalink / raw)
  To: Eric Biggers
  Cc: keyrings, dhowells, linux-crypto, glider, ebiggers, stable,
	tudor-dan.ambarus

Eric Biggers <ebiggers3@gmail.com> wrote:
> From: Eric Biggers <ebiggers@google.com>
> 
> In rsa_get_n(), if the buffer contained all 0's and "FIPS mode" is
> enabled, we would read one byte past the end of the buffer while
> scanning the leading zeroes.  Fix it by checking 'n_sz' before '!*ptr'.
> 
> This bug was reachable by adding a specially crafted key of type
> "asymmetric" (requires CONFIG_RSA and CONFIG_X509_CERTIFICATE_PARSER).
> 
> KASAN report:
> 
>    BUG: KASAN: slab-out-of-bounds in rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
>    Read of size 1 at addr ffff88003501a708 by task keyctl/196
> 
>    CPU: 1 PID: 196 Comm: keyctl Not tainted 4.14.0-09238-g1d3b78bbc6e9 #26
>    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-20171110_100015-anatol 04/01/2014
>    Call Trace:
>     rsa_get_n+0x19e/0x1d0 crypto/rsa_helper.c:33
>     asn1_ber_decoder+0x82a/0x1fd0 lib/asn1_decoder.c:328
>     rsa_set_pub_key+0xd3/0x320 crypto/rsa.c:278
>     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
>     pkcs1pad_set_pub_key+0xae/0x200 crypto/rsa-pkcs1pad.c:117
>     crypto_akcipher_set_pub_key ./include/crypto/akcipher.h:364 [inline]
>     public_key_verify_signature+0x270/0x9d0 crypto/asymmetric_keys/public_key.c:106
>     x509_check_for_self_signed+0x2ea/0x480 crypto/asymmetric_keys/x509_public_key.c:141
>     x509_cert_parse+0x46a/0x620 crypto/asymmetric_keys/x509_cert_parser.c:129
>     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
>     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
>     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
>     SYSC_add_key security/keys/keyctl.c:122 [inline]
>     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
>     entry_SYSCALL_64_fastpath+0x1f/0x96
> 
>    Allocated by task 196:
>     __do_kmalloc mm/slab.c:3711 [inline]
>     __kmalloc_track_caller+0x118/0x2e0 mm/slab.c:3726
>     kmemdup+0x17/0x40 mm/util.c:118
>     kmemdup ./include/linux/string.h:414 [inline]
>     x509_cert_parse+0x2cb/0x620 crypto/asymmetric_keys/x509_cert_parser.c:106
>     x509_key_preparse+0x61/0x750 crypto/asymmetric_keys/x509_public_key.c:174
>     asymmetric_key_preparse+0xa4/0x150 crypto/asymmetric_keys/asymmetric_type.c:388
>     key_create_or_update+0x4d4/0x10a0 security/keys/key.c:850
>     SYSC_add_key security/keys/keyctl.c:122 [inline]
>     SyS_add_key+0xe8/0x290 security/keys/keyctl.c:62
>     entry_SYSCALL_64_fastpath+0x1f/0x96
> 
> Fixes: 5a7de97309f5 ("crypto: rsa - return raw integers for the ASN.1 parser")
> Cc: <stable@vger.kernel.org> # v4.8+
> Cc: Tudor Ambarus <tudor-dan.ambarus@nxp.com>
> Signed-off-by: Eric Biggers <ebiggers@google.com>

Patch applied.  Thanks.
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2017-11-29  5:23 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-11-27  7:16 [PATCH] crypto: rsa - fix buffer overread when stripping leading zeroes Eric Biggers
2017-11-27  7:16 ` Eric Biggers
2017-11-27  8:22 ` James Morris
2017-11-27  8:22   ` James Morris
2017-11-28 10:54 ` David Howells
2017-11-28 23:26   ` Herbert Xu
2017-11-28 23:26     ` Herbert Xu
2017-11-28 10:55 ` David Howells
2017-11-29  5:22 ` Herbert Xu
2017-11-29  5:22   ` Herbert Xu

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.