aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python
diff options
context:
space:
mode:
authorJunaid Shahid <[email protected]>2017-12-20 17:08:38 -0800
committerHerbert Xu <[email protected]>2017-12-28 17:56:51 +1100
commit1ecdd37e308ca149dc378cce225068cbac54e3a6 (patch)
treeaa6a2ab409ff3add306f6144ca5e7a415b3ed56f /tools/perf/scripts/python
parentb20209c91e23a9bbad9cac2f80bc16b3c259e10e (diff)
crypto: aesni - Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni
The aesni_gcm_enc/dec functions can access memory after the end of the AAD buffer if the AAD length is not a multiple of 4 bytes. It didn't matter with rfc4106-gcm-aesni as in that case the AAD was always followed by the 8 byte IV, but that is no longer the case with generic-gcm-aesni. This can potentially result in accessing a page that is not mapped and thus causing the machine to crash. This patch fixes that by reading the last <16 byte block of the AAD byte-by-byte and optionally via an 8-byte load if the block was at least 8 bytes. Fixes: 0487ccac ("crypto: aesni - make non-AVX AES-GCM work with any aadlen") Cc: <[email protected]> Signed-off-by: Junaid Shahid <[email protected]> Signed-off-by: Herbert Xu <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions