Bug#782561: Buffer overruns in Linux kernel RFC4106 implementation using AESNI

2015-04-20 Thread Ben Hutchings
On Tue, 2015-04-14 at 21:46 +0100, Ben Hutchings wrote: > Linux kernel commit ccfe8c3f7e52 ("crypto: aesni - fix memory usage in > GCM decryption") fixes two bugs in pointer arithmetic that lead to > buffer overruns (even with valid parameters!): > > https://git.kernel.org/linus/ccfe8c3f7e52ae8315

Bug#782561: Buffer overruns in Linux kernel RFC4106 implementation using AESNI

2015-04-17 Thread cve-assign
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > Linux kernel commit ccfe8c3f7e52 ("crypto: aesni - fix memory usage in > GCM decryption") fixes two bugs in pointer arithmetic that lead to > buffer overruns (even with valid parameters!): > > https://git.kernel.org/linus/ccfe8c3f7e52ae83155cb038753

Bug#782561: Buffer overruns in Linux kernel RFC4106 implementation using AESNI

2015-04-14 Thread Ben Hutchings
Linux kernel commit ccfe8c3f7e52 ("crypto: aesni - fix memory usage in GCM decryption") fixes two bugs in pointer arithmetic that lead to buffer overruns (even with valid parameters!): https://git.kernel.org/linus/ccfe8c3f7e52ae83155cb038753f4c75b774ca8a These are described as resulting in DoS (l