On Wed, Aug 02, 2017 at 01:49:09PM -0700, Megha Dey wrote:
> It was reported that the sha1 AVX2 function(sha1_transform_avx2) is
> reading ahead beyond its intended data, and causing a crash if the next
> block is beyond page boundary:
> http://marc.info/?l=linux-crypto-vger&m=149373371023377
> This patch makes sure that there is no overflow for any buffer length.
> It passes the tests written by Jan Stancek that revealed this problem:
> https://github.com/jstancek/sha1-avx2-crash
> I have re-enabled sha1-avx2 by reverting commit
> b82ce24426a4071da9529d726057e4e642948667
> Originally-by: Ilya Albrekht <ilya.albre...@intel.com>
> Tested-by: Jan Stancek <jstan...@redhat.com>
> Signed-off-by: Megha Dey <megha....@linux.intel.com>
> Reported-by: Jan Stancek <jstan...@redhat.com>

Patch applied.  Thanks.
Email: Herbert Xu <herb...@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

Reply via email to