On Mon, 12 Dec 2016, David Howells wrote: > From: Pan Bian <bianpan2...@163.com> > > In function public_key_verify_signature(), returns variable ret on > error paths. When the call to kmalloc() fails, the value of ret is 0, > and it is not set to an errno before returning. This patch fixes the > bug. > > Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=188891 > > Signed-off-by: Pan Bian <bianpan2...@163.com> > Signed-off-by: David Howells <dhowe...@redhat.com> > ---
These crypto patches should probably go via Herbert's tree. > > crypto/asymmetric_keys/public_key.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/crypto/asymmetric_keys/public_key.c > b/crypto/asymmetric_keys/public_key.c > index fd76b5fc3b3a..d3a989e718f5 100644 > --- a/crypto/asymmetric_keys/public_key.c > +++ b/crypto/asymmetric_keys/public_key.c > @@ -121,6 +121,7 @@ int public_key_verify_signature(const struct public_key > *pkey, > if (ret) > goto error_free_req; > > + ret = -ENOMEM; > outlen = crypto_akcipher_maxsize(tfm); > output = kmalloc(outlen, GFP_KERNEL); > if (!output) > -- James Morris <jmor...@namei.org>