APPLIED: [PATCH 0/1][Bionic] s390/crypto: Fix return code checking in cbc_paes_crypt()
Stefan Bader
stefan.bader at canonical.com
Mon Oct 1 14:54:50 UTC 2018
On 26.09.2018 16:37, Seth Forshee wrote:
> BugLink: http://bugs.launchpad.net/bugs/1794294
>
> SRU Justification
>
> Impact: An incorrect return value check can result in a protected key not
> being re-transformed when it became invalid.
>
> Fix: Upstream commit b81126e01a8c6048249955feea46c8217ebefa91.
>
> Regression Potential: This is a trivial patch to an architecture-specific
> driver, so there is minimal potential for regression. The patch is also
> marked for upstream stable.
>
> ---
>
> Ingo Franzki (1):
> s390/crypto: Fix return code checking in cbc_paes_crypt()
>
> arch/s390/crypto/paes_s390.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
>
Applied to bionic/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20181001/73d8af95/attachment.sig>
More information about the kernel-team
mailing list