APPLIED: [PATCH 0/1][Bionic] s390/crypto: Fix return code checking in cbc_paes_crypt()

Stefan Bader stefan.bader at canonical.com
Mon Oct 1 14:54:50 UTC 2018


On 26.09.2018 16:37, Seth Forshee wrote:
> BugLink: http://bugs.launchpad.net/bugs/1794294
> 
> SRU Justification
> 
> Impact: An incorrect return value check can result in a protected key not
> being re-transformed when it became invalid.
> 
> Fix: Upstream commit b81126e01a8c6048249955feea46c8217ebefa91.
> 
> Regression Potential: This is a trivial patch to an architecture-specific
> driver, so there is minimal potential for regression. The patch is also
> marked for upstream stable.
> 
> ---
> 
> Ingo Franzki (1):
>   s390/crypto: Fix return code checking in cbc_paes_crypt()
> 
>  arch/s390/crypto/paes_s390.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> 
Applied to bionic/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20181001/73d8af95/attachment.sig>


More information about the kernel-team mailing list