Skip to content

Conversation

General-MP
Copy link

Use a wider type for buf_len and add bounds checks so the computed count cannot overflow. This addresses Coverity finding in ataes132a_aes_ecb_block (CWE-190).

Fixes: #84717
CID: 487700
Signed-off-by: MP [email protected]

Use a wider type for buf_len and add bounds checks so the computed
count cannot overflow. This addresses Coverity finding in
ataes132a_aes_ecb_block (CWE-190).

Fixes: zephyrproject-rtos#84717
CID: 487700
Signed-off-by: MP <[email protected]>
Copy link

Hello @General-MP, and thank you very much for your first pull request to the Zephyr project!
Our Continuous Integration pipeline will execute a series of checks on your Pull Request commit messages and code, and you are expected to address any failures by updating the PR. Please take a look at our commit message guidelines to find out how to format your commit messages, and at our contribution workflow to understand how to update your Pull Request. If you haven't already, please make sure to review the project's Contributor Expectations and update (by amending and force-pushing the commits) your pull request if necessary.
If you are stuck or need help please join us on Discord and ask your question there. Additionally, you can escalate the review when applicable. 😊

Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Coverity CID: 487700] Overflowed integer argument in drivers/crypto/crypto_ataes132a.c

3 participants