Received: by 10.213.65.68 with SMTP id h4csp2648770imn; Mon, 9 Apr 2018 06:58:45 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/otYs3uOzpuVFL98mfk09Fl2cFh1RH4LFHYAOBlcAwe9gfubbEQY8BHOnaFHNXdLlIPm+D X-Received: by 10.98.198.7 with SMTP id m7mr25947947pfg.66.1523282325303; Mon, 09 Apr 2018 06:58:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523282325; cv=none; d=google.com; s=arc-20160816; b=dwm1WSl2LaRvYgk+0DcSwdSr1a/yBRA2m3GufE/1UDzcZJgZrIfhJZsQqndWT3pi2g CVsJTb7tI1jA3KePbbKYhUx03ARl8AGpu1auly29EydpNg8j1sc64mo/rtzBDusDNSD1 rn8AylxMST4qyYl/B7W7D0QnOcSSENrKHZjm+14a4VerlmP41ll3xwfDsWD57w6LN+UV h+IjbGb7oETrbm1mjZLgGfcg1HT86ojA8OiVU/cQUFDrS1l6wOqMoeY1fTGI/Exo/s9R 9OeOiGjnISF1xZTGY+xpw1fc3vbyKoC6YJSBEsiODDPyDMatGf8M/Vv7vJDwWijPD9o/ tPmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=bvfZVgukrG4Uz/3K/kgiuiCeoBiYKZFn3z8Tr50BqHA=; b=MtPNl2+IW0VyjhFt+H8CzEiEadUiFzH9E+PIcS/z/4mGetAbGmXBjRT6lzLFl4oNQC KpsrbTAuHhb6wjNDczeOcnithd91Dbq80GgxoVWpOTCAvCAk4gfrfdsv4nHpbQhVa10N 3PvfjZRCxV8QWmAiRm1s+X5fAnA69Y+wFx9gHt9tTIv4DY+TotV4B0UmJ/SxMHqW5Slt d/ij3wFiL9uF1BR2EYxS368ZjRogwycG3HarEzSxSiUu7A+WmohrjG798NpNzNN0m+s8 sKo2y3JFcXztgPg647751QvpuNMpN9JVaeNrvH77pUr2QQqREyjjwzwTiXV8PWMEksrY 2pag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=aCA0tdrK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e4si286297pga.1.2018.04.09.06.58.08; Mon, 09 Apr 2018 06:58:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=aCA0tdrK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752470AbeDINy1 (ORCPT + 99 others); Mon, 9 Apr 2018 09:54:27 -0400 Received: from mail-wm0-f67.google.com ([74.125.82.67]:37011 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752314AbeDINyV (ORCPT ); Mon, 9 Apr 2018 09:54:21 -0400 Received: by mail-wm0-f67.google.com with SMTP id r131so16948323wmb.2; Mon, 09 Apr 2018 06:54:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=bvfZVgukrG4Uz/3K/kgiuiCeoBiYKZFn3z8Tr50BqHA=; b=aCA0tdrK7gKKHGaOm7k9v+Op4jZ//ONvLpAucd8QDKaj5g6Kt0RajmMNlIVR9A2yxy a6Sr8cPwUkMUTONXtKpCBm56V6MzHNHstIbvoWS8FWmd+yuVdiDn6LqNIJISV4WYRiUh 6d/rSBDWA/VMcs64gPkDF3LZeMbsxuxToR5eQ6ycoipwEnBJ4PvFaUtYtiBwvrao8k0R uIGKHPi9FbyBJBZAWTDLOCOAknQSGSnnoifS4Qq/fCjqh3ub8bdCebeZbtfy4cW1SNJA vk4YVNOyLnxTpXS9zmRVaK86XpHPmKG5xalf9MQ58jja39dLJcHTOG83mb8vc2oWYHKU oQxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=bvfZVgukrG4Uz/3K/kgiuiCeoBiYKZFn3z8Tr50BqHA=; b=JTSz6TVLrKenj4/qNuVMrvbXga3RVgalp3WtisHPmDyjR+dBLvaGj6z7QPpmddUSqW FQB+AJRFbN8tJs78AgTrONmWbc793dTQtw5pd6LDVxOjDU2kJobZ0yOZJBH+Q4QJcbXw 8k+S29qjKAk8rA0b3smfxJbKcDKwzOh0xUQ6629eGdjAUM6xJ5h86INyV4jxaxiSxE9W eQQgT65oj0MfABgrhjBCelXCjS0mE/H08F9t9pmNIa1QT3Z7dAs/00lD/jRRLlQPoOiO RU+emubdzZHxR4C8A9sevQ9zf96J5eSyWt7y1JiI4L+75YIlMtI9lsKL3hj+axfWFjCv Ew9g== X-Gm-Message-State: ALQs6tDzNckzYyziBFg5pnmFvUZ7K9FPtGqVejuz/YW1fl9hxz8RKn72 GKITMI4IknOOQRbpKieJHrKFJl945M5MUQ== X-Received: by 10.28.18.199 with SMTP id 190mr84178wms.50.1523282060403; Mon, 09 Apr 2018 06:54:20 -0700 (PDT) Received: from localhost ([37.177.115.186]) by smtp.gmail.com with ESMTPSA id e131sm11608725wmg.1.2018.04.09.06.54.19 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 09 Apr 2018 06:54:20 -0700 (PDT) From: Salvatore Mesoraca To: linux-kernel@vger.kernel.org Cc: kernel-hardening@lists.openwall.com, linux-crypto@vger.kernel.org, "David S. Miller" , Herbert Xu , Kees Cook , Salvatore Mesoraca , Eric Biggers , Laura Abbott Subject: [PATCH 5/6] crypto: cts - avoid VLA use Date: Mon, 9 Apr 2018 15:54:03 +0200 Message-Id: <1523282044-22075-6-git-send-email-s.mesoraca16@gmail.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1523282044-22075-1-git-send-email-s.mesoraca16@gmail.com> References: <1523282044-22075-1-git-send-email-s.mesoraca16@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We avoid 2 VLAs[1] by always allocating MAX_BLOCKSIZE*2 bytes. We also check the selected cipher at instance creation time, if it doesn't comply with these limits, the creation will fail. [1] http://lkml.kernel.org/r/CA+55aFzCG-zNmZwX4A2FQpadafLfEzK6CC=qPXydAacU1RqZWA@mail.gmail.com Signed-off-by: Salvatore Mesoraca --- crypto/cts.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/crypto/cts.c b/crypto/cts.c index 4773c18..12e6bd3 100644 --- a/crypto/cts.c +++ b/crypto/cts.c @@ -50,6 +50,7 @@ #include #include #include +#include "internal.h" struct crypto_cts_ctx { struct crypto_skcipher *child; @@ -104,7 +105,7 @@ static int cts_cbc_encrypt(struct skcipher_request *req) struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); struct skcipher_request *subreq = &rctx->subreq; int bsize = crypto_skcipher_blocksize(tfm); - u8 d[bsize * 2] __aligned(__alignof__(u32)); + u8 d[MAX_BLOCKSIZE * 2] __aligned(__alignof__(u32)); struct scatterlist *sg; unsigned int offset; int lastn; @@ -183,7 +184,7 @@ static int cts_cbc_decrypt(struct skcipher_request *req) struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); struct skcipher_request *subreq = &rctx->subreq; int bsize = crypto_skcipher_blocksize(tfm); - u8 d[bsize * 2] __aligned(__alignof__(u32)); + u8 d[MAX_BLOCKSIZE * 2] __aligned(__alignof__(u32)); struct scatterlist *sg; unsigned int offset; u8 *space; @@ -359,6 +360,9 @@ static int crypto_cts_create(struct crypto_template *tmpl, struct rtattr **tb) if (crypto_skcipher_alg_ivsize(alg) != alg->base.cra_blocksize) goto err_drop_spawn; + if (alg->base.cra_blocksize > MAX_BLOCKSIZE) + goto err_drop_spawn; + if (strncmp(alg->base.cra_name, "cbc(", 4)) goto err_drop_spawn; -- 1.9.1