Received: by 10.192.165.156 with SMTP id m28csp237583imm; Tue, 10 Apr 2018 20:39:14 -0700 (PDT) X-Google-Smtp-Source: AIpwx48a0Z0KI8JUWyEup00isbd4uA6vEPSNQqisP6cgvA2q25bt15vzoMukI5N+wSCKRYa35Nw9 X-Received: by 10.98.80.145 with SMTP id g17mr2537467pfj.71.1523417954932; Tue, 10 Apr 2018 20:39:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523417954; cv=none; d=google.com; s=arc-20160816; b=N2IbUoMbyVeoRDVTf3butvRi0YcwV9VU+glbnOq1CtQxUH1zBN7abOnzDwBdfSTRAI pYtFsYWzccp4q+Ga5j2xwQX9sZIKNjJ7KT/CbvuSK+08aaPhsRPf/p4gPlt1U5JmbOZC LRm2E802c0HSCmWNSIH8Ej8vYbJ+dCk/ZP0dfMZ6eNmUxhqBx2QpbM71DxMVEPddULmY SV64Vi0KThuuIgy8d08mdTd+RzfaC5eyC/dhPn7nxTmnfYfnK5GLK/7ZHDmCgzsRJ0zL Eaa7yRgpX2INwN7ZHom8EaQNrgKF7+UE0I5BDE71fYktabhcRVIGAh3HhSCKZE4SS9a5 S/xQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=S8q7Cw432T4wIKnDUU745pvfkTHDtoJ2RPgrWkfCNvI=; b=snbKvbzowZY8n86bv3KpXkpZ5T8rwiSi+SnZ6VvvsAnSyELgUibEkcnT6OFRdwdFdQ tdGrthMkvpsykKEGgXmRhZOpLte0YmyPHKuGk3S2iEEXvJEIKrcdtTQMwn8vMWCtfFL7 zXFA313gnO8MDUa+Pgy3ORin4Kpuz7s26DbMCb4egHM6Ya3lQsMKyZJTzjqJv+61i0Vk izgG+GxLmF9tugV7l9iK1VMUaFezcLYchDbHXgRRCt9M59YeUFg2aULXruGWpSkyyGvD 8/ODPyImmo7QwXNm4cTusWtVkFxSFbJujCO2p6m0lupWZAhg5kXTaOWod2SqtwNg0KJU Sq/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=N/xwaP3k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p17si154165pgv.105.2018.04.10.20.38.38; Tue, 10 Apr 2018 20:39:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=N/xwaP3k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752775AbeDKAwj (ORCPT + 99 others); Tue, 10 Apr 2018 20:52:39 -0400 Received: from mail-pl0-f67.google.com ([209.85.160.67]:39064 "EHLO mail-pl0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752245AbeDKAwh (ORCPT ); Tue, 10 Apr 2018 20:52:37 -0400 Received: by mail-pl0-f67.google.com with SMTP id e7-v6so106363plt.6 for ; Tue, 10 Apr 2018 17:52:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=S8q7Cw432T4wIKnDUU745pvfkTHDtoJ2RPgrWkfCNvI=; b=N/xwaP3kCVSGzMEHN1QzqvqXSrcAvlL6JzR9oCRozJw0QFylmXpPpqM2eqcnz6+aPY o8uh2grEZioMkjg1aog95/HnHfmcJ/RyHj1a1UqjgY4BotjmTQ8ZoWXvbNZ/CsZjjVq+ XASa/ef+o6R7sy8QperjXjrpLrqqI6p4aAddI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=S8q7Cw432T4wIKnDUU745pvfkTHDtoJ2RPgrWkfCNvI=; b=Rq0A/1yIb+Wk43v0CAiSaCmTDKmmUfkaCf1y3RIvrxMfupd3m+tsMkZ1xbMOHgHhOV rDhllsx9bx52iN/SiV/aIxnK0ro/zLiqf/bJB2UMuhJrl51/BbkPByhx61jG/GvxF6Sy nHeCWIXvAedSh4X9CSf8Nfq8H3OkCvlqlUd9qjsuLumjx0A1GfmJCgDprpiTSxTZVwsQ MXNi1UjikKFECyG19RZiGdyBw9VUBah7nsB5V9WhfUaebKFDkPonNELVuWJ6ltU8aefS azssLxMmQcNg9AdUZcHidXm6eDLwI0SXAYV627pi494BLw4uTGXrI+xWrMHXQrMcg15a 8KfQ== X-Gm-Message-State: ALQs6tCqJrzm81ZsYbaCHxc7ndNi66/s3bZ63bFUaVKjGTwjO3uGB9Vp eNulSytjhNJPmLvmQ2x2fdUrIw== X-Received: by 2002:a17:902:76c7:: with SMTP id j7-v6mr2702153plt.108.1523407957202; Tue, 10 Apr 2018 17:52:37 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id t75sm7898592pfe.124.2018.04.10.17.52.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 10 Apr 2018 17:52:36 -0700 (PDT) Date: Tue, 10 Apr 2018 17:52:34 -0700 From: Kees Cook To: Dave Watson Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, Ilya Lesokhin , Aviad Yehezkel , "David S. Miller" Subject: [PATCH] net/tls: Remove VLA usage Message-ID: <20180411005234.GA39848@beast> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the quest to remove VLAs from the kernel[1], this replaces the VLA size with the only possible size used in the code, and adds a mechanism to double-check future IV sizes. [1] https://lkml.kernel.org/r/CA+55aFzCG-zNmZwX4A2FQpadafLfEzK6CC=qPXydAacU1RqZWA@mail.gmail.com Signed-off-by: Kees Cook --- net/tls/tls_sw.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c index 4dc766b03f00..71e79597f940 100644 --- a/net/tls/tls_sw.c +++ b/net/tls/tls_sw.c @@ -41,6 +41,8 @@ #include #include +#define MAX_IV_SIZE TLS_CIPHER_AES_GCM_128_IV_SIZE + static int tls_do_decryption(struct sock *sk, struct scatterlist *sgin, struct scatterlist *sgout, @@ -673,7 +675,7 @@ static int decrypt_skb(struct sock *sk, struct sk_buff *skb, { struct tls_context *tls_ctx = tls_get_ctx(sk); struct tls_sw_context *ctx = tls_sw_ctx(tls_ctx); - char iv[TLS_CIPHER_AES_GCM_128_SALT_SIZE + tls_ctx->rx.iv_size]; + char iv[TLS_CIPHER_AES_GCM_128_SALT_SIZE + MAX_IV_SIZE]; struct scatterlist sgin_arr[MAX_SKB_FRAGS + 2]; struct scatterlist *sgin = &sgin_arr[0]; struct strp_msg *rxm = strp_msg(skb); @@ -1094,6 +1096,12 @@ int tls_set_sw_offload(struct sock *sk, struct tls_context *ctx, int tx) goto free_priv; } + /* Sanity-check the IV size for stack allocations. */ + if (iv_size > MAX_IV_SIZE) { + rc = -EINVAL; + goto free_priv; + } + cctx->prepend_size = TLS_HEADER_SIZE + nonce_size; cctx->tag_size = tag_size; cctx->overhead_size = cctx->prepend_size + cctx->tag_size; -- 2.7.4 -- Kees Cook Pixel Security