Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp104040yba; Mon, 20 May 2019 05:46:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqybKPuBOv8OTUMSL5V3bA3oJiNT4Fq9DR3wV8kNNHyGLNKc8pE+cQG+0b1PytwOIJ8fYoKN X-Received: by 2002:a17:902:42a5:: with SMTP id h34mr53368931pld.178.1558356414735; Mon, 20 May 2019 05:46:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558356414; cv=none; d=google.com; s=arc-20160816; b=vbXNQ91mvuiLQU0erqIQbXON4VsKbcWiM+3wOb6qL4LM4ZFBlxCzCePFI5OGHBebR0 LNdaoHYkBeiECP+mGgivCDgTr0Px29to7oKqgWxA/3+T+DVhzYXt3UBP8p3aBbzjczM0 MXLJvoTlLJ1kBJmf9pz7QRV2+Y7uWAn27t8X10uqni6CFkdmxzzkq/Cx8lUsHEAYVMIQ McnpqZR+4hCB5RS3nHuoRMtv+ybseVkhe2pp/RuabJkTzRMXJu33IaP4MZPy/7hlYegy 4qYy4UY0XahrQZLCRK4+mxEF7hKAHL52sx7yrVk/ELwFK0jUUcMY6GIjY5+0uPaiZLdA OIeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9/XG7LR5dVW836QgD9aYgNeLSjpfoOQdhXy7Wio1Uqg=; b=AWFp2i6FFNGJx+51xZCbdevITqlinl1sVi+rTBj/2MKK9UJTNBniwxvZhHV9ReQIvf GQkF8NTulGeAtSJPiyYcB900Fa8KPvRSkYxlz55ThYljIB8qETytja9vTq1XrSerwLVA EQzhKDUlhYsdeoqdI5xuniHLif3itapwXuGhXW5Z4KQyKSfFYTgFeNkHlhhiZd7lV4eJ +XqzwMCmyzeRySvIi3LzOHA7T0Ax5Nn0759IEFq0/8Ch2w+NvMPasVHgjFJ5L8HZQDNd hfjwzUyOd6eqCOiy3mnlN0VUDemPTtCzwXdn1JY026m1Onuojc23DMJkxOTKO2d4MAua O0yA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uyGbZWyR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k1si16815975pll.317.2019.05.20.05.46.40; Mon, 20 May 2019 05:46:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uyGbZWyR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391356AbfETMpB (ORCPT + 99 others); Mon, 20 May 2019 08:45:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:42868 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388210AbfETM1R (ORCPT ); Mon, 20 May 2019 08:27:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 29BA221019; Mon, 20 May 2019 12:27:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558355236; bh=e0wQ/Or/KATeiOfZ/Wp3Ts3mjkNeCXdisU7ebNssEb8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uyGbZWyRLmuuui4Px3It6ZnmEYvKnBR0RwAdQKy0duWYzPHuRABocUin54oKwDtpx Y7b9JkLHkKCdFPy6DGNNdxLcDdrf9aVUPbpDeauiGUtM7JcYIxRBgsfmWRofC5Tlrp y5un6AAfYmldJyYoLJgKci9KD18naGatsYob0GAU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Biggers , Herbert Xu Subject: [PATCH 5.0 042/123] crypto: arm/aes-neonbs - dont access already-freed walk.iv Date: Mon, 20 May 2019 14:13:42 +0200 Message-Id: <20190520115247.524657816@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190520115245.439864225@linuxfoundation.org> References: <20190520115245.439864225@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers commit 767f015ea0b7ab9d60432ff6cd06b664fd71f50f upstream. If the user-provided IV needs to be aligned to the algorithm's alignmask, then skcipher_walk_virt() copies the IV into a new aligned buffer walk.iv. But skcipher_walk_virt() can fail afterwards, and then if the caller unconditionally accesses walk.iv, it's a use-after-free. arm32 xts-aes-neonbs doesn't set an alignmask, so currently it isn't affected by this despite unconditionally accessing walk.iv. However this is more subtle than desired, and it was actually broken prior to the alignmask being removed by commit cc477bf64573 ("crypto: arm/aes - replace bit-sliced OpenSSL NEON code"). Thus, update xts-aes-neonbs to start checking the return value of skcipher_walk_virt(). Fixes: e4e7f10bfc40 ("ARM: add support for bit sliced AES using NEON instructions") Cc: # v3.13+ Signed-off-by: Eric Biggers Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- arch/arm/crypto/aes-neonbs-glue.c | 2 ++ 1 file changed, 2 insertions(+) --- a/arch/arm/crypto/aes-neonbs-glue.c +++ b/arch/arm/crypto/aes-neonbs-glue.c @@ -278,6 +278,8 @@ static int __xts_crypt(struct skcipher_r int err; err = skcipher_walk_virt(&walk, req, true); + if (err) + return err; crypto_cipher_encrypt_one(ctx->tweak_tfm, walk.iv, walk.iv);