2012-10-29 13:04:24

by Milan Broz

[permalink] [raw]
Subject: [PATCH] algif_skcipher: Avoid crash if buffer is not multiple of cipher block size

When user requests encryption (or decryption) of block which
is not aligned to cipher block size, an OOps like this can happen:

[ 37.672185] BUG: unable to handle kernel paging request at e1c5fbc0
[ 37.672457] IP: [<c1214393>] scatterwalk_done+0x53/0x70
...
[ 37.679183] Call Trace:
[ 37.679326] [<c1216cf0>] blkcipher_walk_done+0x160/0x1e0
[ 37.679516] [<c1217088>] blkcipher_walk_next+0x318/0x3c0
[ 37.679707] [<c1007f1c>] ? native_sched_clock+0x2c/0xb0
[ 37.679895] [<c12171a0>] blkcipher_walk_first+0x70/0x160
[ 37.680082] [<c12172e7>] blkcipher_walk_virt+0x17/0x20
[ 37.680272] [<e0a36249>] cbc_encrypt+0x29/0x100 [aesni_intel]
[ 37.680472] [<c1029403>] ? get_user_pages_fast+0x123/0x150
[ 37.680665] [<c106e9fb>] ? trace_hardirqs_on+0xb/0x10
[ 37.680851] [<e083a1c9>] __ablk_encrypt+0x39/0x40 [ablk_helper]
[ 37.681052] [<e083a1ea>] ablk_encrypt+0x1a/0x70 [ablk_helper]
[ 37.681250] [<e0de95ac>] skcipher_recvmsg+0x20c/0x400 [algif_skcipher]
[ 37.681474] [<c1346897>] ? sock_kfree_s+0x17/0x30
[ 37.681652] [<c1344bc4>] sock_aio_read+0x104/0x140
[ 37.681834] [<c10d2637>] do_sync_read+0x97/0xd0
[ 37.682009] [<c10d2f1d>] vfs_read+0x11d/0x140
[ 37.682183] [<c1346213>] ? sys_socketcall+0x2a3/0x320
[ 37.682366] [<c10d2f82>] sys_read+0x42/0x90
[ 37.682597] [<c1403afa>] sysenter_do_call+0x12/0x32

Patch fixes it by simply rejecting buffer which is not multiple of cipher block.

Signed-off-by: Milan Broz <[email protected]>
---
crypto/algif_skcipher.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index 6a6dfc0..5f7713b 100644
--- a/crypto/algif_skcipher.c
+++ b/crypto/algif_skcipher.c
@@ -463,7 +463,7 @@ static int skcipher_recvmsg(struct kiocb *unused, struct socket *sock,
used -= used % bs;

err = -EINVAL;
- if (!used)
+ if (!used || used % bs)
goto free;

ablkcipher_request_set_crypt(&ctx->req, sg,
--
1.7.10.4