Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp622834pxb; Fri, 14 Jan 2022 12:33:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJz+YW59ZKvq7WEgLqEaoKcesLigtgRhq0MsJ4skC8QvD0Doh3UQcUFKETnrt4WAWaJwjhsl X-Received: by 2002:a05:6a00:2182:b0:4a7:ec46:29da with SMTP id h2-20020a056a00218200b004a7ec4629damr10658790pfi.68.1642192390523; Fri, 14 Jan 2022 12:33:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642192390; cv=none; d=google.com; s=arc-20160816; b=kR3CxvCDdq6WCxhdayQ3m6daiF9gHYbfiKTZdmPe92hpzljGZq2240QfdDYnQO3v9r t2kxiURLM8yrFrJ7QkKDPKoxG8WwpXp/Cq+3q8J2b0XGPfadMgxGH1THOvUWTQLTO2kA rrQLxEUeK5NqcUCzFc+2ytJByNwgqTe96IWsGOgv7pxT0r8lmVSA7PGU7ItNm0YX9tXa UhRDswdBkSkbGYfVSfihzWCegoOmUr5Dp7ZYi8iPLWvdgo5lYGPkMQmlAgReljgza8AV QzFiYMaVMyXBcVOhY808LdzR1dFV4lhdrxe9hu7xuy6VEK38fQhWIJzq2LwKvdOJh4x7 sYsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=T3Dskh5gZywYbCDkXTSGS6ZqFpW6fyPBnX7lzu+cnnI=; b=NWR9idavmxljC0ZFUw622JOc82/qbhgHx24s2wCs3B8Z7c61vOeLRiYS/DptiZ2nf3 8GlSEKozb5QDScSvB+QReaa74+wTnlezymJ2J9rvMY3ZxwXiJk261NRzd+6EMRtFEGlb nJl2sNF5UW6GhDG/YVc2HMxpEKCNdULWbM/63flhYMh6BEuZkJ1y62AHsjiJjeDCBD9e UDi6ObxuWNVjfpFYoZ+wEr+9YRBGG/oTy2oETH1ApiGLGwTQqUuGQ6OhktX6olj/PLsg BF2YcVOJDcKF55NLRqMw2nCP1y/8ISgsWPJPWSSFjDhCymVnLAko2iKMvXDp9hsDI2hg Kh8w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JwEY2mD2; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r8si6673768pff.44.2022.01.14.12.32.50; Fri, 14 Jan 2022 12:33:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JwEY2mD2; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240228AbiANIWo (ORCPT + 99 others); Fri, 14 Jan 2022 03:22:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50054 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240269AbiANIV1 (ORCPT ); Fri, 14 Jan 2022 03:21:27 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C11C5C0617A7; Fri, 14 Jan 2022 00:21:12 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 61BB361E37; Fri, 14 Jan 2022 08:21:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 971C7C36AE9; Fri, 14 Jan 2022 08:21:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1642148471; bh=42/E2d5qp+aGEb3LON47WXAM0iCKqIGuFaGn17hu4ts=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JwEY2mD2KTqbOdCNrAF+34oRuR7ZeEHeS/ssxh6swbbl2GJscXxJezaxAQOpJbh9J 3x4uIyVb4YHrVnFeh8wkaKu5qE5MyUq0m90yTEp8pKnfr7d7kv+IV4ZwpLD8ZHnuPS v+xhwlpjy/gshT8EQK6DqXqYmfFP5JS4dW+CP7da/TxARNnSU7t/dZoMyf8gshjlU2 wo+y2dnnQIbpTgv9TqgqAjxdgo+C55QOklM48homFpxz9JdKq7OuHK6QJRQEARV0kj zwtlTnolTgK85pyq+x8MxKDvDr0ab8GQ1YZv2lw00hLX7iP5q82CtfMDbcLUzzBh2i 6PMtXfp96PW6w== From: Eric Biggers To: linux-crypto@vger.kernel.org, Herbert Xu Cc: keyrings@vger.kernel.org, Vitaly Chikunov , Denis Kenzior , Tadeusz Struk , stable@vger.kernel.org Subject: [PATCH 2/3] crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() Date: Fri, 14 Jan 2022 00:19:38 -0800 Message-Id: <20220114081939.218416-3-ebiggers@kernel.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220114081939.218416-1-ebiggers@kernel.org> References: <20220114081939.218416-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Eric Biggers Before checking whether the expected digest_info is present, we need to check that there are enough bytes remaining. Fixes: a49de377e051 ("crypto: Add hash param to pkcs1pad") Cc: Tadeusz Struk Cc: # v4.6+ Signed-off-by: Eric Biggers --- crypto/rsa-pkcs1pad.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/crypto/rsa-pkcs1pad.c b/crypto/rsa-pkcs1pad.c index 7b223adebabf..6cd24b4b9b9e 100644 --- a/crypto/rsa-pkcs1pad.c +++ b/crypto/rsa-pkcs1pad.c @@ -476,6 +476,8 @@ static int pkcs1pad_verify_complete(struct akcipher_request *req, int err) pos++; if (digest_info) { + if (digest_info->size > dst_len - pos) + goto done; if (crypto_memneq(out_buf + pos, digest_info->data, digest_info->size)) goto done; -- 2.34.1