From: Junaid Shahid <junaids@google.com>
To: herbert@gondor.apana.org.au
Cc: linux-crypto@vger.kernel.org, andreslc@google.com,
davem@davemloft.net, gthelen@google.com
Subject: [PATCH v2 0/2] Fix out-of-bounds memory accesses in generic-gcm-aesni
Date: Tue, 19 Dec 2017 20:42:57 -0800 [thread overview]
Message-ID: <20171220044259.61106-1-junaids@google.com> (raw)
In-Reply-To: <20171219221750.34148-1-junaids@google.com>
Changes in v2:
- Also fixed issue 2 described below in addition to issue 1 in v1
The aesni_gcm_enc/dec functions can access memory before the start or end of
the supplied src buffer. This can happen if either:
1. The data length is less than 16 bytes and there is no AAD or the AAD
length is not enough to cover the underrun. In this case, memory before
the start of the buffer would be accessed.
2. The AAD length is not a multiple of 4 bytes and the data length is too
small to cover the overrun. In this case, memory after the end of the
buffer would be accessed.
This was not a problem when rfc4106-gcm-aesni was the only mode supported by
the aesni module, as in that case there is always enough AAD and IV bytes to
cover the out-of-bounds accesses. However, that is no longer the case with
the generic-gcm-aesni mode. This could potentially result in accessing pages
that are not mapped, thus causing a crash.
Junaid Shahid (2):
crypto: Fix out-of-bounds access of the data buffer in
generic-gcm-aesni
crypto: Fix out-of-bounds access of the AAD buffer in
generic-gcm-aesni
arch/x86/crypto/aesni-intel_asm.S | 166 +++++++++++++-------------------------
1 file changed, 54 insertions(+), 112 deletions(-)
--
2.15.1.620.gb9897f4670-goog
next prev parent reply other threads:[~2017-12-20 4:43 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-12-19 22:17 [PATCH] crypto: Fix out-of-bounds memory access in generic-gcm-aesni Junaid Shahid
2017-12-20 4:42 ` Junaid Shahid [this message]
2017-12-20 4:42 ` [PATCH v2 1/2] crypto: Fix out-of-bounds access of the data buffer " Junaid Shahid
2017-12-20 8:36 ` Eric Biggers
2017-12-20 19:28 ` Junaid Shahid
2017-12-20 21:05 ` Eric Biggers
2017-12-20 4:42 ` [PATCH v2 2/2] crypto: Fix out-of-bounds access of the AAD " Junaid Shahid
2017-12-20 8:42 ` Eric Biggers
2017-12-20 19:35 ` Junaid Shahid
2017-12-20 21:12 ` Eric Biggers
2017-12-20 21:51 ` Junaid Shahid
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171220044259.61106-1-junaids@google.com \
--to=junaids@google.com \
--cc=andreslc@google.com \
--cc=davem@davemloft.net \
--cc=gthelen@google.com \
--cc=herbert@gondor.apana.org.au \
--cc=linux-crypto@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.