From: David McCullough <david_mccullough@au.securecomputing.com>
To: Valdis.Kletnieks@vt.edu
Cc: Herbert Xu <herbert@gondor.apana.org.au>,
Adrian Bunk <bunk@stusta.de>,
davem@davemloft.net, linux-crypto@vger.kernel.org,
linux-kernel@vger.kernel.org
Subject: Re: [2.6 patch] crypto/aes.c: array overrun
Date: Wed, 15 Mar 2006 08:54:48 +1000 [thread overview]
Message-ID: <20060314225448.GA27285@beast> (raw)
In-Reply-To: <200603142025.k2EKP8Z4010175@turing-police.cc.vt.edu>
[-- Attachment #1: Type: text/plain, Size: 825 bytes --]
Jivin Valdis.Kletnieks@vt.edu lays it down ...
> On Sat, 11 Mar 2006 13:41:16 +1100, Herbert Xu said:
>
> > OK this is not pretty but it is actually correct. Notice how we only
> > overstep the mark for E_KEY but never for D_KEY. Since D_KEY is only
> > initialised after this, it is OK for us to trash the start of D_KEY.
>
> I think a big comment block describing this behavior is called for,
> as it carries an implicit requirement that D_KEY and E_KEY remain
> adjacent in memory. Anybody allocating space between them is in for
> a rude awakening....
Sounds like a bug waiting to happen to me.
Why not do something like the attached patch.
Cheers,
Davidm
--
David McCullough, david_mccullough@au.securecomputing.com, Ph:+61 734352815
Secure Computing - SnapGear http://www.uCdot.org http://www.cyberguard.com
[-- Attachment #2: aes.diff --]
[-- Type: text/plain, Size: 600 bytes --]
Index: linux-2.6.x/crypto/aes.c
===================================================================
RCS file: linux-2.6.x/crypto/aes.c,v
retrieving revision 1.1.1.6
diff -u -r1.1.1.6 aes.c
--- linux-2.6.x/crypto/aes.c 31 Aug 2005 00:33:03 -0000 1.1.1.6
+++ linux-2.6.x/crypto/aes.c 14 Mar 2006 22:53:06 -0000
@@ -78,12 +78,11 @@
struct aes_ctx {
int key_length;
- u32 E[60];
- u32 D[60];
+ u32 _KEYS[120];
};
-#define E_KEY ctx->E
-#define D_KEY ctx->D
+#define E_KEY (&ctx->_KEYS[0])
+#define D_KEY (&ctx->_KEYS[60])
static u8 pow_tab[256] __initdata;
static u8 log_tab[256] __initdata;
next prev parent reply other threads:[~2006-03-14 23:00 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-03-11 1:03 [2.6 patch] crypto/aes.c: array overrun Adrian Bunk
2006-03-11 2:41 ` Herbert Xu
2006-03-13 10:30 ` Pavel Machek
2006-03-14 20:25 ` Valdis.Kletnieks
2006-03-14 22:54 ` David McCullough [this message]
2006-03-15 0:32 ` Herbert Xu
2006-03-15 1:11 ` David McCullough
2006-03-15 10:13 ` Herbert Xu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20060314225448.GA27285@beast \
--to=david_mccullough@au.securecomputing.com \
--cc=Valdis.Kletnieks@vt.edu \
--cc=bunk@stusta.de \
--cc=davem@davemloft.net \
--cc=herbert@gondor.apana.org.au \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox