public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] crypto: algif_aead: deref after NULL
@ 2024-06-06 18:34 Alexander Sapozhnikov
  2024-06-07 11:41 ` Herbert Xu
  0 siblings, 1 reply; 2+ messages in thread
From: Alexander Sapozhnikov @ 2024-06-06 18:34 UTC (permalink / raw)
  To: Herbert Xu, David S. Miller
  Cc: Alexandr Sapozhnikov, linux-crypto, linux-kernel, lvc-project

From: Alexandr Sapozhnikov <alsp705@gmail.com>

After having been compared to a NULL value at algif_aead.c:191, 
pointer 'tsgl_src' is passed as 2nd parameter in call to function 
'crypto_aead_copy_sgl' at algif_aead.c:244, where it is
dereferenced at algif_aead.c:85.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Signed-off-by: Alexandr Sapozhnikov <alsp705@gmail.com>
---
 crypto/algif_aead.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c
index 42493b4..f757907 100644
--- a/crypto/algif_aead.c
+++ b/crypto/algif_aead.c
@@ -191,7 +191,7 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
 		if (tsgl_src)
 			break;
 	}
-	if (processed && !tsgl_src) {
+	if (processed || !tsgl_src) {
 		err = -EFAULT;
 		goto free;
 	}
-- 
2.5.3


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH] crypto: algif_aead: deref after NULL
  2024-06-06 18:34 [PATCH] crypto: algif_aead: deref after NULL Alexander Sapozhnikov
@ 2024-06-07 11:41 ` Herbert Xu
  0 siblings, 0 replies; 2+ messages in thread
From: Herbert Xu @ 2024-06-07 11:41 UTC (permalink / raw)
  To: Alexander Sapozhnikov
  Cc: David S. Miller, linux-crypto, linux-kernel, lvc-project

On Thu, Jun 06, 2024 at 09:34:00PM +0300, Alexander Sapozhnikov wrote:
> From: Alexandr Sapozhnikov <alsp705@gmail.com>
> 
> After having been compared to a NULL value at algif_aead.c:191, 
> pointer 'tsgl_src' is passed as 2nd parameter in call to function 
> 'crypto_aead_copy_sgl' at algif_aead.c:244, where it is
> dereferenced at algif_aead.c:85.
> 
> Found by Linux Verification Center (linuxtesting.org) with SVACE.
> 
> Signed-off-by: Alexandr Sapozhnikov <alsp705@gmail.com>
> ---
>  crypto/algif_aead.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c
> index 42493b4..f757907 100644
> --- a/crypto/algif_aead.c
> +++ b/crypto/algif_aead.c
> @@ -191,7 +191,7 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
>  		if (tsgl_src)
>  			break;
>  	}
> -	if (processed && !tsgl_src) {
> +	if (processed || !tsgl_src) {

I think this is a false positive.  If processed is zero (which can
only happen for encryption, i.e., a null message), tsgl_src won't
be dereferenced by the Crypto API.  For decryption processed is
never zero as it always contains the authentication tag.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-06-07 11:41 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-06-06 18:34 [PATCH] crypto: algif_aead: deref after NULL Alexander Sapozhnikov
2024-06-07 11:41 ` Herbert Xu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox