From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.0 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01948C43381 for ; Fri, 22 Mar 2019 12:49:51 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id BC2482183E for ; Fri, 22 Mar 2019 12:49:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553258990; bh=IUW7NIFVZH3CQppYTMheeZvG1PijOeIbQBCVPCDfGqA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=tujO5CFSGu9d8KgmBBJEJiTrhIjfjQ3sfl60bBqM9hMnNBxQZF5SOkV/9u5NgUaYP H1BhCnsCdhzWaXyAFzPmMsgt7+vjtd4eEQGP0rbBtUeKnAUOYaoYh7a8H+VlqiuPgU 3wX3w3DxQ/jLDABWfiWKNCHiXh1srehSnsQ31LaA= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387535AbfCVL4h (ORCPT ); Fri, 22 Mar 2019 07:56:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:33036 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732921AbfCVL4f (ORCPT ); Fri, 22 Mar 2019 07:56:35 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 935A42082C; Fri, 22 Mar 2019 11:56:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553255795; bh=IUW7NIFVZH3CQppYTMheeZvG1PijOeIbQBCVPCDfGqA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RwJmLpMuhKsipr9TWDBKgTnJvNPvCN6W8DBDdRgrxdlhOsV2Tme5IW/mqyxkvOJHR doPVYkAFGSCn9aP/kyp3BlyOJ4WAp/3997h/DER3HT80ipoDGZ9y/5WTFFv/aSspi/ l5TSOjjb0MG2G6fP0kATMnSU5wwlxZhXV4slMkHQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gilad Ben-Yossef , Herbert Xu Subject: [PATCH 4.19 017/280] crypto: ccree - dont copy zero size ciphertext Date: Fri, 22 Mar 2019 12:12:50 +0100 Message-Id: <20190322111307.273080814@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Gilad Ben-Yossef commit 2b5ac17463dcb2411fed506edcf259a89bb538ba upstream. For decryption in CBC mode we need to save the last ciphertext block for use as the next IV. However, we were trying to do this also with zero sized ciphertext resulting in a panic. Fix this by only doing the copy if the ciphertext length is at least of IV size. Signed-off-by: Gilad Ben-Yossef Cc: stable@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/ccree/cc_cipher.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/drivers/crypto/ccree/cc_cipher.c +++ b/drivers/crypto/ccree/cc_cipher.c @@ -783,7 +783,8 @@ static int cc_cipher_decrypt(struct skci memset(req_ctx, 0, sizeof(*req_ctx)); - if (ctx_p->cipher_mode == DRV_CIPHER_CBC) { + if ((ctx_p->cipher_mode == DRV_CIPHER_CBC) && + (req->cryptlen >= ivsize)) { /* Allocate and save the last IV sized bytes of the source, * which will be lost in case of in-place decryption.