On Sat, Jan 02, 2021 at 02:59:09PM +0100, Ard Biesheuvel wrote:
> Pavel reports that commit 17858b140bf4 ("crypto: ecdh - avoid unaligned
> accesses in ecdh_set_secret()") fixes one problem but introduces another:
> the unconditional memcpy() introduced by that commit may overflow the
> target buffer if the source data is invalid, which could be the result of
> intentional tampering.
> 
> So check params.key_size explicitly against the size of the target buffer
> before validating the key further.
> 
> Fixes: 17858b140bf4 ("crypto: ecdh - avoid unaligned accesses in 
> ecdh_set_secret()")
> Reported-by: Pavel Machek <pa...@denx.de>
> Cc: <sta...@vger.kernel.org>
> Signed-off-by: Ard Biesheuvel <a...@kernel.org>
> ---
>  crypto/ecdh.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)

Patch applied.  Thanks.
-- 
Email: Herbert Xu <herb...@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

Reply via email to