On Sat, Jan 02, 2021 at 02:59:09PM +0100, Ard Biesheuvel wrote: > Pavel reports that commit 17858b140bf4 ("crypto: ecdh - avoid unaligned > accesses in ecdh_set_secret()") fixes one problem but introduces another: > the unconditional memcpy() introduced by that commit may overflow the > target buffer if the source data is invalid, which could be the result of > intentional tampering. > > So check params.key_size explicitly against the size of the target buffer > before validating the key further. > > Fixes: 17858b140bf4 ("crypto: ecdh - avoid unaligned accesses in > ecdh_set_secret()") > Reported-by: Pavel Machek <pa...@denx.de> > Cc: <sta...@vger.kernel.org> > Signed-off-by: Ard Biesheuvel <a...@kernel.org> > --- > crypto/ecdh.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-)
Patch applied. Thanks. -- Email: Herbert Xu <herb...@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt