Ard Biesheuvel 457b67797c crypto: ecdh - avoid buffer overflow in ecdh_set_secret()
commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5 upstream.

Pavel reports that commit 17858b140bf4 ("crypto: ecdh - avoid unaligned
accesses in ecdh_set_secret()") fixes one problem but introduces another:
the unconditional memcpy() introduced by that commit may overflow the
target buffer if the source data is invalid, which could be the result of
intentional tampering.

So check params.key_size explicitly against the size of the target buffer
before validating the key further.

Fixes: 17858b140bf4 ("crypto: ecdh - avoid unaligned accesses in ecdh_set_secret()")
Reported-by: Pavel Machek <pavel@denx.de>
Cc: <stable@vger.kernel.org>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2021-01-12 20:10:20 +01:00
..
2018-06-18 20:17:38 +05:30
2018-05-26 09:16:44 +02:00
2018-04-21 00:58:34 +08:00
2018-04-21 00:58:34 +08:00
2018-04-21 00:58:34 +08:00
2018-07-20 13:51:21 +08:00
2018-11-13 11:08:46 -08:00
2018-05-16 07:23:35 +02:00
2019-01-09 17:38:44 +01:00
2018-04-21 00:58:30 +08:00