diff options
author | Milan Broz <gmazyland@gmail.com> | 2018-01-03 16:48:59 -0500 |
---|---|---|
committer | Mike Snitzer <snitzer@redhat.com> | 2018-01-17 09:08:41 -0500 |
commit | 27c7003697fc2c78f965984aa224ef26cd6b2949 (patch) | |
tree | ae436f726a28d0e83265bcf34ec9e500658df575 /drivers/md/dm-crypt.c | |
parent | bc68d0a43560e950850fc69b58f0f8254b28f6d6 (diff) |
dm crypt: fix crash by adding missing check for auth key size
If dm-crypt uses authenticated mode with separate MAC, there are two
concatenated part of the key structure - key(s) for encryption and
authentication key.
Add a missing check for authenticated key length. If this key length is
smaller than actually provided key, dm-crypt now properly fails instead
of crashing.
Fixes: ef43aa3806 ("dm crypt: add cryptographic data integrity protection (authenticated encryption)")
Cc: stable@vger.kernel.org # 4.12+
Reported-by: Salah Coronya <salahx@yahoo.com>
Signed-off-by: Milan Broz <gmazyland@gmail.com>
Signed-off-by: Mike Snitzer <snitzer@redhat.com>
Diffstat (limited to 'drivers/md/dm-crypt.c')
-rw-r--r-- | drivers/md/dm-crypt.c | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/drivers/md/dm-crypt.c b/drivers/md/dm-crypt.c index 9fc12f556534..4cc3809b2a3a 100644 --- a/drivers/md/dm-crypt.c +++ b/drivers/md/dm-crypt.c | |||
@@ -1954,10 +1954,15 @@ static int crypt_setkey(struct crypt_config *cc) | |||
1954 | /* Ignore extra keys (which are used for IV etc) */ | 1954 | /* Ignore extra keys (which are used for IV etc) */ |
1955 | subkey_size = crypt_subkey_size(cc); | 1955 | subkey_size = crypt_subkey_size(cc); |
1956 | 1956 | ||
1957 | if (crypt_integrity_hmac(cc)) | 1957 | if (crypt_integrity_hmac(cc)) { |
1958 | if (subkey_size < cc->key_mac_size) | ||
1959 | return -EINVAL; | ||
1960 | |||
1958 | crypt_copy_authenckey(cc->authenc_key, cc->key, | 1961 | crypt_copy_authenckey(cc->authenc_key, cc->key, |
1959 | subkey_size - cc->key_mac_size, | 1962 | subkey_size - cc->key_mac_size, |
1960 | cc->key_mac_size); | 1963 | cc->key_mac_size); |
1964 | } | ||
1965 | |||
1961 | for (i = 0; i < cc->tfms_count; i++) { | 1966 | for (i = 0; i < cc->tfms_count; i++) { |
1962 | if (crypt_integrity_hmac(cc)) | 1967 | if (crypt_integrity_hmac(cc)) |
1963 | r = crypto_aead_setkey(cc->cipher_tfm.tfms_aead[i], | 1968 | r = crypto_aead_setkey(cc->cipher_tfm.tfms_aead[i], |