[Devel] [PATCH] crypto: authenc - fix parsing key with misaligned rta_len
Vasily Averin
vvs at virtuozzo.com
Tue Apr 21 07:57:06 MSK 2020
Can you reproduce it on original RHEL8 kernel?
On 4/20/20 5:03 PM, Valeriy Vdovin wrote:
> Keys for "authenc" AEADs are formatted as an rtattr containing a 4-byte
> 'enckeylen', followed by an authentication key and an encryption key.
> crypto_authenc_extractkeys() parses the key to find the inner keys.
>
> However, it fails to consider the case where the rtattr's payload is
> longer than 4 bytes but not 4-byte aligned, and where the key ends
> before the next 4-byte aligned boundary. In this case, 'keylen -=
> RTA_ALIGN(rta->rta_len);' underflows to a value near UINT_MAX. This
> causes a buffer overread and crash during crypto_ahash_setkey().
>
> Fix it by restricting the rtattr payload to the expected size.
>
> Reproducer using AF_ALG:
>
> #include <linux/if_alg.h>
> #include <linux/rtnetlink.h>
> #include <sys/socket.h>
>
> int main()
> {
> int fd;
> struct sockaddr_alg addr = {
> .salg_type = "aead",
> .salg_name = "authenc(hmac(sha256),cbc(aes))",
> };
> struct {
> struct rtattr attr;
> __be32 enckeylen;
> char keys[1];
> } __attribute__((packed)) key = {
> .attr.rta_len = sizeof(key),
> .attr.rta_type = 1 /* CRYPTO_AUTHENC_KEYA_PARAM */,
> };
>
> fd = socket(AF_ALG, SOCK_SEQPACKET, 0);
> bind(fd, (void *)&addr, sizeof(addr));
> setsockopt(fd, SOL_ALG, ALG_SET_KEY, &key, sizeof(key));
> }
>
> It caused:
>
> BUG: unable to handle kernel paging request at ffff88007ffdc000
> PGD 2e01067 P4D 2e01067 PUD 2e04067 PMD 2e05067 PTE 0
> Oops: 0000 [#1] SMP
> CPU: 0 PID: 883 Comm: authenc Not tainted 4.20.0-rc1-00108-g00c9fe37a7f27 #13
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-20181126_142135-anatol 04/01/2014
> RIP: 0010:sha256_ni_transform+0xb3/0x330 arch/x86/crypto/sha256_ni_asm.S:155
> [...]
> Call Trace:
> sha256_ni_finup+0x10/0x20 arch/x86/crypto/sha256_ssse3_glue.c:321
> crypto_shash_finup+0x1a/0x30 crypto/shash.c:178
> shash_digest_unaligned+0x45/0x60 crypto/shash.c:186
> crypto_shash_digest+0x24/0x40 crypto/shash.c:202
> hmac_setkey+0x135/0x1e0 crypto/hmac.c:66
> crypto_shash_setkey+0x2b/0xb0 crypto/shash.c:66
> shash_async_setkey+0x10/0x20 crypto/shash.c:223
> crypto_ahash_setkey+0x2d/0xa0 crypto/ahash.c:202
> crypto_authenc_setkey+0x68/0x100 crypto/authenc.c:96
> crypto_aead_setkey+0x2a/0xc0 crypto/aead.c:62
> aead_setkey+0xc/0x10 crypto/algif_aead.c:526
> alg_setkey crypto/af_alg.c:223 [inline]
> alg_setsockopt+0xfe/0x130 crypto/af_alg.c:256
> __sys_setsockopt+0x6d/0xd0 net/socket.c:1902
> __do_sys_setsockopt net/socket.c:1913 [inline]
> __se_sys_setsockopt net/socket.c:1910 [inline]
> __x64_sys_setsockopt+0x1f/0x30 net/socket.c:1910
> do_syscall_64+0x4a/0x180 arch/x86/entry/common.c:290
> entry_SYSCALL_64_after_hwframe+0x49/0xbe
>
> Fixes: e236d4a89a2f ("[CRYPTO] authenc: Move enckeylen into key itself")
> Cc: <stable at vger.kernel.org> # v2.6.25+
> Signed-off-by: Eric Biggers <ebiggers at google.com>
> Signed-off-by: Herbert Xu <herbert at gondor.apana.org.au>
>
> (cherry-picked from 8f9c469348487844328e162db57112f7d347c49f due to
> https://jira.sw.ru/browse/PSBM-103251)
> Signed-off-by: Valeriy Vdovin <valeriy.vdovin at virtuozzo.com>
>
> Signed-off-by: Valeriy Vdovin <valeriy.vdovin at virtuozzo.com>
> ---
> crypto/authenc.c | 14 +++++++++++---
> 1 file changed, 11 insertions(+), 3 deletions(-)
>
> diff --git a/crypto/authenc.c b/crypto/authenc.c
> index 4fa8d40..3ee10fc 100644
> --- a/crypto/authenc.c
> +++ b/crypto/authenc.c
> @@ -58,14 +58,22 @@ int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,
> return -EINVAL;
> if (rta->rta_type != CRYPTO_AUTHENC_KEYA_PARAM)
> return -EINVAL;
> - if (RTA_PAYLOAD(rta) < sizeof(*param))
> +
> + /*
> + * RTA_OK() didn't align the rtattr's payload when validating that it
> + * fits in the buffer. Yet, the keys should start on the next 4-byte
> + * aligned boundary. To avoid confusion, require that the rtattr
> + * payload be exactly the param struct, which has a 4-byte aligned size.
> + */
> + if (RTA_PAYLOAD(rta) != sizeof(*param))
> return -EINVAL;
> + BUILD_BUG_ON(sizeof(*param) % RTA_ALIGNTO);
>
> param = RTA_DATA(rta);
> keys->enckeylen = be32_to_cpu(param->enckeylen);
>
> - key += RTA_ALIGN(rta->rta_len);
> - keylen -= RTA_ALIGN(rta->rta_len);
> + key += rta->rta_len;
> + keylen -= rta->rta_len;
>
> if (keylen < keys->enckeylen)
> return -EINVAL;
>
More information about the Devel
mailing list