On Sat, Jan 02, 2021 at 02:59:09PM +0100, Ard Biesheuvel wrote: > Pavel reports that commit 17858b140bf4 ("crypto: ecdh - avoid unaligned > accesses in ecdh_set_secret()") fixes one problem but introduces another: > the unconditional memcpy() introduced by that commit may overflow the > target buffer if the source data is invalid, which could be the result of > intentional tampering. > > So check params.key_size explicitly against the size of the target buffer > before validating the key further. > > Fixes: 17858b140bf4 ("crypto: ecdh - avoid unaligned accesses in ecdh_set_secret()") > Reported-by: Pavel Machek <pavel@xxxxxxx> > Cc: <stable@xxxxxxxxxxxxxxx> > Signed-off-by: Ard Biesheuvel <ardb@xxxxxxxxxx> > --- > crypto/ecdh.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) Patch applied. Thanks. -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt