[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240306110022.21574-1-amishin@t-argos.ru>
Date: Wed, 6 Mar 2024 14:00:22 +0300
From: Aleksandr Mishin <amishin@...rgos.ru>
To: Herbert Xu <herbert@...dor.apana.org.au>
CC: Aleksandr Mishin <amishin@...rgos.ru>, "David S. Miller"
<davem@...emloft.net>, Steve Lin <steven.lin1@...adcom.com>, Rob Rice
<rob.rice@...adcom.com>, <linux-crypto@...r.kernel.org>,
<linux-kernel@...r.kernel.org>, <lvc-project@...uxtesting.org>
Subject: [PATCH] crypto: bcm/spu2
In spu2_dump_omd() value of ptr is increased by ciph_key_len
instead of hash_iv_len which could lead to going beyond the
buffer boundaries.
Fix this bug by changing ciph_key_len to hash_iv_len.
Fixes: 9d12ba86f818 ("crypto: brcm - Add Broadcom SPU driver")
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Signed-off-by: Aleksandr Mishin <amishin@...rgos.ru>
---
drivers/crypto/bcm/spu2.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/crypto/bcm/spu2.c b/drivers/crypto/bcm/spu2.c
index 07989bb8c220..3fdc64b5a65e 100644
--- a/drivers/crypto/bcm/spu2.c
+++ b/drivers/crypto/bcm/spu2.c
@@ -495,7 +495,7 @@ static void spu2_dump_omd(u8 *omd, u16 hash_key_len, u16 ciph_key_len,
if (hash_iv_len) {
packet_log(" Hash IV Length %u bytes\n", hash_iv_len);
packet_dump(" hash IV: ", ptr, hash_iv_len);
- ptr += ciph_key_len;
+ ptr += hash_iv_len;
}
if (ciph_iv_len) {
--
2.30.2
Powered by blists - more mailing lists