[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <D6W2QCDWF7DN.UN4NFTJ0ESS5@kernel.org>
Date: Tue, 07 Jan 2025 21:05:25 +0200
From: "Jarkko Sakkinen" <jarkko@...nel.org>
To: "David Gstir" <david@...ma-star.at>, "sigma star Kernel Team"
<upstream+dcp@...ma-star.at>, "James Bottomley" <jejb@...ux.ibm.com>, "Mimi
Zohar" <zohar@...ux.ibm.com>, "David Howells" <dhowells@...hat.com>, "Paul
Moore" <paul@...l-moore.com>, "James Morris" <jmorris@...ei.org>, "Serge E.
Hallyn" <serge@...lyn.com>
Cc: "linux-integrity@...r.kernel.org" <linux-integrity@...r.kernel.org>,
"keyrings@...r.kernel.org" <keyrings@...r.kernel.org>,
"linux-security-module@...r.kernel.org"
<linux-security-module@...r.kernel.org>, "linux-kernel@...r.kernel.org"
<linux-kernel@...r.kernel.org>, <stable@...r.kernel.org>
Subject: Re: [PATCH] KEYS: trusted: dcp: fix improper sg use with
CONFIG_VMAP_STACK=y
On Tue Jan 7, 2025 at 2:56 PM EET, David Gstir wrote:
>
> > On 13.11.2024, at 22:27, David Gstir <david@...ma-star.at> wrote:
> >
> > With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted
> > keys can crash during en- and decryption of the blob encryption key via
> > the DCP crypto driver. This is caused by improperly using sg_init_one()
> > with vmalloc'd stack buffers (plain_key_blob).
> >
> > Fix this by always using kmalloc() for buffers we give to the DCP crypto
> > driver.
> >
> > Cc: stable@...r.kernel.org # v6.10+
> > Fixes: 0e28bf61a5f9 ("KEYS: trusted: dcp: fix leak of blob encryption key")
> > Signed-off-by: David Gstir <david@...ma-star.at>
>
> gentle ping.
It's done, thanks for reminding, and don't hesitate to do it earlier
if this ever happens again.
>
> Thanks!
> - David
BR, Jarkko
Powered by blists - more mailing lists