[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <D6W2QNTD1MB0.2NQ94GSL1TA7@kernel.org>
Date: Tue, 07 Jan 2025 21:05:50 +0200
From: "Jarkko Sakkinen" <jarkko@...nel.org>
To: "Jarkko Sakkinen" <jarkko@...nel.org>, "David Gstir"
<david@...ma-star.at>, "sigma star Kernel Team"
<upstream+dcp@...ma-star.at>, "James Bottomley" <jejb@...ux.ibm.com>, "Mimi
Zohar" <zohar@...ux.ibm.com>, "David Howells" <dhowells@...hat.com>, "Paul
Moore" <paul@...l-moore.com>, "James Morris" <jmorris@...ei.org>, "Serge E.
Hallyn" <serge@...lyn.com>
Cc: "linux-integrity@...r.kernel.org" <linux-integrity@...r.kernel.org>,
"keyrings@...r.kernel.org" <keyrings@...r.kernel.org>,
"linux-security-module@...r.kernel.org"
<linux-security-module@...r.kernel.org>, "linux-kernel@...r.kernel.org"
<linux-kernel@...r.kernel.org>, <stable@...r.kernel.org>
Subject: Re: [PATCH] KEYS: trusted: dcp: fix improper sg use with
CONFIG_VMAP_STACK=y
On Tue Jan 7, 2025 at 9:05 PM EET, Jarkko Sakkinen wrote:
> On Tue Jan 7, 2025 at 2:56 PM EET, David Gstir wrote:
> >
> > > On 13.11.2024, at 22:27, David Gstir <david@...ma-star.at> wrote:
> > >
> > > With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted
> > > keys can crash during en- and decryption of the blob encryption key via
> > > the DCP crypto driver. This is caused by improperly using sg_init_one()
> > > with vmalloc'd stack buffers (plain_key_blob).
> > >
> > > Fix this by always using kmalloc() for buffers we give to the DCP crypto
> > > driver.
> > >
> > > Cc: stable@...r.kernel.org # v6.10+
> > > Fixes: 0e28bf61a5f9 ("KEYS: trusted: dcp: fix leak of blob encryption key")
> > > Signed-off-by: David Gstir <david@...ma-star.at>
> >
> > gentle ping.
>
> It's done, thanks for reminding, and don't hesitate to do it earlier
> if this ever happens again.
I.e. I applied and will put to my PR.
BR, Jarkko
Powered by blists - more mailing lists