diff options
author | Mark O'Donovan <shiftee@posteo.net> | 2023-08-04 09:32:18 +0000 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2023-09-23 11:14:20 +0200 |
commit | 12ac013ad7ff0df066451e825801d805095b3776 (patch) | |
tree | 76247c645269da4026b000b7f469086a744de178 | |
parent | 82dca1a2ddd6ccc810b3b56ada5056a3c81a4b11 (diff) | |
download | linux-stable-12ac013ad7ff0df066451e825801d805095b3776.tar.gz linux-stable-12ac013ad7ff0df066451e825801d805095b3776.tar.bz2 linux-stable-12ac013ad7ff0df066451e825801d805095b3776.zip |
crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
[ Upstream commit 9e47a758b70167c9301d2b44d2569f86c7796f2d ]
During NVMeTCP Authentication a controller can trigger a kernel
oops by specifying the 8192 bit Diffie Hellman group and passing
a correctly sized, but zeroed Diffie Hellamn value.
mpi_cmp_ui() was detecting this if the second parameter was 0,
but 1 is passed from dh_is_pubkey_valid(). This causes the null
pointer u->d to be dereferenced towards the end of mpi_cmp_ui()
Signed-off-by: Mark O'Donovan <shiftee@posteo.net>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <sashal@kernel.org>
-rw-r--r-- | lib/mpi/mpi-cmp.c | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/lib/mpi/mpi-cmp.c b/lib/mpi/mpi-cmp.c index c4cfa3ff0581..0835b6213235 100644 --- a/lib/mpi/mpi-cmp.c +++ b/lib/mpi/mpi-cmp.c @@ -25,8 +25,12 @@ int mpi_cmp_ui(MPI u, unsigned long v) mpi_limb_t limb = v; mpi_normalize(u); - if (!u->nlimbs && !limb) - return 0; + if (u->nlimbs == 0) { + if (v == 0) + return 0; + else + return -1; + } if (u->sign) return -1; if (u->nlimbs > 1) |