Files
linux/crypto
Thorsten Blum 5b8ac617c8 crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
[ Upstream commit df0845cf447ae1556c3440b8b155de0926cbaa56 ]

Use check_add_overflow() to guard against potential integer overflows
when adding the binary blob lengths and the size of an asymmetric_key_id
structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a
possible buffer overflow when copying data from potentially malicious
X.509 certificate fields that can be arbitrarily large, such as ASN.1
INTEGER serial numbers, issuer names, etc.

Fixes: 7901c1a8ef ("KEYS: Implement binary asymmetric key ID handling")
Signed-off-by: Thorsten Blum <thorsten.blum@linux.dev>
Reviewed-by: Lukas Wunner <lukas@wunner.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2026-01-11 15:21:15 +01:00
..
2023-06-23 16:15:36 +08:00
2022-03-03 10:49:20 +12:00
2023-05-24 18:12:33 +08:00
2021-03-26 19:55:55 +11:00
2023-06-16 20:30:35 +08:00
2023-06-27 15:40:24 +08:00
2020-02-28 08:43:21 +08:00
2023-02-14 13:39:33 +08:00
2022-12-02 18:12:40 +08:00
2022-04-08 16:12:46 +08:00
2022-12-02 18:12:40 +08:00
2022-06-10 16:40:16 +08:00
2024-10-04 16:28:49 +02:00
2021-11-08 16:55:21 -08:00