[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: kernel: crypto: ghash: null pointer
From:       Huzaifa Sidhpurwala <huzaifas () redhat ! com>
Date:       2011-10-27 9:42:24
Message-ID: 4EA924B0.5080208 () redhat ! com
[Download RAW message or body]

On 10/27/2011 02:40 PM, Eugene Teo wrote:
> Description from the commit: The ghash_update function passes a pointer
> to gf128mul_4k_lle which will be NULL if ghash_setkey is not called or
> if the most recent call to ghash_setkey failed to allocate memory.  This
> causes an oops.  Fix this up by returning an error code in the null case.
>
> This is trivially triggered from unprivileged userspace through the
> AF_ALG interface by simply writing to the socket without setting a key.
>
> The ghash_final function has a similar issue, but triggering it requires
> a memory allocation failure in ghash_setkey _after_ at least one
> successful call to ghash_update.
>
> References:
> https://bugzilla.redhat.com/show_bug.cgi?id=749475
> https://secunia.com/advisories/46584/
> https://bugs.gentoo.org/show_bug.cgi?id=388581
>
> Upstream commit:
> http://git.kernel.org/linus/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c
>
> +config CRYPTO_GHASH
> was added in commit 2cdc6899, v2.6.32-rc1.
>

This has been assigned CVE-2011-4081


-- 
Huzaifa Sidhpurwala / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic