]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()
authorLukas Wunner <lukas@wunner.de>
Sun, 2 Feb 2025 19:00:52 +0000 (20:00 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 17 Jul 2025 16:35:22 +0000 (18:35 +0200)
commitf02f0218be412cff1c844addf58e002071be298b
tree31d1ca002510df0ae0d3e90a779305f9fa8563f0
parent97c355989928a5f60b228ef5266c1be67a46cdf9
crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()

commit b16510a530d1e6ab9683f04f8fb34f2e0f538275 upstream.

Herbert notes that DIV_ROUND_UP() may overflow unnecessarily if an ecdsa
implementation's ->key_size() callback returns an unusually large value.
Herbert instead suggests (for a division by 8):

  X / 8 + !!(X & 7)

Based on this formula, introduce a generic DIV_ROUND_UP_POW2() macro and
use it in lieu of DIV_ROUND_UP() for ->key_size() return values.

Additionally, use the macro in ecc_digits_from_bytes(), whose "nbytes"
parameter is a ->key_size() return value in some instances, or a
user-specified ASN.1 length in the case of ecdsa_get_signature_rs().

Link: https://lore.kernel.org/r/Z3iElsILmoSu6FuC@gondor.apana.org.au/
Signed-off-by: Lukas Wunner <lukas@wunner.de>
Signed-off-by: Lukas Wunner <lukas@wunner.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
crypto/ecc.c
include/linux/math.h