android_kernel_lge_bullhead/security/integrity
Ryan Ware 37510515d6 EVM: Use crypto_memneq() for digest comparisons
commit 613317bd212c585c20796c10afe5daaa95d4b0a1 upstream.

This patch fixes vulnerability CVE-2016-2085.  The problem exists
because the vm_verify_hmac() function includes a use of memcmp().
Unfortunately, this allows timing side channel attacks; specifically
a MAC forgery complexity drop from 2^128 to 2^12.  This patch changes
the memcmp() to the cryptographically safe crypto_memneq().

Reported-by: Xiaofei Rex Guo <xiaofei.rex.guo@intel.com>
Signed-off-by: Ryan Ware <ware@linux.intel.com>
Cc: stable@vger.kernel.org
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Cc: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Willy Tarreau <w@1wt.eu>
2017-06-08 00:46:46 +02:00
..
evm EVM: Use crypto_memneq() for digest comparisons 2017-06-08 00:46:46 +02:00
ima ima: introduce ima_kernel_read() 2014-06-26 15:12:37 -04:00
Kconfig ima: digital signature verification using asymmetric keys 2013-02-06 21:22:18 -05:00
Makefile ima: digital signature verification using asymmetric keys 2013-02-06 21:22:18 -05:00
digsig.c ima: digital signature verification using asymmetric keys 2013-02-06 21:22:18 -05:00
digsig_asymmetric.c ima: digital signature verification using asymmetric keys 2013-02-06 21:22:18 -05:00
iint.c ima: per hook cache integrity appraisal status 2013-01-22 16:10:36 -05:00
integrity.h ima: digital signature verification using asymmetric keys 2013-02-06 21:22:18 -05:00