Home
last modified time | relevance | path

Searched hist:"34 a08bec755670ea0490cb53bbc68058cafc69b6" (Results 1 – 1 of 1) sorted by relevance

/optee_os/core/tee/
H A Dtee_svc_cryp.c34a08bec755670ea0490cb53bbc68058cafc69b6 Tue Jun 25 09:47:09 UTC 2019 Joakim Bech <joakim.bech@linaro.org> cryp: prevent direct calls to update and final functions

With inconsistent or malformed data it has been possible to call
"update" and "final" crypto functions directly. Using a fuzzer tool [1]
we have seen that this results in asserts, i.e., a crash that
potentially could leak sensitive information.

By setting the state (initialized) in the crypto context (i.e., the
tee_cryp_state) at the end of all syscall_*_init functions and then add
a check of the state at the beginning of all update and final functions,
we prevent direct entrance to the "update" and "final" functions.

[1] https://github.com/MartijnB/optee_fuzzer

Fixes: OP-TEE-2019-0021

Signed-off-by: Joakim Bech <joakim.bech@linaro.org>
Reported-by: Martijn Bogaard <bogaard@riscure.com>
Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>