Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding detection of out-of-bound pre-bound memory read to AES-XTS tests. #2286

Merged
merged 2 commits into from
Mar 28, 2025

Conversation

nebeid
Copy link
Contributor

@nebeid nebeid commented Mar 21, 2025

Issues:

Addresses #V1681992550

Description of changes:

This change hardens the tests introduced in #2227 Fix out-of-bound (OOB) input read in AES-XTS Decrypt in AVX-512 implementation.
It adds a memory page preceding the input and output buffer that is protected against read and write in order to detect any under-read, in which case a segfault occurs.

The suspected code that can potentially cause a "pre-bound" OOB is the cipher-stealing section in Encrypt
crypto/fipsmodule/aes/asm/aesni-xts-avx512.pl#L1809-L1810
and decrypt
crypto/fipsmodule/aes/asm/aesni-xts-avx512.pl#2572-L2573.

Testing:

The efficacy of the added test was shown by changing the decrypt cipher-stealing code for example to:

--- a/crypto/fipsmodule/aes/asm/aesni-xts-avx512.pl
+++ b/crypto/fipsmodule/aes/asm/aesni-xts-avx512.pl
@@ -2569,7 +2569,7 @@ ___
   vpshufb       %xmm10,%xmm8,%xmm8
 
 
-  vmovdqu       -0x10($input,$length,1),%xmm3
+  vmovdqu       -0x12($input,$length,1),%xmm3
   vmovdqu       %xmm8,-0x10($output,$length,1)

With this change, a segmentation fault occurs in the test vector of input length 17 bytes (1 AES block + 1 byte); which is the smallest test vector that requires cipher stealing. At the changed line:

  • $input points at byte 16, i.e. past the first block
  • $length = 1, after l.2429
  • the read index with the diff change is $input + $length - 18 = $input -17, which points at byte "-1", i.e. the byte right before byte 0 of the input, i.e. an underread, this causes a segfault at this vector.
  • Other larger changes, e.g. -0x20, will have the same result.

Another test changes the location of the written output

 
   .L_done_${rndsuffix}:
   # store last ciphertext value
-  vmovdqu       %xmm8,-0x10($output)
+  vmovdqu       %xmm8,-0x11($output)
 ___
   }
  • This test caused a segfault with the smallest input of 1 block = 16 bytes

Similar tests in the encrypt path gave the same result of segfaulting when trying to read before the input beginning.

Call-outs:

N/A

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.

@nebeid nebeid requested a review from a team as a code owner March 21, 2025 16:55
@codecov-commenter
Copy link

codecov-commenter commented Mar 21, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 79.04%. Comparing base (652f7a9) to head (bae956c).
Report is 3 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2286      +/-   ##
==========================================
+ Coverage   79.02%   79.04%   +0.01%     
==========================================
  Files         614      614              
  Lines      106934   106953      +19     
  Branches    15145    15146       +1     
==========================================
+ Hits        84504    84537      +33     
+ Misses      21777    21762      -15     
- Partials      653      654       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@nebeid nebeid requested review from skmcgrail and justsmth March 24, 2025 13:29
@nebeid nebeid changed the title Detection of memory underread is added to AES-XTS tests. Adding detection of out-of-bound memory read before the input and output buffers beginnig AES-XTS tests. Mar 24, 2025
@nebeid nebeid changed the title Adding detection of out-of-bound memory read before the input and output buffers beginnig AES-XTS tests. Adding detection of out-of-bound pre-bound memory read to AES-XTS tests. Mar 24, 2025
@nebeid nebeid merged commit a39439b into aws:main Mar 28, 2025
106 of 108 checks passed
@skmcgrail skmcgrail mentioned this pull request Mar 28, 2025
skmcgrail added a commit that referenced this pull request Mar 28, 2025
## What's Changed
* Revert "Allow constructed strings in BER parsing (#2015)" by
@samuel40791765 in #2278
* Add the rehash utility to the openssl CLI tool by @smittals2 in
#2258
* Documentation on service indicator by @justsmth in
#2281
* Update patches in Ruby CI by @samuel40791765 in
#2233
* Reject DSA trailing garbage in EVP layer, add test cases by @skmcgrail
in #2289
* Add support for verifying PKCS7 signed attributes by @samuel40791765
in #2264
* Add support for more SSL BIO functions by @samuel40791765 in
#2273
* Wire-up rust-openssl into GitHub CI (for the time being) by @skmcgrail
in #2291
* Adding detection of out-of-bound pre-bound memory read to AES-XTS
tests. by @nebeid in #2286
* AES: Add function pointer trampoline to avoid delocator issue by
@hanno-becker in #2294
* Bump mysql CI to 9.2.0 by @samuel40791765 in
#2161
* Cherrypick hardening DSA param checks from BoringSSL by @smittals2 in
#2293

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants