Skip to content

Commit

Permalink
keys: Guard against null match function in keyring_search_aux()
Browse files Browse the repository at this point in the history
The "dead" key type has no match operation, and a search for keys of
this type can cause a null dereference in keyring_search_aux().
keyring_search() has a check for this, but request_keyring_and_link()
does not.  Move the check into keyring_search_aux(), covering both of
them.

This was fixed upstream by commit c06cfb0 ("KEYS: Remove
key_type::match in favour of overriding default by match_preparse"),
part of a series of large changes that are not suitable for
backporting.

CVE-2017-2647 / CVE-2017-6951

Reported-by: Igor Redko <redkoi@virtuozzo.com>
Reported-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
References: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2647
Reported-by: idl3r <idler1984@gmail.com>
References: https://www.spinics.net/lists/keyrings/msg01845.html
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Cc: David Howells <dhowells@redhat.com>
  • Loading branch information
Ben Hutchings committed Apr 4, 2017
1 parent 2147a17 commit e2b41f7
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions security/keys/keyring.c
Original file line number Diff line number Diff line change
Expand Up @@ -336,6 +336,9 @@ key_ref_t keyring_search_aux(key_ref_t keyring_ref,
if (keyring->type != &key_type_keyring)
goto error;

if (!match)
return ERR_PTR(-ENOKEY);

rcu_read_lock();

now = current_kernel_time();
Expand Down Expand Up @@ -484,9 +487,6 @@ key_ref_t keyring_search(key_ref_t keyring,
struct key_type *type,
const char *description)
{
if (!type->match)
return ERR_PTR(-ENOKEY);

return keyring_search_aux(keyring, current->cred,
type, description, type->match, false);
}
Expand Down

0 comments on commit e2b41f7

Please sign in to comment.