aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2017-04-18 10:31:07 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2017-04-27 03:10:37 -0400
commita5c6e0a76817a3751f58d761aaff7c0b0c4001ff (patch)
tree39e12c27eac0069ae1fc832c7ea6bffd57e67ab7
parent2f5e58ec793f56f9ac1c6736b4638a4b81d6f099 (diff)
KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings
commit ee8f844e3c5a73b999edf733df1c529d6503ec2f upstream. This fixes CVE-2016-9604. Keyrings whose name begin with a '.' are special internal keyrings and so userspace isn't allowed to create keyrings by this name to prevent shadowing. However, the patch that added the guard didn't fix KEYCTL_JOIN_SESSION_KEYRING. Not only can that create dot-named keyrings, it can also subscribe to them as a session keyring if they grant SEARCH permission to the user. This, for example, allows a root process to set .builtin_trusted_keys as its session keyring, at which point it has full access because now the possessor permissions are added. This permits root to add extra public keys, thereby bypassing module verification. This also affects kexec and IMA. This can be tested by (as root): keyctl session .builtin_trusted_keys keyctl add user a a @s keyctl list @s which on my test box gives me: 2 keys in keyring: 180010936: ---lswrv 0 0 asymmetric: Build time autogenerated kernel key: ae3d4a31b82daa8e1a75b49dc2bba949fd992a05 801382539: --alswrv 0 0 user: a Fix this by rejecting names beginning with a '.' in the keyctl. Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Mimi Zohar <zohar@linux.vnet.ibm.com> cc: linux-ima-devel@lists.sourceforge.net Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--security/keys/keyctl.c9
1 files changed, 7 insertions, 2 deletions
diff --git a/security/keys/keyctl.c b/security/keys/keyctl.c
index d580ad06b792..7cdd5b550693 100644
--- a/security/keys/keyctl.c
+++ b/security/keys/keyctl.c
@@ -271,7 +271,8 @@ error:
271 * Create and join an anonymous session keyring or join a named session 271 * Create and join an anonymous session keyring or join a named session
272 * keyring, creating it if necessary. A named session keyring must have Search 272 * keyring, creating it if necessary. A named session keyring must have Search
273 * permission for it to be joined. Session keyrings without this permit will 273 * permission for it to be joined. Session keyrings without this permit will
274 * be skipped over. 274 * be skipped over. It is not permitted for userspace to create or join
275 * keyrings whose name begin with a dot.
275 * 276 *
276 * If successful, the ID of the joined session keyring will be returned. 277 * If successful, the ID of the joined session keyring will be returned.
277 */ 278 */
@@ -288,12 +289,16 @@ long keyctl_join_session_keyring(const char __user *_name)
288 ret = PTR_ERR(name); 289 ret = PTR_ERR(name);
289 goto error; 290 goto error;
290 } 291 }
292
293 ret = -EPERM;
294 if (name[0] == '.')
295 goto error_name;
291 } 296 }
292 297
293 /* join the session */ 298 /* join the session */
294 ret = join_session_keyring(name); 299 ret = join_session_keyring(name);
300error_name:
295 kfree(name); 301 kfree(name);
296
297error: 302error:
298 return ret; 303 return ret;
299} 304}