c9f838d104
This fixes CVE-2017-7472.
Running the following program as an unprivileged user exhausts kernel
memory by leaking thread keyrings:
#include <keyutils.h>
int main()
{
for (;;)
keyctl_set_reqkey_keyring(KEY_REQKEY_DEFL_THREAD_KEYRING);
}
Fix it by only creating a new thread keyring if there wasn't one before.
To make things more consistent, make install_thread_keyring_to_cred()
and install_process_keyring_to_cred() both return 0 if the corresponding
keyring is already present.
Fixes:
|
||
---|---|---|
.. | ||
encrypted-keys | ||
Kconfig | ||
Makefile | ||
big_key.c | ||
compat.c | ||
dh.c | ||
gc.c | ||
internal.h | ||
key.c | ||
keyctl.c | ||
keyring.c | ||
permission.c | ||
persistent.c | ||
proc.c | ||
process_keys.c | ||
request_key.c | ||
request_key_auth.c | ||
sysctl.c | ||
trusted.c | ||
trusted.h | ||
user_defined.c |