From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751696AbdFHNr2 (ORCPT ); Thu, 8 Jun 2017 09:47:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:49732 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751132AbdFHNr0 (ORCPT ); Thu, 8 Jun 2017 09:47:26 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 6000E8123A Authentication-Results: ext-mx01.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx01.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=dhowells@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 6000E8123A Subject: [PATCH 00/23] KEYS: Fixes From: David Howells To: jmorris@namei.org Cc: dhowells@redhat.com, linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org Date: Thu, 08 Jun 2017 14:47:19 +0100 Message-ID: <149692963884.11452.7673998701432248814.stgit@warthog.procyon.org.uk> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 08 Jun 2017 13:47:21 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, Here are a bunch of fixes for Linux keyrings, including: (*) Fixing up the refcount handling now that key structs use the refcount_t type and the refcount_t ops don't allow a 0->1 transition. (*) Fix a potential NULL deref after error in x509_cert_parse(). (*) Don't put data for the crypto algorithms to use on the stack. (*) Fix the handling of a null payload being passed to add_key(). (*) Fix incorrect cleanup an uninitialised key_preparsed_payload in key_update(). (*) Explicit sanitisation of potentially secure data before freeing. (*) Fixes for the Diffie-Helman code. Note that I rebased the patches on top of -rc4 to avoid problems with a tty locking bug encountered whilst trying to test it. The patches can be found here also: http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-fixes Tagged thusly: git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git keys-fixes-20170608 David --- Bilal Amarni (1): security/keys: add CONFIG_KEYS_COMPAT to Kconfig Dan Carpenter (1): X.509: Fix error code in x509_cert_parse() Davidlohr Bueso (1): security: use READ_ONCE instead of deprecated ACCESS_ONCE Eric Biggers (16): KEYS: put keyring if install_session_keyring_to_cred() fails KEYS: encrypted: avoid encrypting/decrypting stack buffers KEYS: encrypted: fix buffer overread in valid_master_desc() KEYS: encrypted: fix race causing incorrect HMAC calculations KEYS: encrypted: use constant-time HMAC comparison KEYS: fix dereferencing NULL payload with nonzero length KEYS: fix freeing uninitialized memory in key_update() KEYS: sanitize add_key() and keyctl() key payloads KEYS: user_defined: sanitize key payloads KEYS: encrypted: sanitize all key material KEYS: trusted: sanitize all key material KEYS: sanitize key structs before freeing KEYS: DH: forbid using digest_null as the KDF hash KEYS: DH: don't feed uninitialized "otherinfo" into KDF KEYS: DH: ensure the KDF counter is properly aligned KEYS: DH: add __user annotations to keyctl_kdf_params Loganaden Velvindron (1): crypto : asymmetric_keys : verify_pefile:zero memory content before freeing Mark Rutland (1): KEYS: fix refcount_inc() on zero Markus Elfring (1): KEYS: Delete an error message for a failed memory allocation in get_derived_key() Mat Martineau (1): KEYS: Convert KEYCTL_DH_COMPUTE to use the crypto KPP API arch/arm64/Kconfig | 4 arch/powerpc/Kconfig | 5 arch/s390/Kconfig | 3 arch/sparc/Kconfig | 3 arch/x86/Kconfig | 4 crypto/asymmetric_keys/verify_pefile.c | 4 crypto/asymmetric_keys/x509_cert_parser.c | 1 include/linux/key.h | 1 include/uapi/linux/keyctl.h | 4 security/keys/Kconfig | 6 - security/keys/dh.c | 300 ++++++++++++++++++----------- security/keys/encrypted-keys/encrypted.c | 204 +++++++------------- security/keys/gc.c | 4 security/keys/key.c | 16 +- security/keys/keyctl.c | 16 +- security/keys/keyring.c | 12 + security/keys/process_keys.c | 7 - security/keys/trusted.c | 50 ++--- security/keys/user_defined.c | 16 +- 19 files changed, 330 insertions(+), 330 deletions(-)