Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 530283 - (CVE-2009-3624) CVE-2009-3624 kernel: get_instantiation_keyring() should inc the keyring refcount in all cases
CVE-2009-3624 kernel: get_instantiation_keyring() should inc the keyring refc...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20091015,repo...
: Security
Depends On: 531665
Blocks:
  Show dependency treegraph
 
Reported: 2009-10-22 02:49 EDT by Eugene Teo (Security Response)
Modified: 2010-12-21 14:22 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-12-21 14:22:49 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Eugene Teo (Security Response) 2009-10-22 02:49:48 EDT
Quoting from the upstream commit:
"The destination keyring specified to request_key() and co. is made available to the process that instantiates the key (the slave process started by /sbin/request-key typically).  This is passed in the request_key_auth struct as the dest_keyring member.

keyctl_instantiate_key and keyctl_negate_key() call get_instantiation_keyring() to get the keyring to attach the newly constructed key to at the end of instantiation.  This may be given a specific keyring into which a link will be made later, or it may be asked to find the keyring passed to request_key().  In the former case, it returns a keyring with the refcount incremented by lookup_user_key(); in the latter case, it returns the keyring from the request_key_auth struct - and does _not_ increment the refcount.

The latter case will eventually result in an oops when the keyring prematurely runs out of references and gets destroyed.  The effect may take some time to show up as the key is destroyed lazily.

To fix this, the keyring returned by get_instantiation_keyring() must always have its refcount incremented, no matter where it comes from."

This was introduced in upstream commit 8bbf4976 (v2.6.29-rc1).

References:
http://git.kernel.org/linus/21279cfa107af07ef985539ac0de2152b9cba5f5
http://twitter.com/spendergrsec/status/4916661870
Comment 2 Fedora Update System 2009-11-05 00:05:48 EST
kernel-2.6.30.9-96.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/kernel-2.6.30.9-96.fc11
Comment 3 Fedora Update System 2009-11-05 19:03:01 EST
kernel-2.6.30.9-96.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.