Bug 1528335 (CVE-2017-17807) - CVE-2017-17807 kernel: Missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission
Summary: CVE-2017-17807 kernel: Missing permissions check for request_key() destinatio...
Keywords:
Status: NEW
Alias: CVE-2017-17807
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20171208,repor...
Depends On: 1543261 1543262 1543263 1543264 1543265 1528337 1528346
Blocks: 1528348
TreeView+ depends on / blocked
 
Reported: 2017-12-21 15:10 UTC by Adam Mariš
Modified: 2019-05-16 09:46 UTC (History)
46 users (show)

Fixed In Version: kernel 14.4.6
Doc Type: If docs needed, set a value
Doc Text:
The KEYS subsystem in the Linux kernel omitted an access-control check when writing a key to the current task's default keyring, allowing a local user to bypass security checks to the keyring. This compromises the validity of the keyring for those who rely on it.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Adam Mariš 2017-12-21 15:10:40 UTC
The KEYS subsystem in the Linux kernel omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.

Upstream patch:

https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b

Comment 1 Adam Mariš 2017-12-21 15:13:15 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1528337]

Comment 3 Justin M. Forbes 2018-01-29 17:57:03 UTC
This was fixed for Fedora with the 4.14.6 stable updates.

Comment 10 Vladis Dronov 2018-02-22 13:47:50 UTC
Statement:

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.


Note You need to log in before you can comment on or make changes to this bug.