Message ID | 065a1f03-a342-c47c-ea6f-b4cc84f869bb@virtuozzo.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
I have a patch from Eric Biggers that does the same thing that I've applied. https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/commit/?h=keys-fixes&id=7fc0786d956d9e59b68d282be9b156179846ea3d David -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/security/keys/keyctl.c b/security/keys/keyctl.c index ab0b337..70efb2d 100644 --- a/security/keys/keyctl.c +++ b/security/keys/keyctl.c @@ -771,7 +771,7 @@ long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen) if (ret == 0) goto can_read_key; if (ret != -EACCES) - goto error; + goto error2; /* we can't; see if it's searchable from this process's keyrings * - we automatically take account of the fact that it may be
key_put is lost if key_permission() returns non-EACCES error Fixes: 29db919063406 ("Keys: Add LSM hooks for key management [try #3]") Reported-by: Konstantin Khorenko <khorenko@virtuozzo.com> Signed-off-by: Vasily Averin <vvs@virtuozzo.com> --- security/keys/keyctl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)