Received: by 10.223.185.116 with SMTP id b49csp2120356wrg; Thu, 22 Feb 2018 08:26:26 -0800 (PST) X-Google-Smtp-Source: AH8x2276b+eyP4QBe6cCQnL5ttrO5E+PhAySp2Iy7bX3/p+SVPkJ8/sObxrP9VEf4QX32JydN954 X-Received: by 10.98.245.131 with SMTP id b3mr7484521pfm.20.1519316785999; Thu, 22 Feb 2018 08:26:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519316785; cv=none; d=google.com; s=arc-20160816; b=seIVj7NVKl/XkSqnySV1eB2aYXQ4gbd4i0LyhQ6/fFa0jlB/0MCcueLWrxg4M3xxrK ldkpvZG93glTE2jneb3EZRGTmd3TEBWc8G5MdOB8Xb6L9VQsCvR3ebVFK3u9Qh7M35CB ptyml5CUwqAyotJsv6ypqniBvQfv9YqU5J/coTlyb/gqTKE/xkpjeybvgk7SN4/POGrU qCwCOqkJsIBuzmvphYtHL/RCfhDhH8YGIn/k4VkDdgUlMS35sJF6WLrBvWh+sicEctkq 0PC9ij03vPRjIKNTsnLNSYRB7qcfL7CYsuhz85iB4sMAjG7WSJSfsJwgFOw+KCyBBtb+ emDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:date:subject:cc:to:from :arc-authentication-results; bh=fzDpBZUnfDwGAd4x8ePw8uAK0E3hZkhNdB/rb5CduS8=; b=ItBpK8zBdy+Y00MKtgLMEKOGCptYlzqgw5039u8OcF/CwX4I3EEzRvqfyqlYSQeFzo N1BNVSyp6vy0huLjDVezOXWZ8i8Jds7JjKtktolZ8mGHHQwK/W9EEcVBASy8LS10YjKN 1pE/S7k4w7vo1ukyUncllDa6IGnRXasvdEDmUQcmy8hvHKYaBKVMhJbDMkeSjyU0bkSe v+yRqdx26cgkloTSBs7/rFXaFynK0v7+JM+gP2Xd1pb03Mn8Dsj3yaWjSQiHAEb3ZPXK 9Bf34Ne+EfJLHrdIwOoiOle+rJvUOPGVJB4Nsv9oiWKBIGke4YVpGYV+LlQWwY+2HeB0 yelw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t7si258956pfh.290.2018.02.22.08.26.11; Thu, 22 Feb 2018 08:26:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933306AbeBVQUb (ORCPT + 99 others); Thu, 22 Feb 2018 11:20:31 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:53566 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933134AbeBVQU3 (ORCPT ); Thu, 22 Feb 2018 11:20:29 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 04D3811E9D0; Thu, 22 Feb 2018 16:20:29 +0000 (UTC) Received: from warthog.procyon.org.uk.com (ovpn-120-250.rdu2.redhat.com [10.10.120.250]) by smtp.corp.redhat.com (Postfix) with ESMTP id 31E41213AEE2; Thu, 22 Feb 2018 16:20:28 +0000 (UTC) From: David Howells To: jmorris@namei.org Cc: dhowells@redhat.com, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: [RFC][PATCH 0/6] KEYS: Fixes Date: Thu, 22 Feb 2018 16:20:27 +0000 Message-Id: <151931642737.27713.5082532296556836948.stgit@warthog.procyon.org.uk> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Thu, 22 Feb 2018 16:20:29 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Thu, 22 Feb 2018 16:20:29 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dhowells@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, Here's a collection of fixes for Linux keyrings, mostly thanks to Eric Biggers, if you could pass them along to Linus. They include: (1) Fix some PKCS#7 verification issues. (2) Fix handling of unsupported crypto in X.509. (3) Fix too-large allocation in big_key. The patches can be found here also: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/tag/?h=keys-fixes-20180222 And also on the keys-fixes branch. David --- David Howells (1): KEYS: Use individual pages in big_key for crypto buffers Eric Biggers (5): PKCS#7: fix certificate chain verification PKCS#7: fix certificate blacklisting PKCS#7: fix direct verification of SignerInfo signature X.509: fix BUG_ON() when hash algorithm is unsupported X.509: fix NULL dereference when restricting key with unsupported_sig crypto/asymmetric_keys/pkcs7_trust.c | 1 crypto/asymmetric_keys/pkcs7_verify.c | 12 ++-- crypto/asymmetric_keys/public_key.c | 4 + crypto/asymmetric_keys/restrict.c | 21 ++++-- security/keys/big_key.c | 110 ++++++++++++++++++++++++++------- 5 files changed, 111 insertions(+), 37 deletions(-)