New issue
Advanced search Search tips

Issue 883266 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Sep 12
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 3
Type: Bug-Security



Sign in to add a comment

CVE-2016-9604 CrOS: Vulnerability reported in Linux kernel

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Sep 12

Issue description

VOMIT (go/vomit) has received an external vulnerability report for the Linux kernel. 

Advisory: CVE-2016-9604
  Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2016-9604
  CVSS severity score: 2.1/10.0
  Description:

It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.



This bug was filed by http://go/vomit
Please contact us at vomit-team@google.com if you need any assistance.

 
Cc: groeck@chromium.org wonderfly@google.com
Labels: Security_Severity-Low Security_Impact-Stable Pri-3
Owner: zsm@chromium.org
Status: WontFix (was: Untriaged)
Upstream fix is ee8f844e3 ("KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings"). This is present in v4.14, v4.4, v3.18. Marking as WontFix for older kernels due to low severity.
Cc: mikewu@google.com

Sign in to add a comment