From: Eric Biggers Date: Thu, 21 Sep 2017 20:57:41 +0000 (-0700) Subject: KEYS: don't revoke uninstantiated key in request_key_auth_new() X-Git-Url: http://git.openpandora.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=9e9039264036f9d1213920150f7db680c385aaf8;p=pandora-kernel.git KEYS: don't revoke uninstantiated key in request_key_auth_new() commit f7b48cf08fa63a68b59c2894806ee478216d7f91 upstream. If key_instantiate_and_link() were to fail (which fortunately isn't possible currently), the call to key_revoke(authkey) would crash with a NULL pointer dereference in request_key_auth_revoke() because the key has not yet been instantiated. Fix this by removing the call to key_revoke(). key_put() is sufficient, as it's not possible for an uninstantiated authkey to have been used for anything yet. Fixes: b5f545c880a2 ("[PATCH] keys: Permit running process to instantiate keys") Signed-off-by: Eric Biggers Signed-off-by: David Howells Signed-off-by: Ben Hutchings --- diff --git a/security/keys/request_key_auth.c b/security/keys/request_key_auth.c index b21b981dd414..40a06a30a9cf 100644 --- a/security/keys/request_key_auth.c +++ b/security/keys/request_key_auth.c @@ -206,7 +206,6 @@ struct key *request_key_auth_new(struct key *target, const void *callout_info, return authkey; error_put_authkey: - key_revoke(authkey); key_put(authkey); error_free_rka: free_request_key_auth(rka);