android_kernel_samsung_msm8976/security/keys
Eric Biggers d549e8b144 KEYS: put keyring if install_session_keyring_to_cred() fails
[ Upstream commit d636bd9f12a66ea3775c9fabbf3f8e118253467a ]

In join_session_keyring(), if install_session_keyring_to_cred() were to
fail, we would leak the keyring reference, just like in the bug fixed by
commit 23567fd052a9 ("KEYS: Fix keyring ref leak in
join_session_keyring()").  Fortunately this cannot happen currently, but
we really should be more careful.  Do this by adding and using a new
error label at which the keyring reference is dropped.

Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2019-07-27 21:52:38 +02:00
..
encrypted-keys KEYS: Fix an error code in request_master_key() 2019-07-27 21:44:37 +02:00
Kconfig KEYS: Move the key config into security/keys/Kconfig 2012-05-11 10:56:56 +01:00
Makefile KEYS: Reorganise keys Makefile 2012-05-11 10:56:56 +01:00
compat.c Fix: compat_rw_copy_check_uvector() misuse in aio, readv, writev, and security keys 2013-03-12 11:05:45 -07:00
gc.c KEYS: Change the name of the dead type to ".dead" to prevent user access 2017-05-01 14:22:35 +00:00
internal.h KEYS: prevent creating a different user's keyrings 2019-07-27 21:44:21 +02:00
key.c KEYS: don't let add_key() update an uninstantiated key 2019-07-27 21:45:15 +02:00
keyctl.c KEYS: fix key refcount leak in keyctl_read_key() 2019-07-27 21:45:32 +02:00
keyring.c KEYS: prevent creating a different user's keyrings 2019-07-27 21:44:21 +02:00
permission.c userns: Convert security/keys to the new userns infrastructure 2012-09-13 18:28:02 -07:00
proc.c Import latest Samsung release 2017-04-18 03:43:52 +02:00
process_keys.c KEYS: put keyring if install_session_keyring_to_cred() fails 2019-07-27 21:52:38 +02:00
request_key.c KEYS: add missing permission check for request_key() destination 2019-07-27 21:45:22 +02:00
request_key_auth.c KEYS: don't revoke uninstantiated key in request_key_auth_new() 2019-07-27 21:45:31 +02:00
sysctl.c sysctl: Drop & in front of every proc_handler. 2009-11-18 08:37:40 -08:00
trusted.c KEYS: trusted: fix writing past end of buffer in trusted_read() 2019-07-27 21:45:42 +02:00
trusted.h trusted-keys: rename trusted_defined files to trusted 2011-01-24 10:14:22 +11:00
user_defined.c KEYS: Fix handling of stored error in a negatively instantiated user key 2017-04-22 23:02:53 +02:00