linux/fs/verity
Eric Biggers 5294144b6a fsverity: skip PKCS#7 parser when keyring is empty
commit 919dc32095 upstream.

If an fsverity builtin signature is given for a file but the
".fs-verity" keyring is empty, there's no real reason to run the PKCS#7
parser.  Skip this to avoid the PKCS#7 attack surface when builtin
signature support is configured into the kernel but is not being used.

This is a hardening improvement, not a fix per se, but I've added
Fixes and Cc stable to get it out to more users.

Fixes: 432434c9f8 ("fs-verity: support builtin file signatures")
Cc: stable@vger.kernel.org
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Link: https://lore.kernel.org/r/20230820173237.2579-1-ebiggers@kernel.org
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-09-19 12:22:52 +02:00
..
enable.c fsverity: don't drop pagecache at end of FS_IOC_ENABLE_VERITY 2023-04-05 11:24:51 +02:00
fsverity_private.h fs-verity: don't pass whole descriptor to fsverity_verify_signature() 2021-02-07 14:51:09 -08:00
hash_algs.c
init.c
Kconfig fsverity: relax build time dependency on CRYPTO_SHA256 2021-04-22 17:31:32 +10:00
Makefile fs-verity: add FS_IOC_READ_VERITY_METADATA ioctl 2021-02-07 14:51:11 -08:00
measure.c fs-verity: rename "file measurement" to "file digest" 2020-11-16 11:40:12 -08:00
open.c fs-verity: fix signed integer overflow with i_size near S64_MAX 2021-09-22 10:56:34 -07:00
read_metadata.c fs-verity: support reading signature with ioctl 2021-02-07 14:51:19 -08:00
signature.c fsverity: skip PKCS#7 parser when keyring is empty 2023-09-19 12:22:52 +02:00
verify.c fsverity: Remove WQ_UNBOUND from fsverity read workqueue 2023-03-30 12:47:56 +02:00