It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dnsresolver' in RHEL-7 or '.builtintrusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9604.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11-rc7"
}
]
}
]