Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp584303ybt; Fri, 19 Jun 2020 08:42:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzTBKUpV6w5SHyJ84fUtqjBR2yXyLgc/y0th4GujSn65FwwnIK21XLuCpEMkzv0otylYF0r X-Received: by 2002:a17:906:3c4c:: with SMTP id i12mr4097373ejg.464.1592581359620; Fri, 19 Jun 2020 08:42:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592581359; cv=none; d=google.com; s=arc-20160816; b=zj54EUj/kp3OOL8EcU2lD2iH0i4fdhfWDDVRlc2QKIOpBOSIZhaclPr8wXLat+fz9y GfxphwsJjtIpX/d9d5r75YiJ7AQrnusXq0yuZUTLsWQD7MoqvWCtJF4O/JS4lZCB5fdd Dkg+P9L/hvRY7OjGLCOGCl/Nwm+44SB5MqgYFyRk6/sGdRlX1fY7+z8KbnqNRs9ev7kZ qZqE90xBC/J3QYF+D5Vjb4TnN9hqTwhmvykM6ydynb9Tygp896WqIP6YZkDyrISq9QqI sch0UWpKqVBRn1sRpanV5Oe7+1ab1GOe1n9DnrWsgoakFD3d5/68BXYXEUslDq6LtMhb xlTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zvg1uByHPF22W+wp47kYkRWKyHMkDp6DZghQaV3KemA=; b=mYQwKHt/8Og5v1mSrvehjJ/S+LeP3npsB5EUZDMbh/3NFhu3BGiCcDpgTnUmolXmbs JRkaIXW2VKWyNKHCa5Qwp80W/scpfwBxnb68MFHi2DAJRhvpvghYZv5qYQTVv/IQ8Ez7 1ui3p4+vOD+WTxInR1Q9w6FBNV5Cj1nfChRMqZmFdPUEk94VY9l66mG7ONyXfmA4bJsN FvaHj4o1l5vAeN9fXJ+J5Ttc0QF1n7g87wE2q6k5bnwPQL+hJtwOdn8+YCbWWm2W5f9A 4yf6ohxt/tUvPl6QgW5QvPfB9pV41QoEtBpO9dGT44FUzw22ZfDqzKnHxE3ukpsjIOs+ rq2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KI1nYC0z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jo13si4140334ejb.290.2020.06.19.08.42.16; Fri, 19 Jun 2020 08:42:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KI1nYC0z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404745AbgFSP35 (ORCPT + 99 others); Fri, 19 Jun 2020 11:29:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:33424 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390143AbgFSP3s (ORCPT ); Fri, 19 Jun 2020 11:29:48 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DB4CF21919; Fri, 19 Jun 2020 15:29:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592580587; bh=WHgTvjH7AEpgelzZyZAMrgUwBlctbZebQ7G3v7LkfUk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KI1nYC0zvyQNd/vZTJ9a3uzinLG48KDrFrxCgCJAmWy+XDSM6TMBWnRScox37emkr IEV8KdHoEf5YaEpNKO9W4XrJIRxZq9I1AdRvUCE18R41ZR0ciwcUxviY5MHjWK/ceE MLGLGgiLP0Ren9IR00Xvj9UybHTYL8DcvPXW1W4c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Roberto Sassu , Mimi Zohar Subject: [PATCH 5.7 279/376] evm: Fix possible memory leak in evm_calc_hmac_or_hash() Date: Fri, 19 Jun 2020 16:33:17 +0200 Message-Id: <20200619141723.542913035@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141710.350494719@linuxfoundation.org> References: <20200619141710.350494719@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Roberto Sassu commit 0c4395fb2aa77341269ea619c5419ea48171883f upstream. Don't immediately return if the signature is portable and security.ima is not present. Just set error so that memory allocated is freed before returning from evm_calc_hmac_or_hash(). Fixes: 50b977481fce9 ("EVM: Add support for portable signature format") Signed-off-by: Roberto Sassu Cc: stable@vger.kernel.org Signed-off-by: Mimi Zohar Signed-off-by: Greg Kroah-Hartman --- security/integrity/evm/evm_crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/security/integrity/evm/evm_crypto.c +++ b/security/integrity/evm/evm_crypto.c @@ -241,7 +241,7 @@ static int evm_calc_hmac_or_hash(struct /* Portable EVM signatures must include an IMA hash */ if (type == EVM_XATTR_PORTABLE_DIGSIG && !ima_present) - return -EPERM; + error = -EPERM; out: kfree(xattr_value); kfree(desc);