Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp999120ybt; Fri, 19 Jun 2020 21:06:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyRU2rO/6rrSiJCPZfAEpxMRfhtjZy2sw0CUo7MRVmKqruGf2lebDp9HHquZP9KEQqxh3xH X-Received: by 2002:a05:6402:1752:: with SMTP id v18mr6585826edx.107.1592626001777; Fri, 19 Jun 2020 21:06:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592626001; cv=none; d=google.com; s=arc-20160816; b=XfSWKtjtZ8Y8u2CCOw7OyZ3RyJfg/8Q8QCadJ4iiRjf4Ga4HL3lWZyFHERN+y2Gcz9 AVExr/aNCHjlzdR1J9ZtySO6UaRg9aGxQvow7kY2mw0TCjEVxzu/XGjd53c4lHNtUoxS BvFxqJan9/ZrWnUfRftHB9ad1zCFLzi8ANfXq5AGHlBWOcwrzUsWG29grA+14LUY30Cy 7g5rZftty+YBmYlNpq/BCDBx9r+RIzII6QvfoE0cDzUXTli6PlgjUa74aLvU4fsuoN6S oC7BluBru8zRPxNSYZNkEAtG3UM0EwqnWRsylNpRaVicJ1itLNwRzgov1xjs89OEyTU6 saxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=equVBVHR9nAB3Dxu5+PnyrMUpfsY0bz16oVc3vHA8O8=; b=HzgssYj5uGBNkRNBk9h5rSSivI0McAFj193Sf9JSAwZz8PvjmPHbyEJQLNniuxT6yC r+mH7e/Q+7w+i4ZzGhGUHjOV/NNbFulTPTMhiGL4ek9Wc4XN0Dp4VaGWhwQw6r0yfVHj dyRxzODFAIH/zE5tJuCimucjn3cY9G49IHAJuIljBKGiyTtCuQLIboCsEJ/Deat01EnL SCE2bDyi5zpNz1NF6p/08wkOUpuR8wuFFKkbOrdpebNPI4VLJJkCQyJYQiUmHfs47rJ6 Nvbr2ReCzkDBEsYyCoBHnUPOGOUWeEFVrypXTBNz0dtpNINC/hGCSVf0p719KdwhXWji CfJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=loX73Dr5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a9si5459078edm.76.2020.06.19.21.06.20; Fri, 19 Jun 2020 21:06:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=loX73Dr5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394051AbgFSQnT (ORCPT + 99 others); Fri, 19 Jun 2020 12:43:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:34698 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388143AbgFSOne (ORCPT ); Fri, 19 Jun 2020 10:43:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 49DF720CC7; Fri, 19 Jun 2020 14:43:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592577814; bh=dKI2bBLdOxhTvg24W0G8MlZlOLhMnxcDkqMRMjlOq/4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=loX73Dr5Lyc5nL6fAIKK/aOjdZ4qHbLOpE4LwpPHSvXpDndreTlmQPdCLVuMcpIHS bNYeQvuWss6bVth8H+uUK2IpRINCNMkxibuKSA3myPBw/QglZ0Xd/hfLtQ27bTBlaY hBgocONQfPPWGvYT+VZiyDOVvRHEQUdNAtOq9gxU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Roberto Sassu , Mimi Zohar Subject: [PATCH 4.9 101/128] evm: Fix possible memory leak in evm_calc_hmac_or_hash() Date: Fri, 19 Jun 2020 16:33:15 +0200 Message-Id: <20200619141625.468965144@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141620.148019466@linuxfoundation.org> References: <20200619141620.148019466@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Roberto Sassu commit 0c4395fb2aa77341269ea619c5419ea48171883f upstream. Don't immediately return if the signature is portable and security.ima is not present. Just set error so that memory allocated is freed before returning from evm_calc_hmac_or_hash(). Fixes: 50b977481fce9 ("EVM: Add support for portable signature format") Signed-off-by: Roberto Sassu Cc: stable@vger.kernel.org Signed-off-by: Mimi Zohar Signed-off-by: Greg Kroah-Hartman --- security/integrity/evm/evm_crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/security/integrity/evm/evm_crypto.c +++ b/security/integrity/evm/evm_crypto.c @@ -240,7 +240,7 @@ static int evm_calc_hmac_or_hash(struct /* Portable EVM signatures must include an IMA hash */ if (type == EVM_XATTR_PORTABLE_DIGSIG && !ima_present) - return -EPERM; + error = -EPERM; out: kfree(xattr_value); kfree(desc);