Received: by 2002:a05:6a10:9afc:0:0:0:0 with SMTP id t28csp712699pxm; Thu, 3 Mar 2022 03:10:32 -0800 (PST) X-Google-Smtp-Source: ABdhPJzFaf8IU+wo/dRWgWccjC/BMppgbdA3sGuwE8ixWSEA+eP3fBsE9kKm5c54CopwcSxVGppV X-Received: by 2002:a17:907:8687:b0:6d7:8f6a:3c0e with SMTP id qa7-20020a170907868700b006d78f6a3c0emr7548367ejc.500.1646305832078; Thu, 03 Mar 2022 03:10:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646305832; cv=none; d=google.com; s=arc-20160816; b=l6LG3jJlDsNIE4hUV6bq5cTkBmE0iHv8j2IQE42RPAyTLRACHn5o1yUtIwrCPioG1n YylptlEGAkGUR3G3rKacAEgiNA7jh0MmQDsTpe4q+Hnf3q/pfLxqKuhWhDYsAYdC1/VD Ttlk/ToFgYYPIow2sxWQiTFHMJwJNZaqZ9w0zJVSLdQs5qcMLdcx3Ud0aP97OTT47sR2 qnrFGSGZBBfh0FMUU9od+jbHr/WEsTXAPT1D5SvV68tGN4HCdFXj0OG6l4qIZpUPQmL1 nWsbwpYLajbrUcftKJHd2dWyb4yNedX9TMvZKSGr+kAjaBU9jzde77pYkvFpLrSNWwz4 8xzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:mime-version:content-transfer-encoding :content-language:accept-language:message-id:date:thread-index :thread-topic:subject:cc:from:dkim-filter; bh=GTQQ84DG0LBfQ1n1aOzmliUvz1quel1O0FynE5SfRH8=; b=Pk+kEQxx/Hg4tg7KNq6XUcutcQGOqIg/U5FyYW4UvA1q0ZoQt0+p2KYANlhfgpuSMj x/O07Q8nC5SC6klNx3IsJCscfuREQH9rlwQ1rCWOYgY+r7ISHwJt7BmLcNvQVtfpNjdx /ZFxG/yZxnVR+EOKDXubkTp5fbY8DYT8SWBeuwWFD/ytjII4RvWprq1YhSkRUCpFtpEz d8Ew3q+tt9Z/8RK3/iOYXOcqjm3x+X9m6oH2ncwnuL9UepW+GhRLjI4QFuxcStazZ+BP cB2H0+YE89wG11XtEpACU5C5KeifBnoL9nQ7NY/XkHaY/Zulsg2QVjdi6qqqUwt390ws XTYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cr19-20020a170906d55300b006d79f572b5dsi1101896ejc.171.2022.03.03.03.10.07; Thu, 03 Mar 2022 03:10:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231211AbiCCIQT convert rfc822-to-8bit (ORCPT + 99 others); Thu, 3 Mar 2022 03:16:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41306 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229662AbiCCIQR (ORCPT ); Thu, 3 Mar 2022 03:16:17 -0500 Received: from mxout01.lancloud.ru (mxout01.lancloud.ru [45.84.86.81]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1DC6A171292; Thu, 3 Mar 2022 00:15:30 -0800 (PST) Received: from LanCloud DKIM-Filter: OpenDKIM Filter v2.11.0 mxout01.lancloud.ru 3106A20D5C35 Received: from LanCloud Received: from LanCloud Received: from LanCloud Received: from LanCloud From: Denis Glazkov CC: Denis Glazkov , David Howells , Jarkko Sakkinen , James Morris , "Serge E. Hallyn" , Mimi Zohar , "Mehmet Kayaalp" , "linux-kernel@vger.kernel.org" , "keyrings@vger.kernel.org" , "linux-security-module@vger.kernel.org" Subject: [PATCH] KEYS: fix memory leak when reading certificate fails Thread-Topic: [PATCH] KEYS: fix memory leak when reading certificate fails Thread-Index: AQHYLtbXK3D575r57ECuz2QMV/HRKg== Date: Thu, 3 Mar 2022 08:15:28 +0000 Message-ID: <20220303081428.12979-1-d.glazkov@omp.ru> Accept-Language: ru-RU, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [192.168.11.133] Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,MISSING_HEADERS, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the `read_file` function of `insert-sys-cert.c` script, if the data is read incorrectly, the memory allocated for the `buf` array is not freed. Fixes: c4c361059585 ("KEYS: Reserve an extra certificate symbol for inserting without recompiling") Signed-off-by: Denis Glazkov --- scripts/insert-sys-cert.c | 1 + 1 file changed, 1 insertion(+) diff --git a/scripts/insert-sys-cert.c b/scripts/insert-sys-cert.c index 8902836c2342..b98a0b12f16f 100644 --- a/scripts/insert-sys-cert.c +++ b/scripts/insert-sys-cert.c @@ -251,6 +251,7 @@ static char *read_file(char *file_name, int *size) if (read(fd, buf, *size) != *size) { perror("File read failed"); close(fd); + free(buf); return NULL; } close(fd); -- 2.25.1