1
0
mirror of https://git.code.sf.net/p/linux-ima/ima-evm-utils synced 2025-06-30 21:02:33 +02:00

ima-evm-utils: Fix EVP_MD_CTX leak in ima_calc_hash

When pctx is allocated using EVP_MD_CTX_new() it should be freed.
Found with ASan.

Fixes: 81010f0 ("ima-evm-utils: Add backward compatible support for openssl 1.1")
Signed-off-by: Vitaly Chikunov <vt@altlinux.org>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
This commit is contained in:
Vitaly Chikunov
2019-07-08 02:48:33 +03:00
committed by Mimi Zohar
parent 30add9c2eb
commit faea7ca2b1

View File

@ -252,19 +252,21 @@ int ima_calc_hash(const char *file, uint8_t *hash)
err = lstat(file, &st);
if (err < 0) {
log_err("Failed to stat: %s\n", file);
return err;
goto err;
}
md = EVP_get_digestbyname(params.hash_algo);
if (!md) {
log_err("EVP_get_digestbyname(%s) failed\n", params.hash_algo);
return 1;
err = 1;
goto err;
}
err = EVP_DigestInit(pctx, md);
if (!err) {
log_err("EVP_DigestInit() failed\n");
return 1;
err = 1;
goto err;
}
switch (st.st_mode & S_IFMT) {
@ -283,19 +285,25 @@ int ima_calc_hash(const char *file, uint8_t *hash)
break;
default:
log_errno("Unsupported file type");
return -1;
err = -1;
goto err;
}
if (err)
return err;
goto err;
err = EVP_DigestFinal(pctx, hash, &mdlen);
if (!err) {
log_err("EVP_DigestFinal() failed\n");
return 1;
err = 1;
goto err;
}
return mdlen;
err = mdlen;
err:
#if OPENSSL_VERSION_NUMBER >= 0x10100000
EVP_MD_CTX_free(pctx);
#endif
return err;
}
EVP_PKEY *read_pub_pkey(const char *keyfile, int x509)