[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220224200437.201705-1-d.glazkov@omp.ru>
Date: Thu, 24 Feb 2022 20:04:51 +0000
From: Denis Glazkov <d.glazkov@....ru>
To: unlisted-recipients:; (no To-header on input)
CC: Denis Glazkov <d.glazkov@....ru>,
Mehmet Kayaalp <mkayaalp@...ux.vnet.ibm.com>,
Mimi Zohar <zohar@...ux.vnet.ibm.com>,
"David Howells" <dhowells@...hat.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [PATCH] KEYS: fix memory leak when reading certificate fails
In the `read_file` function of `insert-sys-cert.c` script, if
the data is read incorrectly, the memory allocated for the `buf`
array is not freed.
Fixes: c4c361059585 ("KEYS: Reserve an extra certificate symbol for inserting without recompiling")
Signed-off-by: Denis Glazkov <d.glazkov@....ru>
---
scripts/insert-sys-cert.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/scripts/insert-sys-cert.c b/scripts/insert-sys-cert.c
index 8902836c2342..b98a0b12f16f 100644
--- a/scripts/insert-sys-cert.c
+++ b/scripts/insert-sys-cert.c
@@ -251,6 +251,7 @@ static char *read_file(char *file_name, int *size)
if (read(fd, buf, *size) != *size) {
perror("File read failed");
close(fd);
+ free(buf);
return NULL;
}
close(fd);
--
2.25.1
Powered by blists - more mailing lists