diff options
author | Tom Rix <trix@redhat.com> | 2020-06-11 00:57:13 +0300 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2020-06-11 05:10:35 +0300 |
commit | 65de50969a77509452ae590e9449b70a22b923bb (patch) | |
tree | 3237e1922915349ab6ec6406b5fec8c7f5ba1879 /security | |
parent | fe5a90b8c14914397a3bb0c214d142103c1ba3bf (diff) | |
download | linux-65de50969a77509452ae590e9449b70a22b923bb.tar.xz |
selinux: fix double free
Clang's static analysis tool reports these double free memory errors.
security/selinux/ss/services.c:2987:4: warning: Attempt to free released memory [unix.Malloc]
kfree(bnames[i]);
^~~~~~~~~~~~~~~~
security/selinux/ss/services.c:2990:2: warning: Attempt to free released memory [unix.Malloc]
kfree(bvalues);
^~~~~~~~~~~~~~
So improve the security_get_bools error handling by freeing these variables
and setting their return pointers to NULL and the return len to 0
Cc: stable@vger.kernel.org
Signed-off-by: Tom Rix <trix@redhat.com>
Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/selinux/ss/services.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 313919bd42f8..ef0afd878bfc 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -2888,8 +2888,12 @@ err: if (*names) { for (i = 0; i < *len; i++) kfree((*names)[i]); + kfree(*names); } kfree(*values); + *len = 0; + *names = NULL; + *values = NULL; goto out; } |