summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorTom Rix <trix@redhat.com>2020-06-10 14:57:13 -0700
committerPaul Moore <paul@paul-moore.com>2020-06-10 22:10:35 -0400
commit65de50969a77509452ae590e9449b70a22b923bb (patch)
tree3237e1922915349ab6ec6406b5fec8c7f5ba1879 /security
parentfe5a90b8c14914397a3bb0c214d142103c1ba3bf (diff)
downloadlwn-65de50969a77509452ae590e9449b70a22b923bb.tar.gz
lwn-65de50969a77509452ae590e9449b70a22b923bb.zip
selinux: fix double free
Clang's static analysis tool reports these double free memory errors. security/selinux/ss/services.c:2987:4: warning: Attempt to free released memory [unix.Malloc] kfree(bnames[i]); ^~~~~~~~~~~~~~~~ security/selinux/ss/services.c:2990:2: warning: Attempt to free released memory [unix.Malloc] kfree(bvalues); ^~~~~~~~~~~~~~ So improve the security_get_bools error handling by freeing these variables and setting their return pointers to NULL and the return len to 0 Cc: stable@vger.kernel.org Signed-off-by: Tom Rix <trix@redhat.com> Acked-by: Stephen Smalley <stephen.smalley.work@gmail.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security')
-rw-r--r--security/selinux/ss/services.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c
index 313919bd42f8..ef0afd878bfc 100644
--- a/security/selinux/ss/services.c
+++ b/security/selinux/ss/services.c
@@ -2888,8 +2888,12 @@ err:
if (*names) {
for (i = 0; i < *len; i++)
kfree((*names)[i]);
+ kfree(*names);
}
kfree(*values);
+ *len = 0;
+ *names = NULL;
+ *values = NULL;
goto out;
}