]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
ima: Don't ignore errors from crypto_shash_update()
authorRoberto Sassu <roberto.sassu@huawei.com>
Fri, 4 Sep 2020 09:23:28 +0000 (11:23 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 29 Oct 2020 08:03:01 +0000 (09:03 +0100)
commit 60386b854008adc951c470067f90a2d85b5d520f upstream.

Errors returned by crypto_shash_update() are not checked in
ima_calc_boot_aggregate_tfm() and thus can be overwritten at the next
iteration of the loop. This patch adds a check after calling
crypto_shash_update() and returns immediately if the result is not zero.

Cc: stable@vger.kernel.org
Fixes: 3323eec921efd ("integrity: IMA as an integrity service provider")
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
security/integrity/ima/ima_crypto.c

index 5c87baaefafb6eb354af4aa4534f2043947d357d..0c0df76170aef81b06b00587d31e5cc5d59e1f0b 100644 (file)
@@ -555,6 +555,8 @@ static int __init ima_calc_boot_aggregate_tfm(char *digest,
                ima_pcrread(i, pcr_i);
                /* now accumulate with current aggregate */
                rc = crypto_shash_update(shash, pcr_i, TPM_DIGEST_SIZE);
+               if (rc != 0)
+                       return rc;
        }
        if (!rc)
                crypto_shash_final(shash, digest);