kernel-fxtec-pro1x/security/integrity/ima
Roberto Sassu c470dc530c ima: Don't ignore errors from crypto_shash_update()
commit 60386b854008adc951c470067f90a2d85b5d520f upstream.

Errors returned by crypto_shash_update() are not checked in
ima_calc_boot_aggregate_tfm() and thus can be overwritten at the next
iteration of the loop. This patch adds a check after calling
crypto_shash_update() and returns immediately if the result is not zero.

Cc: stable@vger.kernel.org
Fixes: 3323eec921 ("integrity: IMA as an integrity service provider")
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-10-29 09:54:59 +01:00
..
ima.h ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() 2020-06-22 09:05:26 +02:00
ima_api.c
ima_appraise.c
ima_crypto.c ima: Don't ignore errors from crypto_shash_update() 2020-10-29 09:54:59 +01:00
ima_fs.c
ima_init.c ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() 2020-06-22 09:05:26 +02:00
ima_kexec.c
ima_main.c
ima_mok.c
ima_policy.c ima: Directly assign the ima_default_policy pointer to ima_rules 2020-06-22 09:05:21 +02:00
ima_queue.c
ima_template.c
ima_template_lib.c ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() 2020-06-22 09:05:26 +02:00
ima_template_lib.h
Kconfig
Makefile