Received: by 10.213.65.68 with SMTP id h4csp285921imn; Fri, 23 Mar 2018 04:45:35 -0700 (PDT) X-Google-Smtp-Source: AG47ELvG4C7qDgT77vpxKKvl43IqdVv/USm+hVbVmYLBsgJRT3RMUcZcCMBoDL/GQhgkJqPTlgFu X-Received: by 2002:a17:902:b101:: with SMTP id q1-v6mr29230065plr.287.1521805535004; Fri, 23 Mar 2018 04:45:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521805534; cv=none; d=google.com; s=arc-20160816; b=cAgowkgFQdRZKc/u2FSrTT+YZJV2SwVDM7SUBefcOh5QhRChWhMWWWNE16JiNiHfbR oE1PwSQWmhbCF/iHPtOVrHDvlL3q3svWDORpgWO+lOAnvjccC+H6NkDVnb88BJwyfgyV 6Y9WBm/DFSM6+OlZeBaaEdraDhXoo7T5NLDMVyE+WTZe3s22lUKUYrJoI6mJPTLWigrV l+yd3Nb39LDPLTdOY7Dbj4zHcxjKuRWwOUUVvuTdPQrfDo9/Faphn2CTAJUp++bavXTT Vqovgy1jpEPElLSJ9tvVDu2j69gsyTZedMPM5Y5eMTvIK1OKXc/34AeTqOs4a2lZG0Kd eq5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=71WFCAGJRd9GWjtPQ0X95I+iQor8DA7rwDJ5gXvL3Hc=; b=Up48lLxtT11t1W7McWX6tn0IR2usugncCSWxURqyc7e6h5XfZBiQ5s3Fa5R3WTGc+D mFHXg8el79JicJ8AyTCIhE33M1qQHGpXN9ZQIXtnuoBFOsWl//GXZO46N9ZhExLceCGi MF5qF4axtfLlHbq2AURMmrE5IdZH7azosKobWachDlQMojO7WB+ccpc4yePk8Iz0kZdj IVuRyVCUDqo3Zb+vHB0Agazn40n0G1d/QL2xQABleFEAGApgeHnqyMqhM3KidyO8E9yf a3gzmmTovvr1/NJpfytDEwvQk+5NLMbYFXUPvlEC4FoWkxSpTXX5CRnNGgg+A9J0BPFA 9Gbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w1si5859671pgq.135.2018.03.23.04.45.20; Fri, 23 Mar 2018 04:45:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754437AbeCWKDT (ORCPT + 99 others); Fri, 23 Mar 2018 06:03:19 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38710 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754417AbeCWKDQ (ORCPT ); Fri, 23 Mar 2018 06:03:16 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 9541E12DC; Fri, 23 Mar 2018 10:03:15 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, William Tu , Haishuang Yan , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 54/77] ip_gre: fix potential memory leak in erspan_rcv Date: Fri, 23 Mar 2018 10:54:28 +0100 Message-Id: <20180323094145.886610783@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180323094142.260022880@linuxfoundation.org> References: <20180323094142.260022880@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Haishuang Yan [ Upstream commit 50670b6ee9bc4ae8f9ce3112b437987adf273245 ] If md is NULL, tun_dst must be freed, otherwise it will cause memory leak. Fixes: 1a66a836da6 ("gre: add collect_md mode to ERSPAN tunnel") Cc: William Tu Signed-off-by: Haishuang Yan Signed-off-by: David S. Miller Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ip_gre.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/net/ipv4/ip_gre.c +++ b/net/ipv4/ip_gre.c @@ -303,8 +303,10 @@ static int erspan_rcv(struct sk_buff *sk return PACKET_REJECT; md = ip_tunnel_info_opts(&tun_dst->u.tun_info); - if (!md) + if (!md) { + dst_release((struct dst_entry *)tun_dst); return PACKET_REJECT; + } md->index = index; info = &tun_dst->u.tun_info;