Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1188097ybf; Thu, 27 Feb 2020 06:32:04 -0800 (PST) X-Google-Smtp-Source: APXvYqwIcn3/18NJE1jLMUgUhiBtI6kRNDduXVP6YRIjHTrw9tlDWBrcBr5Vv9q9MThTe2X8THqi X-Received: by 2002:aca:be09:: with SMTP id o9mr3579598oif.177.1582813923934; Thu, 27 Feb 2020 06:32:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582813923; cv=none; d=google.com; s=arc-20160816; b=k4bIhiKw43m7fitq9Lx1qtTHghU9QqMvwPHphb1B9s5Rs1+IgNYHP//iCl6g+N8EbO Uo709P3WeHGpQBRimUKCSJAmWKeFERXQC6OGWcmF5H+XOrkRVos2zV1iMvTgZ47uaO+u Tc4nO1YSqOoA1yEbebw4GpWfrxT2soEFcRHlCMTGxX2C4A4CYZgCJtvpjTAM/YbJPAjt /jhT4yNRirtkoHVi+hWm3mycqyPmH/q24Dl0u1a9uuopEbkjd3XqMmx/e0vO3y/35DQu FCCe2Ky9hUkwymkWwdG9NQP+0q2oAkAZPgnCTRMPVJgh1EmWWQ68h9um9USYLfIj49J4 Bh0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=uBLS9/CuQJjzF9oBvTHAs7t2DVhcoR5as4ECcwNYp9M=; b=UsB49Xo5nlQ+RAItMRkVmGBc2WdhSh/lK3euZ++V/BVKAbOHgDdH+jhaBDeCXJCCqi zFXRQIZGlHGaV8EgcPycSl9bsKXvUPHWXNoB2pI4YCPuSQP3/fzPlXbhVUK004xhe7gz PAiDLOXIAuqurcmh9mLABUEjbf4ZFVivsvnoWQrsorGSx9KzB4JcOJugw3yO5OAGmlRk cYrV/DNeVmFp5ae5Ne7cL5XbMafw+gwmtTz76Fj85P4rmik8Q1VDONLWAnpQO9SBlwBw 4ACRxAnRjKLtxxqKQOFkup1KXpI8hREpyY0W1w5lrNaorPa83ufZc9mfKgEsoGTAGX0z 7REA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=U26e6Xvb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j15si1361512oie.15.2020.02.27.06.31.51; Thu, 27 Feb 2020 06:32:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=U26e6Xvb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387416AbgB0ODY (ORCPT + 99 others); Thu, 27 Feb 2020 09:03:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:38552 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387408AbgB0ODV (ORCPT ); Thu, 27 Feb 2020 09:03:21 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C89A421556; Thu, 27 Feb 2020 14:03:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582812201; bh=WfR1glQBxu8YOajsf+RKgWMV+PrcXt72mpGHCBNKBu4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=U26e6XvbRrvsgikOIaf/YGvPRiX8vtolKMkGff1dbq4vc4M0z2jBCN0M5zuL7554O 7Db1t0as13HqhAYpRFcscyQX4JEQgrn2aDVuCnF+UhKUwQsgEY1a6g7ww6agzF6BhF iXgmLBvKtXKCMrV/VPF0A7+IqFOEZd8lqjagSwfo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wenwen Wang , Tyler Hicks Subject: [PATCH 4.19 07/97] ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() Date: Thu, 27 Feb 2020 14:36:15 +0100 Message-Id: <20200227132215.770740002@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132214.553656188@linuxfoundation.org> References: <20200227132214.553656188@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wenwen Wang commit b4a81b87a4cfe2bb26a4a943b748d96a43ef20e8 upstream. In ecryptfs_init_messaging(), if the allocation for 'ecryptfs_msg_ctx_arr' fails, the previously allocated 'ecryptfs_daemon_hash' is not deallocated, leading to a memory leak bug. To fix this issue, free 'ecryptfs_daemon_hash' before returning the error. Cc: stable@vger.kernel.org Fixes: 88b4a07e6610 ("[PATCH] eCryptfs: Public key transport mechanism") Signed-off-by: Wenwen Wang Signed-off-by: Tyler Hicks Signed-off-by: Greg Kroah-Hartman --- fs/ecryptfs/messaging.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/ecryptfs/messaging.c +++ b/fs/ecryptfs/messaging.c @@ -392,6 +392,7 @@ int __init ecryptfs_init_messaging(void) * ecryptfs_message_buf_len), GFP_KERNEL); if (!ecryptfs_msg_ctx_arr) { + kfree(ecryptfs_daemon_hash); rc = -ENOMEM; goto out; }