Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp114091ybm; Tue, 26 May 2020 12:07:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzULxFqNJULBve1hKoUabhjRiR87b6xKfA61o4aOLLfPB4qP/pwzzKbC9zxcYTIcdfmOjvI X-Received: by 2002:a17:906:d86:: with SMTP id m6mr2485847eji.470.1590520071932; Tue, 26 May 2020 12:07:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590520071; cv=none; d=google.com; s=arc-20160816; b=uaQZ603UbFpQLZ/+k+uv02XpkNPnzy1sU6fpc92YbWxNN3M74lTHBQFoPYoFIWwTHB +SgeS+qpg1TATdJ+jKfyBMm/1UY3A9uqB/skJQfJruOvMWDl4yPXNbLKXV//wFt1xACQ eg5foLpK2WZSoKiSUNJjwF6OCXCklfEUw9yC2mtvQ2Em/ueB3P7r5kBD54y5jWK+Cyd5 tPQJ5xc9Clpf0Tp0AihUDNxQK5dNLlhz8m/ezbucc35lr6im+nJhjI7eoNhK4ID0xZBg frHE/BWkfky8LgwCMPZhNWVmvBNk2tlwC+kRW2rkyxlIDgRYY9TqfEWJq/elhMTMVXG9 OCGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EspwTymVgWEEk6q/5btLD0NXA4YO+gV/X0pY+5R86ws=; b=XaNxIsjOA/6mEz/ub3YSjU7QqbFTQ+Rnt6IpOmTgKUH04TdLGFYyW8iu4kAsVmbASN deC9G3aG4TFvLl1woTjAIhi942hHG8Y6jNYpwZYBdiZSREULq3kOud+pGxGhmb/RVHwQ N3ifVPe67RHFAqIkdVynv6qJ6DuGFF8DqBredCMN3ur8vkGu621K5SwKyI9+UozsVO4T BcQL1vzpajSlTnRSOJ90+YuCk/pFQavFDD+a3+Ij7pvoJ0W0E0p6BTES6NvWs9PKSEPU Vr52AS42pz6O9PkxMG7ZDxV772HbgNLZ9uFbjuGqdYGulvxL8PojrQOQjMw2MeAHorA4 /ItA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EaTx20Td; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l16si478883ejg.33.2020.05.26.12.07.22; Tue, 26 May 2020 12:07:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EaTx20Td; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390449AbgEZTCV (ORCPT + 99 others); Tue, 26 May 2020 15:02:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:56986 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391068AbgEZTCR (ORCPT ); Tue, 26 May 2020 15:02:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 505FF20849; Tue, 26 May 2020 19:02:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590519736; bh=Cu0VYQZsfxVZA1WqJJmbBtZ+lFPCpOyAmwNLV/tSejI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EaTx20TdjzwtkBEKg58/me6oMr5RUZQQzY964EkVDyu+NGKETmkC/g1P9u+2dzOTZ xfKQ4LUynzHdeidYV8ULNZvCl6eNAumFOKikT4Yg+sQjkGxbjKxxg7xAAloNC9ubgi I51uADPkqaMEcWI7gypJPSXUd2Urvc+Nm0IhBNnk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qiushi Wu , David Howells , Markus Elfring Subject: [PATCH 4.14 56/59] rxrpc: Fix a memory leak in rxkad_verify_response() Date: Tue, 26 May 2020 20:53:41 +0200 Message-Id: <20200526183923.994507252@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183907.123822792@linuxfoundation.org> References: <20200526183907.123822792@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qiushi Wu commit f45d01f4f30b53c3a0a1c6c1c154acb7ff74ab9f upstream. A ticket was not released after a call of the function "rxkad_decrypt_ticket" failed. Thus replace the jump target "temporary_error_free_resp" by "temporary_error_free_ticket". Fixes: 8c2f826dc3631 ("rxrpc: Don't put crypto buffers on the stack") Signed-off-by: Qiushi Wu Signed-off-by: David Howells cc: Markus Elfring Signed-off-by: Greg Kroah-Hartman --- net/rxrpc/rxkad.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/net/rxrpc/rxkad.c +++ b/net/rxrpc/rxkad.c @@ -1111,7 +1111,7 @@ static int rxkad_verify_response(struct ret = rxkad_decrypt_ticket(conn, skb, ticket, ticket_len, &session_key, &expiry, _abort_code); if (ret < 0) - goto temporary_error_free_resp; + goto temporary_error_free_ticket; /* use the session key from inside the ticket to decrypt the * response */ @@ -1193,7 +1193,6 @@ protocol_error: temporary_error_free_ticket: kfree(ticket); -temporary_error_free_resp: kfree(response); temporary_error: /* Ignore the response packet if we got a temporary error such as