Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp14353099pxu; Mon, 4 Jan 2021 22:06:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJyudl2jEF1V8IK/Bb5hGlt+kIrdHRg5qLzXNVJ3ce3xWjEImYMsrmsf8Lk7MkODSOdw+Aa8 X-Received: by 2002:a05:6402:22e1:: with SMTP id dn1mr75690186edb.347.1609826794866; Mon, 04 Jan 2021 22:06:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1609826794; cv=none; d=google.com; s=arc-20160816; b=kfUK+0+rZ96DGDggbMkFb7qjXLiKl8l2h98ChdMteOjQoXCD1iKphCAzR1z2cliqNX i9raYhLwCmhCykZ+9ufNKYJfSr8xFyMdZ9GIr/sDsS2+cKVQJMUi7Gidl4dPiBhrcHIT hNnj3L4llx5PuQNxk00DJvoB5qEMTzicnHstS77gvylCQqPyTq3SpILCThJYVoPa8UWt 1omN4/Cc+i7gCu2CAWkH6bzoBx2UeLU2v2NEF3c0tiMyzty0Jekf0IWve9WhNXV1WUj7 eQuBit6Eq1Jl2+hUZiMZuqC7JNkPVMBpWk4QAV+XKb53JDLrtgV4jxHClQk4D+sX8z7g VDXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=DYzF0gPiIAjR1rnYc8+Lt+cLnNWo68E1wJ4RJ29KOzU=; b=sUgwPt1JftfpucGrXH13klvgsKydNYwi5jLimz9jtLzoqLn2ek7ftkD7+pxevYb7IE uN0hxDBzCck3xQbWFm1uDTBAmDFaXms1TBIQUVON0XaC9Zl4QskQV85z0ljII+eUE+gT K8k7YY3lok0g25h6FtiOGNu60gE1FeC4xuCBdCqgu6XmegoRBvxwTeZTVqvZJ/tPDIEf o3QP3Q1l9g7Y0yTGGenTDbkQuMsfgGHIQshC2VnFPZMGqL7IuW/shljjg8I0RPXeRfzY w0pOnYjJBZkLdOa5UfdvKm+XjdwykeuZ4sYUFhvP7a1ax07IGNmik2Kq44snE0pIa94A /ADA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dc22si31946826ejb.568.2021.01.04.22.06.11; Mon, 04 Jan 2021 22:06:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725919AbhAEGE4 (ORCPT + 99 others); Tue, 5 Jan 2021 01:04:56 -0500 Received: from spam.zju.edu.cn ([61.164.42.155]:36694 "EHLO zju.edu.cn" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725298AbhAEGE4 (ORCPT ); Tue, 5 Jan 2021 01:04:56 -0500 Received: from localhost.localdomain (unknown [222.205.25.254]) by mail-app2 (Coremail) with SMTP id by_KCgCnjok9AfRfTnUJAA--.6901S4; Tue, 05 Jan 2021 14:03:44 +0800 (CST) From: Dinghao Liu To: dinghao.liu@zju.edu.cn, kjlu@umn.edu Cc: Richard Weinberger , Sascha Hauer , linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH] ubifs: Fix memleak in ubifs_init_authentication Date: Tue, 5 Jan 2021 14:03:40 +0800 Message-Id: <20210105060340.7990-1-dinghao.liu@zju.edu.cn> X-Mailer: git-send-email 2.17.1 X-CM-TRANSID: by_KCgCnjok9AfRfTnUJAA--.6901S4 X-Coremail-Antispam: 1UD129KBjvdXoWrZFW8Gr48CF1fGw4DJF47Arb_yoW3twbEy3 y7Zr4rur48GFnak34Ykay8Gr1fu397Za4rKr4fXF9rua4Iy3Z8ArZ7GrZ5WrW7Ar4a9ryk Jayvvryfur9IqjkaLaAFLSUrUUUUUb8apTn2vfkv8UJUUUU8Yxn0WfASr-VFAUDa7-sFnT 9fnUUIcSsGvfJTRUUUbIxFc2x0x2IEx4CE42xK8VAvwI8IcIk0rVWrJVCq3wAFIxvE14AK wVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK021l84ACjcxK6xIIjxv20x vE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26F4UJVW0owA2z4x0Y4vEx4A2 jsIE14v26rxl6s0DM28EF7xvwVC2z280aVCY1x0267AKxVW0oVCq3wAS0I0E0xvYzxvE52 x082IY62kv0487Mc02F40EFcxC0VAKzVAqx4xG6I80ewAv7VC0I7IYx2IY67AKxVWUJVWU GwAv7VC2z280aVAFwI0_Jr0_Gr1lOx8S6xCaFVCjc4AY6r1j6r4UM4x0Y48IcxkI7VAKI4 8JM4x0x7Aq67IIx4CEVc8vx2IErcIFxwCY02Avz4vE14v_GF1l42xK82IYc2Ij64vIr41l 42xK82IY6x8ErcxFaVAv8VW8uw4UJr1UMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I 8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUAVWU twCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x 0267AKxVWUJVW8JwCI42IY6xAIw20EY4v20xvaj40_Wr1j6rW3Jr1lIxAIcVC2z280aVAF wI0_Jr0_Gr1lIxAIcVC2z280aVCY1x0267AKxVW8JVW8JrUvcSsGvfC2KfnxnUUI43ZEXa 7VUjHUDJUUUUU== X-CM-SenderInfo: qrrzjiaqtzq6lmxovvfxof0/1tbiAgMQBlZdtR1gpwADsw Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When crypto_shash_digestsize() fails, c->hmac_tfm has not been freed before returning, which leads to memleak. Fixes: 49525e5eecca5 ("ubifs: Add helper functions for authentication support") Signed-off-by: Dinghao Liu --- fs/ubifs/auth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/ubifs/auth.c b/fs/ubifs/auth.c index 51a7c8c2c3f0..e564d5ff8781 100644 --- a/fs/ubifs/auth.c +++ b/fs/ubifs/auth.c @@ -327,7 +327,7 @@ int ubifs_init_authentication(struct ubifs_info *c) ubifs_err(c, "hmac %s is bigger than maximum allowed hmac size (%d > %d)", hmac_name, c->hmac_desc_len, UBIFS_HMAC_ARR_SZ); err = -EINVAL; - goto out_free_hash; + goto out_free_hmac; } err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); -- 2.17.1