diff options
author | Navid Emamdoost <navid.emamdoost@gmail.com> | 2019-10-04 14:29:16 -0500 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-12-13 08:43:10 +0100 |
commit | b022e155ccbcfadeaf5543d5b4d99c3c6d260ced (patch) | |
tree | 34cdd043e4d567ad3820b7aeed66dc2068751c8f /crypto | |
parent | 8e6d97c5b01df9b069f8a32d104d57cde92c96aa (diff) | |
download | linux-stable-b022e155ccbcfadeaf5543d5b4d99c3c6d260ced.tar.gz linux-stable-b022e155ccbcfadeaf5543d5b4d99c3c6d260ced.tar.bz2 linux-stable-b022e155ccbcfadeaf5543d5b4d99c3c6d260ced.zip |
crypto: user - fix memory leak in crypto_report
commit ffdde5932042600c6807d46c1550b28b0db6a3bc upstream.
In crypto_report, a new skb is created via nlmsg_new(). This skb should
be released if crypto_report_alg() fails.
Fixes: a38f7907b926 ("crypto: Add userspace configuration API")
Cc: <stable@vger.kernel.org>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/crypto_user_base.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/crypto/crypto_user_base.c b/crypto/crypto_user_base.c index 910e0b46012e..b785c476de67 100644 --- a/crypto/crypto_user_base.c +++ b/crypto/crypto_user_base.c @@ -213,8 +213,10 @@ static int crypto_report(struct sk_buff *in_skb, struct nlmsghdr *in_nlh, drop_alg: crypto_mod_put(alg); - if (err) + if (err) { + kfree_skb(skb); return err; + } return nlmsg_unicast(net->crypto_nlsk, skb, NETLINK_CB(in_skb).portid); } |