summaryrefslogtreecommitdiff
path: root/crypto/blowfish_common.c
diff options
context:
space:
mode:
authorXin Long <lucien.xin@gmail.com>2019-06-25 00:21:45 +0800
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-07-10 09:56:36 +0200
commit92598c5db140940c1b1ef0c10894b5c9d5293930 (patch)
treebbae09577483ccaba4a83b8eec5c33d2f5ee08d8 /crypto/blowfish_common.c
parenta892d74963c83e7ac357e5815a238076c4e57d99 (diff)
sctp: change to hold sk after auth shkey is created successfully
[ Upstream commit 25bff6d5478b2a02368097015b7d8eb727c87e16 ] Now in sctp_endpoint_init(), it holds the sk then creates auth shkey. But when the creation fails, it doesn't release the sk, which causes a sk defcnf leak, Here to fix it by only holding the sk when auth shkey is created successfully. Fixes: a29a5bd4f5c3 ("[SCTP]: Implement SCTP-AUTH initializations.") Reported-by: syzbot+afabda3890cc2f765041@syzkaller.appspotmail.com Reported-by: syzbot+276ca1c77a19977c0130@syzkaller.appspotmail.com Signed-off-by: Xin Long <lucien.xin@gmail.com> Acked-by: Neil Horman <nhorman@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'crypto/blowfish_common.c')
0 files changed, 0 insertions, 0 deletions