lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20131112010836.GA30433@thunk.org> Date: Mon, 11 Nov 2013 20:08:36 -0500 From: Theodore Ts'o <tytso@....edu> To: Dave Jones <davej@...hat.com> Cc: linux-ext4@...r.kernel.org Subject: Re: Add missing brelse to xattr code. On Wed, Nov 06, 2013 at 10:45:46AM -0500, Dave Jones wrote: > This code was recently patched to not leak memory on the retry path, > but it seems we are also forgetting to brelse the bufferhead. > > Signed-off-by: Dave Jones <davej@...oraproject.org> Thanks, I have this fix in my tree already. Cheers, - Ted commit dcb9917ba041866686fe152850364826c4622a36 Author: Theodore Ts'o <tytso@....edu> Date: Thu Oct 31 23:00:24 2013 -0400 ext4: avoid bh leak in retry path of ext4_expand_extra_isize_ea() Reported-by: Dave Jones <davej@...hat.com> Signed-off-by: "Theodore Ts'o" <tytso@....edu> Cc: stable@...r.kernel.org diff --git a/fs/ext4/xattr.c b/fs/ext4/xattr.c index 03e9beb..1423c48 100644 --- a/fs/ext4/xattr.c +++ b/fs/ext4/xattr.c @@ -1352,6 +1352,7 @@ retry: new_extra_isize = s_min_extra_isize; kfree(is); is = NULL; kfree(bs); bs = NULL; + brelse(bh); goto retry; } error = -1; -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists