lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 25 Oct 2021 21:14:42 +0200 From: Greg Kroah-Hartman <gregkh@...uxfoundation.org> To: linux-kernel@...r.kernel.org Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, stable@...r.kernel.org, Miaohe Lin <linmiaohe@...wei.com>, Vlastimil Babka <vbabka@...e.cz>, Andrey Konovalov <andreyknvl@...il.com>, Andrey Ryabinin <ryabinin.a.a@...il.com>, Bharata B Rao <bharata@...ux.ibm.com>, Christoph Lameter <cl@...ux.com>, David Rientjes <rientjes@...gle.com>, Faiyaz Mohammed <faiyazm@...eaurora.org>, Joonsoo Kim <iamjoonsoo.kim@....com>, Kees Cook <keescook@...omium.org>, Pekka Enberg <penberg@...nel.org>, Roman Gushchin <guro@...com>, Andrew Morton <akpm@...ux-foundation.org>, Linus Torvalds <torvalds@...ux-foundation.org> Subject: [PATCH 5.14 101/169] mm, slub: fix potential memoryleak in kmem_cache_open() From: Miaohe Lin <linmiaohe@...wei.com> commit 9037c57681d25e4dcc442d940d6dbe24dd31f461 upstream. In error path, the random_seq of slub cache might be leaked. Fix this by using __kmem_cache_release() to release all the relevant resources. Link: https://lkml.kernel.org/r/20210916123920.48704-4-linmiaohe@huawei.com Fixes: 210e7a43fa90 ("mm: SLUB freelist randomization") Signed-off-by: Miaohe Lin <linmiaohe@...wei.com> Reviewed-by: Vlastimil Babka <vbabka@...e.cz> Cc: Andrey Konovalov <andreyknvl@...il.com> Cc: Andrey Ryabinin <ryabinin.a.a@...il.com> Cc: Bharata B Rao <bharata@...ux.ibm.com> Cc: Christoph Lameter <cl@...ux.com> Cc: David Rientjes <rientjes@...gle.com> Cc: Faiyaz Mohammed <faiyazm@...eaurora.org> Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org> Cc: Joonsoo Kim <iamjoonsoo.kim@....com> Cc: Kees Cook <keescook@...omium.org> Cc: Pekka Enberg <penberg@...nel.org> Cc: Roman Gushchin <guro@...com> Cc: <stable@...r.kernel.org> Signed-off-by: Andrew Morton <akpm@...ux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@...ux-foundation.org> Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org> --- mm/slub.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/mm/slub.c +++ b/mm/slub.c @@ -3935,8 +3935,8 @@ static int kmem_cache_open(struct kmem_c if (alloc_kmem_cache_cpus(s)) return 0; - free_kmem_cache_nodes(s); error: + __kmem_cache_release(s); return -EINVAL; }
Powered by blists - more mailing lists