diff options
author | David Disseldorp <ddiss@suse.de> | 2017-12-13 18:22:30 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2018-02-22 15:42:29 +0100 |
commit | 4cbb9fdf133cc5a5dcb1ac7153791792976c62c9 (patch) | |
tree | 4fd974ffef7bcf2a6ce269939ad7896053df6dae /drivers/target/iscsi | |
parent | 0528a533f368c93efe752dbd52698dcea214554a (diff) | |
download | linux-exynos-4cbb9fdf133cc5a5dcb1ac7153791792976c62c9.tar.gz linux-exynos-4cbb9fdf133cc5a5dcb1ac7153791792976c62c9.tar.bz2 linux-exynos-4cbb9fdf133cc5a5dcb1ac7153791792976c62c9.zip |
target/iscsi: avoid NULL dereference in CHAP auth error path
commit ce512d79d0466a604793addb6b769d12ee326822 upstream.
If chap_server_compute_md5() fails early, e.g. via CHAP_N mismatch, then
crypto_free_shash() is called with a NULL pointer which gets
dereferenced in crypto_shash_tfm().
Fixes: 69110e3cedbb ("iscsi-target: Use shash and ahash")
Suggested-by: Markus Elfring <elfring@users.sourceforge.net>
Signed-off-by: David Disseldorp <ddiss@suse.de>
Cc: stable@vger.kernel.org # 4.6+
Signed-off-by: Nicholas Bellinger <nab@linux-iscsi.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/target/iscsi')
-rw-r--r-- | drivers/target/iscsi/iscsi_target_auth.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/drivers/target/iscsi/iscsi_target_auth.c b/drivers/target/iscsi/iscsi_target_auth.c index f9bc8ec6fb6b..9518ffd8b8ba 100644 --- a/drivers/target/iscsi/iscsi_target_auth.c +++ b/drivers/target/iscsi/iscsi_target_auth.c @@ -421,7 +421,8 @@ static int chap_server_compute_md5( auth_ret = 0; out: kzfree(desc); - crypto_free_shash(tfm); + if (tfm) + crypto_free_shash(tfm); kfree(challenge); kfree(challenge_binhex); return auth_ret; |