crypto: fix a memory leak in rsa-kcs1pad's encryption mode
mainline inclusion from mainline-4.20-rc1 commit 3944f139d5592790b70bc64f197162e643a8512b category: bugfix bugzilla: 6250 CVE: NA --------------------------- The encryption mode of pkcs1pad never uses out_sg and out_buf, so there's no need to allocate the buffer, which presently is not even being freed. CC: Herbert Xu <herbert@gondor.apana.org.au> CC: linux-crypto@vger.kernel.org CC: "David S. Miller" <davem@davemloft.net> Signed-off-by: NDan Aloni <dan@kernelim.com> Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au> Signed-off-by: NJason Yan <yanaijie@huawei.com> Reviewed-by: NZhang xiaoxu <zhangxiaoxu5@huawei.com> Signed-off-by: NYang Yingliang <yangyingliang@huawei.com>
Showing
想要评论请 注册 或 登录