aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJakub Jelen <jjelen@redhat.com>2021-01-07 15:54:00 +0100
committerJakub Jelen <jjelen@redhat.com>2021-08-17 15:46:53 +0200
commit08f96dcca66810e11e20c2d2224017191eb48955 (patch)
treedd5c6083d9f74a1d6f8f05c7f1343d3b0688dc71
parent435f45291d2701d33f493c73844d3a8de2b2d90f (diff)
downloadlibssh-08f96dcca66810e11e20c2d2224017191eb48955.tar.gz
libssh-08f96dcca66810e11e20c2d2224017191eb48955.tar.xz
libssh-08f96dcca66810e11e20c2d2224017191eb48955.zip
Clean memory on failure paths
Thanks oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28490 Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 95a4651d86c5a937d0fa17030a0db0308dc4a690)
-rw-r--r--src/dh.c1
-rw-r--r--src/packet_cb.c9
2 files changed, 7 insertions, 3 deletions
diff --git a/src/dh.c b/src/dh.c
index 05903daf..18b71734 100644
--- a/src/dh.c
+++ b/src/dh.c
@@ -361,6 +361,7 @@ SSH_PACKET_CALLBACK(ssh_packet_client_dh_reply){
rc = ssh_dh_keypair_set_keys(crypto->dh_ctx, DH_SERVER_KEYPAIR,
NULL, server_pubkey);
if (rc != SSH_OK) {
+ SSH_STRING_FREE(pubkey_blob);
bignum_safe_free(server_pubkey);
goto error;
}
diff --git a/src/packet_cb.c b/src/packet_cb.c
index 4e692915..39575b17 100644
--- a/src/packet_cb.c
+++ b/src/packet_cb.c
@@ -129,6 +129,8 @@ SSH_PACKET_CALLBACK(ssh_packet_newkeys){
}
rc = ssh_pki_import_signature_blob(sig_blob, server_key, &sig);
+ ssh_string_burn(sig_blob);
+ SSH_STRING_FREE(sig_blob);
if (rc != SSH_OK) {
goto error;
}
@@ -152,9 +154,7 @@ SSH_PACKET_CALLBACK(ssh_packet_newkeys){
server_key,
session->next_crypto->secret_hash,
session->next_crypto->digest_len);
- ssh_string_burn(sig_blob);
- SSH_STRING_FREE(sig_blob);
- ssh_signature_free(sig);
+ SSH_SIGNATURE_FREE(sig);
if (rc == SSH_ERROR) {
goto error;
}
@@ -170,6 +170,9 @@ SSH_PACKET_CALLBACK(ssh_packet_newkeys){
session->ssh_connection_callback(session);
return SSH_PACKET_USED;
error:
+ SSH_SIGNATURE_FREE(sig);
+ ssh_string_burn(sig_blob);
+ SSH_STRING_FREE(sig_blob);
session->session_state = SSH_SESSION_STATE_ERROR;
return SSH_PACKET_USED;
}