diff options
author | Jakub Jelen <jjelen@redhat.com> | 2020-12-04 11:32:06 +0100 |
---|---|---|
committer | Jakub Jelen <jjelen@redhat.com> | 2021-08-17 15:46:53 +0200 |
commit | 67b7b383b24ecdd100146276f0c2f033608e4ae2 (patch) | |
tree | 8fe02cddbfe5b873598c99d6916479fc93526480 | |
parent | 1736cb0567af8d6f40bd28d521772eaaa6949f2d (diff) | |
download | libssh-67b7b383b24ecdd100146276f0c2f033608e4ae2.tar.gz libssh-67b7b383b24ecdd100146276f0c2f033608e4ae2.tar.xz libssh-67b7b383b24ecdd100146276f0c2f033608e4ae2.zip |
wrapper: Avoid memory leak on errors during key exchange
As reported by oss-fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28075
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
(cherry picked from commit 9c6404aa4976a6259509df37fda1e0399e0e1212)
-rw-r--r-- | src/wrapper.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/wrapper.c b/src/wrapper.c index 7e57ab5d..06fbe5f9 100644 --- a/src/wrapper.c +++ b/src/wrapper.c @@ -182,6 +182,7 @@ void crypto_free(struct ssh_crypto_struct *crypto) crypto->ecdh_privkey = NULL; } #endif + SAFE_FREE(crypto->dh_server_signature); if (crypto->session_id != NULL) { explicit_bzero(crypto->session_id, crypto->digest_len); SAFE_FREE(crypto->session_id); |