[PATCH] crypto/openssl: fix memory leak in auth processing function

Ji, Kai kai.ji at intel.com
Tue Jun 20 12:01:51 CEST 2023


Acked-by: Kai Ji <kai.ji at intel.com<mailto:kai.ji at intel.com>>


> -----Original Message-----
> From: Didier Pallard <didier.pallard at 6wind.com>
> Sent: Tuesday 18 April 2023 15:26
> To: dev at dpdk.org
> Cc: stable at dpdk.org; Ji, Kai <kai.ji at intel.com>; Akhil Goyal
> <gakhil at marvell.com>; Fan Zhang <fanzhang.oss at gmail.com>; Ashwin
> Sekhar T K <asekhar at marvell.com>
> Subject: [PATCH] crypto/openssl: fix memory leak in auth processing
> function
>
> Contexts allocated with EVP_MAC_CTX_new calls are leaking, they are
> created then overwritten by the return value of EVP_MAC_CTX_dup call.
>
> Fixes: 75adf1eae44f ("crypto/openssl: update HMAC routine with 3.0 EVP
> API")
> Fixes: 2b9c693f6ef5 ("crypto/openssl: support AES-CMAC operations")
> Signed-off-by: Didier Pallard <didier.pallard at 6wind.com>
> Cc: stable at dpdk.org
> ---
> --
> 2.30.2

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mails.dpdk.org/archives/stable/attachments/20230620/035964f7/attachment.htm>


More information about the stable mailing list