Paulo Alcantara f0f326dc97 cifs: fix double free on failed kerberos auth
commit 39e8db3c860e2678ce5a7d74193925876507c9eb upstream.

If session setup failed with kerberos auth, we ended up freeing
cifs_ses::auth_key.response twice in SMB2_auth_kerberos() and
sesInfoFree().

Fix this by zeroing out cifs_ses::auth_key.response after freeing it
in SMB2_auth_kerberos().

Fixes: a4e430c8c8ba ("cifs: replace kfree() with kfree_sensitive() for sensitive data")
Signed-off-by: Paulo Alcantara (SUSE) <pc@cjr.nz>
Acked-by: Ronnie Sahlberg <lsahlber@redhat.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-01-18 11:58:15 +01:00
..
2022-10-19 17:57:51 -05:00
2022-12-21 17:48:11 +01:00
2022-12-21 17:48:11 +01:00
2022-10-18 11:33:43 -05:00
2022-01-19 11:21:08 -06:00
2022-12-21 17:48:11 +01:00
2019-01-24 09:37:33 -06:00
2022-10-10 09:10:28 -07:00
2021-04-25 16:28:23 -05:00