diff options
Diffstat (limited to 'meta/recipes-bsp/grub/files/0038-loader-xnu-Fix-memory-leak.patch')
-rw-r--r-- | meta/recipes-bsp/grub/files/0038-loader-xnu-Fix-memory-leak.patch | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/meta/recipes-bsp/grub/files/0038-loader-xnu-Fix-memory-leak.patch b/meta/recipes-bsp/grub/files/0038-loader-xnu-Fix-memory-leak.patch new file mode 100644 index 0000000000..41f09a22fc --- /dev/null +++ b/meta/recipes-bsp/grub/files/0038-loader-xnu-Fix-memory-leak.patch | |||
@@ -0,0 +1,38 @@ | |||
1 | From 0a4aa7c16f65cdfaa1013f0796afa929f8d6dc1a Mon Sep 17 00:00:00 2001 | ||
2 | From: Darren Kenny <darren.kenny@oracle.com> | ||
3 | Date: Thu, 26 Nov 2020 12:53:10 +0000 | ||
4 | Subject: [PATCH] loader/xnu: Fix memory leak | ||
5 | |||
6 | The code here is finished with the memory stored in name, but it only | ||
7 | frees it if there curvalue is valid, while it could actually free it | ||
8 | regardless. | ||
9 | |||
10 | The fix is a simple relocation of the grub_free() to before the test | ||
11 | of curvalue. | ||
12 | |||
13 | Fixes: CID 96646 | ||
14 | |||
15 | Signed-off-by: Darren Kenny <darren.kenny@oracle.com> | ||
16 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
17 | |||
18 | Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=bcb59ece3263d118510c4440c4da0950f224bb7f] | ||
19 | Signed-off-by: Marta Rybczynska <marta.rybczynska@huawei.com> | ||
20 | --- | ||
21 | grub-core/loader/xnu.c | 2 +- | ||
22 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
23 | |||
24 | diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c | ||
25 | index 07232d2..b3029a8 100644 | ||
26 | --- a/grub-core/loader/xnu.c | ||
27 | +++ b/grub-core/loader/xnu.c | ||
28 | @@ -1388,9 +1388,9 @@ grub_xnu_fill_devicetree (void) | ||
29 | name[len] = 0; | ||
30 | |||
31 | curvalue = grub_xnu_create_value (curkey, name); | ||
32 | + grub_free (name); | ||
33 | if (!curvalue) | ||
34 | return grub_errno; | ||
35 | - grub_free (name); | ||
36 | |||
37 | data = grub_malloc (grub_strlen (var->value) + 1); | ||
38 | if (!data) | ||