f0ad2aa
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
f0ad2aa
From: Daniel Axtens <dja@axtens.net>
f0ad2aa
Date: Fri, 25 Jun 2021 02:19:05 +1000
f0ad2aa
Subject: [PATCH] kern/file: Do not leak device_name on error in
f0ad2aa
 grub_file_open()
f0ad2aa
f0ad2aa
If we have an error in grub_file_open() before we free device_name, we
f0ad2aa
will leak it.
f0ad2aa
f0ad2aa
Free device_name in the error path and null out the pointer in the good
f0ad2aa
path once we free it there.
f0ad2aa
f0ad2aa
Signed-off-by: Daniel Axtens <dja@axtens.net>
f0ad2aa
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
f0ad2aa
(cherry picked from commit 1499a5068839fa37cb77ecef4b5bdacbd1ed12ea)
f0ad2aa
---
f0ad2aa
 grub-core/kern/file.c | 2 ++
f0ad2aa
 1 file changed, 2 insertions(+)
f0ad2aa
f0ad2aa
diff --git a/grub-core/kern/file.c b/grub-core/kern/file.c
85cfe6d
index ec10e54fc0..db938e099d 100644
f0ad2aa
--- a/grub-core/kern/file.c
f0ad2aa
+++ b/grub-core/kern/file.c
85cfe6d
@@ -84,6 +84,7 @@ grub_file_open (const char *name, enum grub_file_type type)
f0ad2aa
 
f0ad2aa
   device = grub_device_open (device_name);
f0ad2aa
   grub_free (device_name);
f0ad2aa
+  device_name = NULL;
f0ad2aa
   if (! device)
f0ad2aa
     goto fail;
f0ad2aa
 
85cfe6d
@@ -138,6 +139,7 @@ grub_file_open (const char *name, enum grub_file_type type)
f0ad2aa
   return file;
f0ad2aa
 
f0ad2aa
  fail:
f0ad2aa
+  grub_free (device_name);
f0ad2aa
   if (device)
f0ad2aa
     grub_device_close (device);
f0ad2aa