On Sat, Jan 01, 2022 at 03:48:25PM -0600, Glenn Washburn wrote:
> The Coverity output is:
>
>   *** CID 366905:  Memory - illegal accesses  (USE_AFTER_FREE)
>   /grub-core/disk/cryptodisk.c: 1064 in grub_cryptodisk_scan_device_real()
>   1058      cleanup:
>   1059       if (askpass)
>   1060         {
>   1061           cargs->key_len = 0;
>   1062           grub_free (cargs->key_data);
>   1063         }
>   >>>     CID 366905:  Memory - illegal accesses  (USE_AFTER_FREE)
>   >>>     Using freed pointer "dev".
>   1064       return dev;
>   1065     }
>   1066
>   1067     #ifdef GRUB_UTIL
>   1068     #include <grub/util/misc.h>
>   1069     grub_err_t
>
> Here the 'dev' variable can point to a freed cryptodisk device if the
> function grub_cryptodisk_insert() fails. This can happen only on a OOM
> condition, but when this happens grub_cryptodisk_insert() calls grub_free on
> the passed device. Since grub_cryptodisk_scan_device_real() assumes that
> grub_cryptodisk_insert() is always successful, it will return the device,
> though the device was freed.
>
> Change grub_cryptodisk_insert() to not free the passed device on failure.
> Then on grub_cryptodisk_insert() failure, free the device pointer. This is
> done by going to the label 'error', which will call cryptodisk_close() to
> free the device and set the device pointer to NULL, so that a pointer to
> freed memory is not returned.
>
> Signed-off-by: Glenn Washburn <developm...@efficientek.com>

Reviewed-by: Daniel Kiper <daniel.ki...@oracle.com>

Daniel

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to