Message ID | 20210225174131.10115-3-julien@xen.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | xenstore: Address coverity issues in the LiveUpdate code | expand |
On 25.02.21 18:41, Julien Grall wrote: > From: Julien Grall <jgrall@amazon.com> > > At the moment, the return of talloc_strdup() is not checked. This means > we may dereference a NULL pointer if the allocation failed. > > However, it is pointless to allocate the memory as send_reply() will > copy the data to a different buffer. So drop the use of talloc_strdup(). > > This bug was discovered and resolved using Coverity Static Analysis > Security Testing (SAST) by Synopsys, Inc. > > Fixes: af216a99fb4a ("tools/xenstore: add the basic framework for doing the live update") > Signed-off-by: Julien Grall <jgrall@amazon.com> Reviewed-by: Juergen Gross <jgross@suse.com> Juergen
diff --git a/tools/xenstore/xenstored_control.c b/tools/xenstore/xenstored_control.c index e8a501acdb62..8eb57827765c 100644 --- a/tools/xenstore/xenstored_control.c +++ b/tools/xenstore/xenstored_control.c @@ -638,7 +638,6 @@ static bool do_lu_start(struct delayed_request *req) { time_t now = time(NULL); const char *ret; - char *resp; if (!lu_check_lu_allowed()) { if (now < lu_status->started_at + lu_status->timeout) @@ -660,8 +659,7 @@ static bool do_lu_start(struct delayed_request *req) out: talloc_free(lu_status); - resp = talloc_strdup(req->in, ret); - send_reply(lu_status->conn, XS_CONTROL, resp, strlen(resp) + 1); + send_reply(lu_status->conn, XS_CONTROL, ret, strlen(ret) + 1); return true; }