Hi,

Please find the latest report on new defect(s) introduced to coreboot found 
with Coverity Scan.

2 new defect(s) introduced to coreboot found with Coverity Scan.
1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent 
build analyzed by Coverity Scan.

New defect(s) Reported-by: Coverity Scan
Showing 2 of 2 defect(s)


** CID 1497845:  Memory - corruptions  (USE_AFTER_FREE)
/3rdparty/vboot/futility/file_type_bios.c: 282 in write_new_preamble()


________________________________________________________________________________________________________
*** CID 1497845:  Memory - corruptions  (USE_AFTER_FREE)
/3rdparty/vboot/futility/file_type_bios.c: 282 in write_new_preamble()
276             /* and the new preamble */
277             memcpy(vblock->buf + more, preamble, preamble->preamble_size);
278             retval = 0;
279     
280     end:
281             free(preamble);
>>>     CID 1497845:  Memory - corruptions  (USE_AFTER_FREE)
>>>     Calling "free" frees pointer "body_sig" which has already been freed. 
>>> [Note: The source code implementation of the function has been overridden 
>>> by a builtin model.]
282             free(body_sig);
283     
284             return retval;
285     }
286     
287     static int write_loem(const char *ab, struct bios_area_s *vblock)

** CID 1497844:  Memory - corruptions  (USE_AFTER_FREE)
/3rdparty/vboot/futility/cmd_sign.c: 307 in ft_sign_raw_firmware()


________________________________________________________________________________________________________
*** CID 1497844:  Memory - corruptions  (USE_AFTER_FREE)
/3rdparty/vboot/futility/cmd_sign.c: 307 in ft_sign_raw_firmware()
301                                 sign_option.keyblock->keyblock_size,
302                                 preamble, preamble->preamble_size);
303     
304     done:
305             futil_unmap_and_close_file(fd, FILE_MODE_SIGN(sign_option), 
buf, len);
306             free(preamble);
>>>     CID 1497844:  Memory - corruptions  (USE_AFTER_FREE)
>>>     Calling "free" frees pointer "body_sig" which has already been freed. 
>>> [Note: The source code implementation of the function has been overridden 
>>> by a builtin model.]
307             free(body_sig);
308     
309             return rv;
310     }
311     
312     static int load_keyset(void)


________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yq2SfQfrHt3Prsn4qSLrYIrajINpiFX8l0vrlNSf8iCrS27qY0Cr0DkycwNUgGZJj8-3DIzmk_L-2FDzr14mnrsJO5b1wX1hp9b1MAQygl7x-2B74RAaH2cn2nuql2Qi8yQkrP8UkShUmiF6yy9jiiX6wQZG8h-2FMRvalrwVYPh5dV3ki06XmsztOQK4ew64NjMASOZ86HsEyfqlrGN-2Fx34rAPdvBnAliG6pVR-2FokPAfWPZ3tYKxmUsdfo0N-2FVjPrGPb8mk3oU-2F-2B-2FmASJA263-2BycM5GigdVHQusAQ-3D-3D

_______________________________________________
coreboot mailing list -- coreboot@coreboot.org
To unsubscribe send an email to coreboot-le...@coreboot.org

Reply via email to