On 23.06.2022 13:24, Julien Grall wrote:
> From: Julien Grall <jgr...@amazon.com>
> 
> At the moment, corrupt() is neither checking for allocation failure
> nor freeing the allocated memory.
> 
> Harden the code by printing ENOMEM if the allocation failed and
> free 'str' after the last use.
> 
> This is not considered to be a security issue because corrupt() should
> only be called when Xenstored thinks the database is corrupted. Note
> that the trigger (i.e. a guest reliably provoking the call) would be
> a security issue.
> 
> Fixes: 06d17943f0cd ("Added a basic integrity checker, and some basic ability 
> to recover from store")
> Signed-off-by: Julien Grall <jgr...@amazon.com>

Is this something which would want queuing for backport?

Jan

Reply via email to