Blame SOURCES/0011-meshctl-Fix-possible-use_after_free.patch

150e62
From 56bda20ce9e3e5c4684b37cffd4527264c2b4c1e Mon Sep 17 00:00:00 2001
150e62
From: Gopal Tiwari <gtiwari@redhat.com>
150e62
Date: Tue, 31 May 2022 13:11:16 +0530
150e62
Subject: [PATCH BlueZ 11/12] meshctl: Fix possible use_after_free
150e62
150e62
Reported by coverity tool as follows :
150e62
150e62
bluez-5.64/tools/meshctl.c:1968: freed_arg: "g_free" frees "mesh_dir".
150e62
150e62
bluez-5.64/tools/meshctl.c:2018: double_free: Calling "g_free" frees
150e62
pointer "mesh_dir" which has already been freed.
150e62
---
150e62
 tools/meshctl.c | 1 -
150e62
 1 file changed, 1 deletion(-)
150e62
150e62
diff --git a/tools/meshctl.c b/tools/meshctl.c
150e62
index 18e20c40d..38ffd35f3 100644
150e62
--- a/tools/meshctl.c
150e62
+++ b/tools/meshctl.c
150e62
@@ -2015,7 +2015,6 @@ int main(int argc, char *argv[])
150e62
 
150e62
 fail:
150e62
 	bt_shell_cleanup();
150e62
-	g_free(mesh_dir);
150e62
 
150e62
 	return EXIT_FAILURE;
150e62
 }
150e62
-- 
150e62
2.26.2
150e62