From b934ce815ff2d233a63d3edae2ba80ef4c271243 Mon Sep 17 00:00:00 2001 From: Christian Marangi Date: Fri, 26 May 2023 19:10:43 +0200 Subject: program: fix memory leak in read_sourceinfo Fix Coverty Scan CID 1521109 reporting a memory leak for path not freed on read_size_t fail. Signed-off-by: Christian Marangi --- program.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) (limited to 'program.c') diff --git a/program.c b/program.c index f347a35..abd525a 100644 --- a/program.c +++ b/program.c @@ -587,8 +587,11 @@ read_sourceinfo(uc_source_t *input, uint32_t flags, char **errp, uc_program_t *p return NULL; } - if (!read_size_t(input->fp, &len, sizeof(uint32_t), "sourceinfo code buffer length", errp)) + if (!read_size_t(input->fp, &len, sizeof(uint32_t), "sourceinfo code buffer length", errp)) { + free(path); + return NULL; + } if (len > 0) { code = xalloc(len); -- cgit v1.2.3