michal-grzedzicki / rpms / rpm

Forked from rpms/rpm 4 months ago
Clone
bfc6f7
commit c7d7c5acd0c14d0450016887cba1d86483086794
bfc6f7
Author: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date:   Mon Jun 21 10:05:10 2021 +0200
bfc6f7
bfc6f7
    Add quoting to literal curly brackets
bfc6f7
    
bfc6f7
    These curly brackets are already treated as literals by the shell, so
bfc6f7
    let's make that explicit for clarity, and silence a ShellCheck warning
bfc6f7
    at the same time.
bfc6f7
    
bfc6f7
    More info: https://github.com/koalaman/shellcheck/wiki/SC1083
bfc6f7
    
bfc6f7
    Found by ShellCheck.
bfc6f7
bfc6f7
diff -up rpm-4.16.1.3/scripts/check-rpaths-worker.orig rpm-4.16.1.3/scripts/check-rpaths-worker
bfc6f7
--- rpm-4.16.1.3/scripts/check-rpaths-worker.orig	2021-06-29 15:34:31.671003589 +0200
bfc6f7
+++ rpm-4.16.1.3/scripts/check-rpaths-worker	2021-06-29 15:34:51.993414093 +0200
bfc6f7
@@ -120,13 +120,13 @@ for i; do
bfc6f7
 	        (/lib64/*|/usr/lib64/*|/usr/X11R6/lib64/*|/usr/local/lib64/*)
bfc6f7
 		    badness=0;;
bfc6f7
 
bfc6f7
-		(\$ORIGIN|\${ORIGINX}|\$ORIGIN/*|\${ORIGINX}/*)
bfc6f7
+		(\$ORIGIN|\$\{ORIGINX\}|\$ORIGIN/*|\$\{ORIGINX\}/*)
bfc6f7
 		    test $allow_ORIGIN -eq 0 && badness=8 || {
bfc6f7
 			badness=0
bfc6f7
 			new_allow_ORIGIN=1
bfc6f7
 		    }
bfc6f7
 		    ;;
bfc6f7
-		(/*\$PLATFORM*|/*\${PLATFORM}*|/*\$LIB*|/*\${LIB}*)
bfc6f7
+		(/*\$PLATFORM*|/*\$\{PLATFORM\}*|/*\$LIB*|/*\$\{LIB\}*)
bfc6f7
 		    badness=0;;
bfc6f7
 	    	
bfc6f7
 	        (/lib|/usr/lib|/usr/X11R6/lib)
bfc6f7
From d8dc4fd37b1d90cd97de7fcf484d449ec132c9b3 Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Wed, 9 Jun 2021 21:31:40 +0200
bfc6f7
Subject: [PATCH 1/7] Fix memory leak in sqlexec()
bfc6f7
bfc6f7
Callers are supposed to free the error strings themselves:
bfc6f7
https://www.sqlite.org/capi3ref.html#sqlite3_exec
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 lib/backend/sqlite.c | 1 +
bfc6f7
 1 file changed, 1 insertion(+)
bfc6f7
bfc6f7
diff --git a/lib/backend/sqlite.c b/lib/backend/sqlite.c
bfc6f7
index 7c2de45aa..dbefeb163 100644
bfc6f7
--- a/lib/backend/sqlite.c
bfc6f7
+++ b/lib/backend/sqlite.c
bfc6f7
@@ -233,6 +233,7 @@ static int sqlexec(sqlite3 *sdb, const char *fmt, ...)
bfc6f7
 	rpmlog(RPMLOG_DEBUG, "%s: %d\n", cmd, rc);
bfc6f7
 
bfc6f7
     sqlite3_free(cmd);
bfc6f7
+    sqlite3_free(err);
bfc6f7
 
bfc6f7
     return rc ? RPMRC_FAIL : RPMRC_OK;
bfc6f7
 }
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7
bfc6f7
From 5baf73feb4951cc3b3f553a4b18d3b3599cbf87c Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Fri, 25 Jun 2021 11:21:46 +0200
bfc6f7
Subject: [PATCH 2/7] Always free the arg list passed to rpmGlob()
bfc6f7
bfc6f7
Even though the actual implementation of rpmGlob() does not allocate the
bfc6f7
passed arg list (av) if the return code (rc) is non-zero or arg count
bfc6f7
(ac) is 0, it's the responsibility of the caller (rpmInstall() here) to
bfc6f7
free that memory, so make sure we do that irrespectively of the above
bfc6f7
conditions.
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 lib/rpminstall.c | 1 +
bfc6f7
 1 file changed, 1 insertion(+)
bfc6f7
bfc6f7
diff --git a/lib/rpminstall.c b/lib/rpminstall.c
bfc6f7
index 724126e94..302ec0ba1 100644
bfc6f7
--- a/lib/rpminstall.c
bfc6f7
+++ b/lib/rpminstall.c
bfc6f7
@@ -461,6 +461,7 @@ int rpmInstall(rpmts ts, struct rpmInstallArguments_s * ia, ARGV_t fileArgv)
bfc6f7
 		rpmlog(RPMLOG_ERR, _("File not found by glob: %s\n"), *eiu->fnp);
bfc6f7
 	    }
bfc6f7
 	    eiu->numFailed++;
bfc6f7
+	    argvFree(av);
bfc6f7
 	    continue;
bfc6f7
 	}
bfc6f7
 
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7
bfc6f7
From 3c8b01b67ec907afaaffe71691fa41b878578527 Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Mon, 14 Jun 2021 10:21:25 +0200
bfc6f7
Subject: [PATCH 3/7] Fix resource leak in Fts_children()
bfc6f7
bfc6f7
This function is not used anywhere within our codebase (and neither is
bfc6f7
it part of the public API) so it's basically a no-op... Still, rather
bfc6f7
than yanking it completely, let's just silence the Coverity error here.
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 misc/fts.c | 4 +++-
bfc6f7
 1 file changed, 3 insertions(+), 1 deletion(-)
bfc6f7
bfc6f7
diff --git a/misc/fts.c b/misc/fts.c
bfc6f7
index d3ebb2946..caf27495d 100644
bfc6f7
--- a/misc/fts.c
bfc6f7
+++ b/misc/fts.c
bfc6f7
@@ -585,8 +585,10 @@ Fts_children(FTS * sp, int instr)
bfc6f7
 	if ((fd = __open(".", O_RDONLY, 0)) < 0)
bfc6f7
 		return (NULL);
bfc6f7
 	sp->fts_child = fts_build(sp, instr);
bfc6f7
-	if (__fchdir(fd))
bfc6f7
+	if (__fchdir(fd)) {
bfc6f7
+		(void)__close(fd);
bfc6f7
 		return (NULL);
bfc6f7
+	}
bfc6f7
 	(void)__close(fd);
bfc6f7
 	return (sp->fts_child);
bfc6f7
 }
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7
bfc6f7
From 39b7bf8579e0522cf16347b3a7e332d3b6d742c6 Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Mon, 14 Jun 2021 12:34:23 +0200
bfc6f7
Subject: [PATCH 4/7] Fix memory leak in fts_build()
bfc6f7
bfc6f7
Turns out this leak is already fixed in glibc's current version of fts.c
bfc6f7
(where our copy originates from), so let's just backport that.
bfc6f7
bfc6f7
Original commit in glibc:
bfc6f7
https://sourceware.org/git/?p=glibc.git;\
bfc6f7
a=commit;h=db67c2c98b89a5723af44df54f38b779de8d4a65
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 misc/fts.c | 2 ++
bfc6f7
 1 file changed, 2 insertions(+)
bfc6f7
bfc6f7
diff --git a/misc/fts.c b/misc/fts.c
bfc6f7
index caf27495d..f7fce0eaa 100644
bfc6f7
--- a/misc/fts.c
bfc6f7
+++ b/misc/fts.c
bfc6f7
@@ -855,6 +855,7 @@ mem1:				saved_errno = errno;
bfc6f7
 	     fts_safe_changedir(sp, cur->fts_parent, -1, ".."))) {
bfc6f7
 		cur->fts_info = FTS_ERR;
bfc6f7
 		SET(FTS_STOP);
bfc6f7
+		fts_lfree(head);
bfc6f7
 		return (NULL);
bfc6f7
 	}
bfc6f7
 
bfc6f7
@@ -862,6 +863,7 @@ mem1:				saved_errno = errno;
bfc6f7
 	if (!nitems) {
bfc6f7
 		if (type == BREAD)
bfc6f7
 			cur->fts_info = FTS_DP;
bfc6f7
+		fts_lfree(head);
bfc6f7
 		return (NULL);
bfc6f7
 	}
bfc6f7
 
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7
bfc6f7
From 9c093c4f092dd6bd1e0c8d2b852a72b74db076c2 Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Tue, 15 Jun 2021 13:34:21 +0200
bfc6f7
Subject: [PATCH 5/7] Fix memory leak in decodePkts()
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 rpmio/rpmpgp.c | 6 +++++-
bfc6f7
 1 file changed, 5 insertions(+), 1 deletion(-)
bfc6f7
bfc6f7
diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c
bfc6f7
index c59185dce..ee5c81e24 100644
bfc6f7
--- a/rpmio/rpmpgp.c
bfc6f7
+++ b/rpmio/rpmpgp.c
bfc6f7
@@ -1371,9 +1371,13 @@ static pgpArmor decodePkts(uint8_t *b, uint8_t **pkt, size_t *pktlen)
bfc6f7
 	    crc = pgpCRC(dec, declen);
bfc6f7
 	    if (crcpkt != crc) {
bfc6f7
 		ec = PGPARMOR_ERR_CRC_CHECK;
bfc6f7
+		_free(dec);
bfc6f7
 		goto exit;
bfc6f7
 	    }
bfc6f7
-	    if (pkt) *pkt = dec;
bfc6f7
+	    if (pkt)
bfc6f7
+		*pkt = dec;
bfc6f7
+	    else
bfc6f7
+		_free(dec);
bfc6f7
 	    if (pktlen) *pktlen = declen;
bfc6f7
 	    ec = PGPARMOR_PUBKEY;	/* XXX ASCII Pubkeys only, please. */
bfc6f7
 	    goto exit;
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7
bfc6f7
From 590b2fc06252567eb7d57197dc361a8b459d62a3 Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Mon, 21 Jun 2021 17:51:14 +0200
bfc6f7
Subject: [PATCH 6/7] Fix memory leak with multiple %lang-s in one line
bfc6f7
bfc6f7
We permit two equivalent forms of specifying a list of languages per
bfc6f7
file:
bfc6f7
bfc6f7
  %lang(xx,yy,zz) /path/to/file
bfc6f7
  %lang(xx) %lang(yy) %lang(zz) /path/to/file
bfc6f7
bfc6f7
The leak was when parsing the second form.
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 build/files.c | 2 ++
bfc6f7
 1 file changed, 2 insertions(+)
bfc6f7
bfc6f7
diff --git a/build/files.c b/build/files.c
bfc6f7
index f8153ad2b..0c8859f6c 100644
bfc6f7
--- a/build/files.c
bfc6f7
+++ b/build/files.c
bfc6f7
@@ -777,6 +777,8 @@ static rpmRC parseForLang(char * buf, FileEntry cur)
bfc6f7
 
bfc6f7
 	if (*pe == ',') pe++;	/* skip , if present */
bfc6f7
     }
bfc6f7
+
bfc6f7
+    q = _free(q);
bfc6f7
   }
bfc6f7
 
bfc6f7
     rc = RPMRC_OK;
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7
bfc6f7
From b7a1e996326ee29a163d67ceb1e6127fdc251c14 Mon Sep 17 00:00:00 2001
bfc6f7
From: Michal Domonkos <mdomonko@redhat.com>
bfc6f7
Date: Fri, 25 Jun 2021 15:15:08 +0200
bfc6f7
Subject: [PATCH 7/7] Fix memory leaks in Lua rex extension
bfc6f7
bfc6f7
This covers the following usage:
bfc6f7
bfc6f7
expr = rex.newPOSIX(<regex>)
bfc6f7
expr:match(<string>)           # A leak occurred here
bfc6f7
expr:gmatch(<string>, <func>)  # A leak occurred here
bfc6f7
bfc6f7
Found by Coverity.
bfc6f7
---
bfc6f7
 luaext/lrexlib.c | 9 ++++++---
bfc6f7
 1 file changed, 6 insertions(+), 3 deletions(-)
bfc6f7
bfc6f7
diff --git a/luaext/lrexlib.c b/luaext/lrexlib.c
bfc6f7
index 09c5a6454..0f29b6371 100644
bfc6f7
--- a/luaext/lrexlib.c
bfc6f7
+++ b/luaext/lrexlib.c
bfc6f7
@@ -80,6 +80,7 @@ static void rex_push_matches(lua_State *L, const char *text, regmatch_t *match,
bfc6f7
 
bfc6f7
 static int rex_match(lua_State *L)
bfc6f7
 {
bfc6f7
+  int rc = 0;
bfc6f7
   int res;
bfc6f7
 #ifdef REG_BASIC
bfc6f7
   size_t len;
bfc6f7
@@ -109,9 +110,10 @@ static int rex_match(lua_State *L)
bfc6f7
     lua_pushstring(L, "n");
bfc6f7
     lua_pushnumber(L, ncapt);
bfc6f7
     lua_rawset(L, -3);
bfc6f7
-    return 3;
bfc6f7
-  } else
bfc6f7
-    return 0;
bfc6f7
+    rc = 3;
bfc6f7
+  }
bfc6f7
+  free(match);
bfc6f7
+  return rc;
bfc6f7
 }
bfc6f7
 
bfc6f7
 static int rex_gmatch(lua_State *L)
bfc6f7
@@ -158,6 +160,7 @@ static int rex_gmatch(lua_State *L)
bfc6f7
       break;
bfc6f7
   }
bfc6f7
   lua_pushnumber(L, nmatch);
bfc6f7
+  free(match);
bfc6f7
   return 1;
bfc6f7
 }
bfc6f7
 
bfc6f7
-- 
bfc6f7
2.31.1
bfc6f7