From: Jérémie Galarneau Date: Thu, 22 Apr 2021 18:47:14 +0000 (-0400) Subject: Fix: sessiond: leak of config_path on duplicate --config option X-Git-Tag: v2.11.7~1 X-Git-Url: https://git.lttng.org./?a=commitdiff_plain;h=3b7acd378075874ea852b0c63aa468e8c4fd1cec;p=lttng-tools.git Fix: sessiond: leak of config_path on duplicate --config option 1452207 Resource leak The system resource will not be reclaimed and reused, reducing the future availability of the resource. CID 1452373 (#3 of 3): Resource leak (RESOURCE_LEAK) 26. overwrite_var: Overwriting config_path in config_path = utils_expand_path(optarg) leaks the storage that config_path points to. Reported-by: Coverity Scan Signed-off-by: Jérémie Galarneau Change-Id: I70eff0f4de5ac9b84b699e88232669259eab54db --- diff --git a/src/bin/lttng-sessiond/main.c b/src/bin/lttng-sessiond/main.c index db70a7cda..aec2af425 100644 --- a/src/bin/lttng-sessiond/main.c +++ b/src/bin/lttng-sessiond/main.c @@ -797,7 +797,7 @@ static int set_options(int argc, char **argv) int ret = 0, c = 0, option_index = 0; int orig_optopt = optopt, orig_optind = optind; char *optstring; - const char *config_path = NULL; + char *config_path = NULL; optstring = utils_generate_optstring(long_options, sizeof(long_options) / sizeof(struct option)); @@ -821,6 +821,7 @@ static int set_options(int argc, char **argv) WARN("Getting '%s' argument from setuid/setgid binary refused for security reasons.", "-f, --config"); } else { + free(config_path); config_path = utils_expand_path(optarg); if (!config_path) { ERR("Failed to resolve path: %s", optarg); @@ -866,6 +867,7 @@ static int set_options(int argc, char **argv) } end: + free(config_path); free(optstring); return ret; }