mirror of
https://github.com/moparisthebest/pacman
synced 2024-11-12 04:15:06 -05:00
Fix memory leak in download payload->remote_name
In the sync code, we explicitly allocated a string for this field, while in the dload code itself it was filled in with a pointer to another string. This led to a memory leak in the sync download case. Make remote_name non-const and always explicitly allocate it. This patch ensures this as well as uses malloc + snprintf (rather than calloc) in several codepaths, and eliminates the only use of PATH_MAX in the download code. Signed-off-by: Dan McGee <dan@archlinux.org>
This commit is contained in:
parent
ea3c47825e
commit
f66f9f11cd
@ -60,7 +60,7 @@ static char *get_fullpath(const char *path, const char *filename,
|
|||||||
char *filepath;
|
char *filepath;
|
||||||
/* len = localpath len + filename len + suffix len + null */
|
/* len = localpath len + filename len + suffix len + null */
|
||||||
size_t len = strlen(path) + strlen(filename) + strlen(suffix) + 1;
|
size_t len = strlen(path) + strlen(filename) + strlen(suffix) + 1;
|
||||||
CALLOC(filepath, len, sizeof(char), return NULL);
|
MALLOC(filepath, len, return NULL);
|
||||||
snprintf(filepath, len, "%s%s%s", path, filename, suffix);
|
snprintf(filepath, len, "%s%s%s", path, filename, suffix);
|
||||||
|
|
||||||
return filepath;
|
return filepath;
|
||||||
@ -279,22 +279,27 @@ static FILE *create_tempfile(struct dload_payload *payload, const char *localpat
|
|||||||
{
|
{
|
||||||
int fd;
|
int fd;
|
||||||
FILE *fp;
|
FILE *fp;
|
||||||
char randpath[PATH_MAX];
|
char *randpath;
|
||||||
alpm_handle_t *handle = payload->handle;
|
size_t len;
|
||||||
|
|
||||||
/* create a random filename, which is opened with O_EXCL */
|
/* create a random filename, which is opened with O_EXCL */
|
||||||
snprintf(randpath, PATH_MAX, "%salpmtmp.XXXXXX", localpath);
|
len = strlen(localpath) + 14 + 1;
|
||||||
|
MALLOC(randpath, len, RET_ERR(payload->handle, ALPM_ERR_MEMORY, NULL));
|
||||||
|
snprintf(randpath, len, "%salpmtmp.XXXXXX", localpath);
|
||||||
if((fd = mkstemp(randpath)) == -1 ||
|
if((fd = mkstemp(randpath)) == -1 ||
|
||||||
!(fp = fdopen(fd, payload->tempfile_openmode))) {
|
!(fp = fdopen(fd, payload->tempfile_openmode))) {
|
||||||
unlink(randpath);
|
unlink(randpath);
|
||||||
close(fd);
|
close(fd);
|
||||||
_alpm_log(handle, ALPM_LOG_ERROR,
|
_alpm_log(payload->handle, ALPM_LOG_ERROR,
|
||||||
_("failed to create temporary file for download\n"));
|
_("failed to create temporary file for download\n"));
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
/* fp now points to our alpmtmp.XXXXXX */
|
/* fp now points to our alpmtmp.XXXXXX */
|
||||||
STRDUP(payload->tempfile_name, randpath, RET_ERR(handle, ALPM_ERR_MEMORY, NULL));
|
free(payload->tempfile_name);
|
||||||
payload->remote_name = strrchr(randpath, '/') + 1;
|
payload->tempfile_name = randpath;
|
||||||
|
free(payload->remote_name);
|
||||||
|
STRDUP(payload->remote_name, strrchr(randpath, '/') + 1,
|
||||||
|
RET_ERR(payload->handle, ALPM_ERR_MEMORY, NULL));
|
||||||
|
|
||||||
return fp;
|
return fp;
|
||||||
}
|
}
|
||||||
@ -318,7 +323,7 @@ static int curl_download_internal(struct dload_payload *payload,
|
|||||||
|
|
||||||
payload->tempfile_openmode = "wb";
|
payload->tempfile_openmode = "wb";
|
||||||
if(!payload->remote_name) {
|
if(!payload->remote_name) {
|
||||||
payload->remote_name = get_filename(payload->fileurl);
|
payload->remote_name = strdup(get_filename(payload->fileurl));
|
||||||
}
|
}
|
||||||
if(!payload->remote_name || curl_gethost(payload->fileurl, hostname) != 0) {
|
if(!payload->remote_name || curl_gethost(payload->fileurl, hostname) != 0) {
|
||||||
_alpm_log(handle, ALPM_LOG_ERROR, _("url '%s' is invalid\n"), payload->fileurl);
|
_alpm_log(handle, ALPM_LOG_ERROR, _("url '%s' is invalid\n"), payload->fileurl);
|
||||||
@ -591,10 +596,11 @@ char SYMEXPORT *alpm_fetch_pkgurl(alpm_handle_t *handle, const char *url)
|
|||||||
void _alpm_dload_payload_free(struct dload_payload *payload) {
|
void _alpm_dload_payload_free(struct dload_payload *payload) {
|
||||||
ASSERT(payload, return);
|
ASSERT(payload, return);
|
||||||
|
|
||||||
FREE(payload->fileurl);
|
FREE(payload->remote_name);
|
||||||
FREE(payload->content_disp_name);
|
|
||||||
FREE(payload->tempfile_name);
|
FREE(payload->tempfile_name);
|
||||||
FREE(payload->destfile_name);
|
FREE(payload->destfile_name);
|
||||||
|
FREE(payload->content_disp_name);
|
||||||
|
FREE(payload->fileurl);
|
||||||
FREE(payload);
|
FREE(payload);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -27,8 +27,8 @@
|
|||||||
|
|
||||||
struct dload_payload {
|
struct dload_payload {
|
||||||
alpm_handle_t *handle;
|
alpm_handle_t *handle;
|
||||||
const char *remote_name;
|
|
||||||
const char *tempfile_openmode;
|
const char *tempfile_openmode;
|
||||||
|
char *remote_name;
|
||||||
char *tempfile_name;
|
char *tempfile_name;
|
||||||
char *destfile_name;
|
char *destfile_name;
|
||||||
char *content_disp_name;
|
char *content_disp_name;
|
||||||
|
@ -872,7 +872,7 @@ static int download_files(alpm_handle_t *handle, alpm_list_t **deltas)
|
|||||||
|
|
||||||
/* print server + filename into a buffer */
|
/* print server + filename into a buffer */
|
||||||
len = strlen(server_url) + strlen(payload->remote_name) + 2;
|
len = strlen(server_url) + strlen(payload->remote_name) + 2;
|
||||||
CALLOC(payload->fileurl, len, sizeof(char), RET_ERR(handle, ALPM_ERR_MEMORY, -1));
|
MALLOC(payload->fileurl, len, RET_ERR(handle, ALPM_ERR_MEMORY, -1));
|
||||||
snprintf(payload->fileurl, len, "%s/%s", server_url, payload->remote_name);
|
snprintf(payload->fileurl, len, "%s/%s", server_url, payload->remote_name);
|
||||||
payload->handle = handle;
|
payload->handle = handle;
|
||||||
payload->allow_resume = 1;
|
payload->allow_resume = 1;
|
||||||
|
Loading…
Reference in New Issue
Block a user