Fix: sessiond: user/group name can be leaked on malformed command
authorJérémie Galarneau <jeremie.galarneau@efficios.com>
Fri, 27 Mar 2020 15:01:05 +0000 (11:01 -0400)
committerJérémie Galarneau <jeremie.galarneau@efficios.com>
Fri, 27 Mar 2020 15:03:27 +0000 (11:03 -0400)
commitd4e3717311122d9def6e4edbebae32ab6fd06507
treed9240cfbfc5223912c074d64be0bd16d7d189697
parent33cca43b7056157c19d720a90e0d9e11bef2b83e
Fix: sessiond: user/group name can be leaked on malformed command

process_attr_value_from_comm() can leak a copy of the user/group
name when the value type is erroneous. This is not reachable in
"normal" execution, but could be triggered by invalid "crafter"
lttng-ctl commands.

In process_attr_value_from_comm: Leak of memory or pointers to
system resources (CWE-404).

Reported-by: Coverity Scan
Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com>
Change-Id: I7ef55c0743c954a93e3d27ce17e6478708b49437
src/common/tracker.c
This page took 0.02636 seconds and 5 git commands to generate.