jpokorny / rpms / gnupg2

Forked from rpms/gnupg2 3 years ago
Clone
5e06ebb
diff -up gnupg-2.2.21/common/server-help.c.coverity gnupg-2.2.21/common/server-help.c
5e06ebb
--- gnupg-2.2.21/common/server-help.c.coverity	2019-02-11 10:59:34.000000000 +0100
5e06ebb
+++ gnupg-2.2.21/common/server-help.c	2020-07-20 17:09:57.416148768 +0200
d9ddd85
@@ -156,7 +156,7 @@ get_option_value (char *line, const char
d9ddd85
   *pend = 0;
d9ddd85
   *r_value = xtrystrdup (p);
d9ddd85
   *pend = c;
d9ddd85
-  if (!p)
d9ddd85
+  if (!*r_value)
d9ddd85
     return my_error_from_syserror ();
d9ddd85
   return 0;
d9ddd85
 }
5e06ebb
diff -up gnupg-2.2.21/dirmngr/domaininfo.c.coverity gnupg-2.2.21/dirmngr/domaininfo.c
5e06ebb
--- gnupg-2.2.21/dirmngr/domaininfo.c.coverity	2019-07-09 11:08:45.000000000 +0200
5e06ebb
+++ gnupg-2.2.21/dirmngr/domaininfo.c	2020-07-20 17:09:57.418148784 +0200
d9ddd85
@@ -193,6 +193,7 @@ insert_or_update (const char *domain,
d9ddd85
           log_error ("domaininfo: error allocating helper array: %s\n",
d9ddd85
                      gpg_strerror (gpg_err_code_from_syserror ()));
d9ddd85
           drop_extra = bucket;
d9ddd85
+          xfree (di_new);
d9ddd85
           goto leave;
d9ddd85
         }
d9ddd85
       narray = 0;
d9ddd85
@@ -258,6 +259,8 @@ insert_or_update (const char *domain,
d9ddd85
        * sensible strategy.  */
d9ddd85
       drop_extra = domainbuckets[hash];
d9ddd85
       domainbuckets[hash] = keep;
d9ddd85
+
d9ddd85
+      xfree (array);
d9ddd85
     }
d9ddd85
 
d9ddd85
   /* Insert */
5e06ebb
diff -up gnupg-2.2.21/dirmngr/http.c.coverity gnupg-2.2.21/dirmngr/http.c
5e06ebb
--- gnupg-2.2.21/dirmngr/http.c.coverity	2019-11-18 18:44:33.000000000 +0100
5e06ebb
+++ gnupg-2.2.21/dirmngr/http.c	2020-07-20 17:09:57.419148793 +0200
d9ddd85
@@ -3656,7 +3656,6 @@ http_prepare_redirect (http_redir_info_t
d9ddd85
       if (!newurl)
d9ddd85
         {
d9ddd85
           err = gpg_error_from_syserror ();
d9ddd85
-          http_release_parsed_uri (locuri);
d9ddd85
           return err;
d9ddd85
         }
d9ddd85
     }
d9ddd85
@@ -3675,7 +3674,6 @@ http_prepare_redirect (http_redir_info_t
d9ddd85
       if (!newurl)
d9ddd85
         {
d9ddd85
           err = gpg_error_from_syserror ();
d9ddd85
-          http_release_parsed_uri (locuri);
d9ddd85
           return err;
d9ddd85
         }
d9ddd85
     }
5e06ebb
diff -up gnupg-2.2.21/dirmngr/ks-engine-hkp.c.coverity gnupg-2.2.21/dirmngr/ks-engine-hkp.c
5e06ebb
--- gnupg-2.2.21/dirmngr/ks-engine-hkp.c.coverity	2019-11-18 18:44:33.000000000 +0100
5e06ebb
+++ gnupg-2.2.21/dirmngr/ks-engine-hkp.c	2020-07-20 17:09:57.419148793 +0200
d9ddd85
@@ -1426,7 +1426,7 @@ ks_hkp_search (ctrl_t ctrl, parsed_uri_t
d9ddd85
   int reselect;
d9ddd85
   unsigned int httpflags;
d9ddd85
   char *httphost = NULL;
d9ddd85
-  unsigned int http_status;
d9ddd85
+  unsigned int http_status = 0;
d9ddd85
   unsigned int tries = SEND_REQUEST_RETRIES;
d9ddd85
   unsigned int extra_tries = SEND_REQUEST_EXTRA_RETRIES;
d9ddd85
 
5e06ebb
diff -up gnupg-2.2.21/g10/card-util.c.coverity gnupg-2.2.21/g10/card-util.c
5e06ebb
--- gnupg-2.2.21/g10/card-util.c.coverity	2020-04-15 15:17:48.000000000 +0200
5e06ebb
+++ gnupg-2.2.21/g10/card-util.c	2020-07-20 17:09:57.419148793 +0200
5e06ebb
@@ -667,7 +667,7 @@ card_status (ctrl_t ctrl, estream_t fp,
d9ddd85
 {
d9ddd85
   int err;
d9ddd85
   strlist_t card_list, sl;
d9ddd85
-  char *serialno0, *serialno1;
d9ddd85
+  char *serialno0, *serialno1 = NULL;
d9ddd85
   int all_cards = 0;
d9ddd85
   int any_card = 0;
d9ddd85
 
5e06ebb
@@ -712,6 +712,7 @@ card_status (ctrl_t ctrl, estream_t fp,
d9ddd85
 
d9ddd85
       current_card_status (ctrl, fp, NULL, 0);
d9ddd85
       xfree (serialno1);
d9ddd85
+      serialno1 = NULL;
d9ddd85
 
d9ddd85
       if (!all_cards)
d9ddd85
         goto leave;
5e06ebb
diff -up gnupg-2.2.21/g10/import.c.coverity gnupg-2.2.21/g10/import.c
5e06ebb
--- gnupg-2.2.21/g10/import.c.coverity	2020-07-20 17:09:57.416148768 +0200
5e06ebb
+++ gnupg-2.2.21/g10/import.c	2020-07-20 17:09:57.419148793 +0200
d9ddd85
@@ -1888,7 +1888,7 @@ import_one_real (ctrl_t ctrl,
d9ddd85
 
d9ddd85
   if (opt.interactive && !silent)
d9ddd85
     {
d9ddd85
-      if (is_status_enabled())
d9ddd85
+      if (uidnode && is_status_enabled())
d9ddd85
         print_import_check (pk, uidnode->pkt->pkt.user_id);
d9ddd85
       merge_keys_and_selfsig (ctrl, keyblock);
d9ddd85
       tty_printf ("\n");
5e06ebb
diff -up gnupg-2.2.21/g10/keygen.c.coverity gnupg-2.2.21/g10/keygen.c
5e06ebb
--- gnupg-2.2.21/g10/keygen.c.coverity	2020-07-20 17:09:57.401148640 +0200
5e06ebb
+++ gnupg-2.2.21/g10/keygen.c	2020-07-20 17:09:57.420148801 +0200
d9ddd85
@@ -3075,7 +3075,7 @@ parse_key_parameter_part (ctrl_t ctrl,
d9ddd85
   char *endp;
d9ddd85
   const char *curve = NULL;
d9ddd85
   int ecdh_or_ecdsa = 0;
d9ddd85
-  unsigned int size;
d9ddd85
+  unsigned int size = 0;
d9ddd85
   int keyuse;
d9ddd85
   int i;
d9ddd85
   const char *s;
d9ddd85
@@ -5719,12 +5719,20 @@ gen_card_key (int keyno, int algo, int i
d9ddd85
      the self-signatures. */
d9ddd85
   err = agent_readkey (NULL, 1, keyid, &public);
d9ddd85
   if (err)
d9ddd85
-    return err;
d9ddd85
+    {
d9ddd85
+      xfree (pkt);
d9ddd85
+      xfree (pk);
d9ddd85
+      return err;
d9ddd85
+    }
d9ddd85
   err = gcry_sexp_sscan (&s_key, NULL, public,
d9ddd85
                          gcry_sexp_canon_len (public, 0, NULL, NULL));
d9ddd85
   xfree (public);
d9ddd85
   if (err)
d9ddd85
-    return err;
d9ddd85
+    {
d9ddd85
+      xfree (pkt);
d9ddd85
+      xfree (pk);
d9ddd85
+      return err;
d9ddd85
+    }
d9ddd85
 
d9ddd85
   if (algo == PUBKEY_ALGO_RSA)
d9ddd85
     err = key_from_sexp (pk->pkey, s_key, "public-key", "ne");
d9ddd85
@@ -5739,6 +5747,7 @@ gen_card_key (int keyno, int algo, int i
d9ddd85
   if (err)
d9ddd85
     {
d9ddd85
       log_error ("key_from_sexp failed: %s\n", gpg_strerror (err) );
d9ddd85
+      xfree (pkt);
d9ddd85
       free_public_key (pk);
d9ddd85
       return err;
d9ddd85
     }
5e06ebb
diff -up gnupg-2.2.21/g10/sig-check.c.coverity gnupg-2.2.21/g10/sig-check.c
5e06ebb
--- gnupg-2.2.21/g10/sig-check.c.coverity	2020-07-03 16:17:05.000000000 +0200
5e06ebb
+++ gnupg-2.2.21/g10/sig-check.c	2020-07-20 17:09:57.420148801 +0200
d9ddd85
@@ -902,6 +902,7 @@ check_signature_over_key_or_uid (ctrl_t
d9ddd85
                 {
d9ddd85
                   /* Issued by a subkey.  */
d9ddd85
                   signer = subk;
d9ddd85
+                  *is_selfsig = 1;
d9ddd85
                   break;
d9ddd85
                 }
d9ddd85
             }
5e06ebb
diff -up gnupg-2.2.21/g10/sign.c.coverity gnupg-2.2.21/g10/sign.c
5e06ebb
--- gnupg-2.2.21/g10/sign.c.coverity	2020-07-20 17:09:57.399148624 +0200
5e06ebb
+++ gnupg-2.2.21/g10/sign.c	2020-07-20 17:09:57.420148801 +0200
5e06ebb
@@ -824,7 +824,7 @@ write_signature_packets (ctrl_t ctrl,
d9ddd85
       PKT_public_key *pk;
d9ddd85
       PKT_signature *sig;
d9ddd85
       gcry_md_hd_t md;
d9ddd85
-      gpg_error_t err;
d9ddd85
+      gpg_error_t err = 0;
d9ddd85
 
d9ddd85
       pk = sk_rover->pk;
d9ddd85
 
5e06ebb
diff -up gnupg-2.2.21/kbx/keybox-dump.c.coverity gnupg-2.2.21/kbx/keybox-dump.c
5e06ebb
--- gnupg-2.2.21/kbx/keybox-dump.c.coverity	2019-08-23 15:59:06.000000000 +0200
5e06ebb
+++ gnupg-2.2.21/kbx/keybox-dump.c	2020-07-20 17:09:57.420148801 +0200
d9ddd85
@@ -786,11 +786,15 @@ _keybox_dump_cut_records (const char *fi
d9ddd85
   while ( !(rc = _keybox_read_blob (&blob, fp, NULL)) )
d9ddd85
     {
d9ddd85
       if (recno > to)
d9ddd85
-        break; /* Ready.  */
d9ddd85
+        {
d9ddd85
+          _keybox_release_blob (blob);
d9ddd85
+          break; /* Ready.  */
d9ddd85
+        }
d9ddd85
       if (recno >= from)
d9ddd85
         {
1aa575a
           if ((rc = _keybox_write_blob (blob, NULL, outfp)))
d9ddd85
             {
d9ddd85
+              _keybox_release_blob (blob);
d9ddd85
               fprintf (stderr, "error writing output: %s\n",
d9ddd85
                        gpg_strerror (rc));
d9ddd85
               goto leave;
5e06ebb
diff -up gnupg-2.2.21/tools/gpg-wks-server.c.coverity gnupg-2.2.21/tools/gpg-wks-server.c
5e06ebb
--- gnupg-2.2.21/tools/gpg-wks-server.c.coverity	2020-02-10 16:12:13.000000000 +0100
5e06ebb
+++ gnupg-2.2.21/tools/gpg-wks-server.c	2020-07-20 17:09:57.420148801 +0200
d9ddd85
@@ -890,15 +890,18 @@ store_key_as_pending (const char *dir, e
d9ddd85
     }
d9ddd85
 
d9ddd85
  leave:
d9ddd85
-  if (err)
d9ddd85
+  if (fname)
d9ddd85
     {
d9ddd85
-      es_fclose (outfp);
d9ddd85
-      gnupg_remove (fname);
d9ddd85
-    }
d9ddd85
-  else if (es_fclose (outfp))
d9ddd85
-    {
d9ddd85
-      err = gpg_error_from_syserror ();
d9ddd85
-      log_error ("error closing '%s': %s\n", fname, gpg_strerror (err));
d9ddd85
+      if (err)
d9ddd85
+        {
d9ddd85
+          es_fclose (outfp);
d9ddd85
+          gnupg_remove (fname);
d9ddd85
+        }
d9ddd85
+      else if (es_fclose (outfp))
d9ddd85
+        {
d9ddd85
+          err = gpg_error_from_syserror ();
d9ddd85
+          log_error ("error closing '%s': %s\n", fname, gpg_strerror (err));
d9ddd85
+        }
d9ddd85
     }
d9ddd85
 
d9ddd85
   if (!err)
5e06ebb
diff -up gnupg-2.2.21/tools/wks-util.c.coverity gnupg-2.2.21/tools/wks-util.c
5e06ebb
--- gnupg-2.2.21/tools/wks-util.c.coverity	2019-11-23 13:50:21.000000000 +0100
5e06ebb
+++ gnupg-2.2.21/tools/wks-util.c	2020-07-20 17:09:57.421148810 +0200
d9ddd85
@@ -948,7 +948,7 @@ ensure_policy_file (const char *addrspec
d9ddd85
 static gpg_error_t
d9ddd85
 install_key_from_spec_file (const char *fname)
d9ddd85
 {
d9ddd85
-  gpg_error_t err;
d9ddd85
+  gpg_error_t err = 0;
d9ddd85
   estream_t fp;
d9ddd85
   char *line = NULL;
d9ddd85
   size_t linelen = 0;
d9ddd85
@@ -1195,10 +1195,8 @@ wks_cmd_print_wkd_hash (const char *user
d9ddd85
   char *addrspec, *fname;
d9ddd85
 
d9ddd85
   err = wks_fname_from_userid (userid, 1, &fname, &addrspec);
d9ddd85
-  if (err)
d9ddd85
-    return err;
d9ddd85
-
d9ddd85
-  es_printf ("%s %s\n", fname, addrspec);
d9ddd85
+  if (!err)
d9ddd85
+    es_printf ("%s %s\n", fname, addrspec);
d9ddd85
 
d9ddd85
   xfree (fname);
d9ddd85
   xfree (addrspec);
d9ddd85
@@ -1216,7 +1214,10 @@ wks_cmd_print_wkd_url (const char *useri
d9ddd85
 
d9ddd85
   err = wks_fname_from_userid (userid, 1, &fname, &addrspec);
d9ddd85
   if (err)
d9ddd85
-    return err;
d9ddd85
+    {
d9ddd85
+      xfree (addrspec);
d9ddd85
+      return err;
d9ddd85
+    }
d9ddd85
 
d9ddd85
   domain = strchr (addrspec, '@');
d9ddd85
   if (domain)