util: CID 1499409: Memory - corruptions (OVERLAPPING_COPY)
commita2590298b035404d507fac1ea0e11dcd88a939fa
authorMartin Schwenke <martin@meltin.net>
Fri, 18 Feb 2022 01:02:50 +0000 (18 12:02 +1100)
committerMartin Schwenke <martins@samba.org>
Tue, 22 Feb 2022 00:17:11 +0000 (22 00:17 +0000)
treef5bf5e5dc0ba928ec34b4e848a613196aeaaf98a
parent521e1195640446e2428e742ad32688508589f1ca
util: CID 1499409:  Memory - corruptions  (OVERLAPPING_COPY)

This is quite bizarre:

*** CID 1499409:  Memory - corruptions  (OVERLAPPING_COPY)
/lib/util/debug.c: 1742 in dbghdrclass()
1736       sizeof(tvbuf.buf),
1737       "%ld seconds since the Epoch", (long)t);
1738      }
1739      }
1740
1741      ensure_hostname();
>>>     CID 1499409:  Memory - corruptions  (OVERLAPPING_COPY)
>>>     In the call to function "snprintf", the object pointed to by argument "state.hostname" may overlap with the object pointed to by argument "state.header_str".
1742      state.hs_len = snprintf(state.header_str,
1743      sizeof(state.header_str),
1744      "%s %s %s[%u]: ",
1745      tvbuf.buf,
1746      state.hostname,
1747      state.prog_name,

Coverity doesn't explicitly say so but the only way this can happen is
if state.hostname is not NUL-terminated within its declared length.
ensure_hostname() and debug_set_hostname() ensure NUL-termination, but
the caching effect of ensure_hostname() probably stops Coverity from
being certain about anything.

Try making Coverity happy by using a precision to limit the number of
characters from hostname that can be used.

Signed-off-by: Martin Schwenke <martin@meltin.net>
Reviewed-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Autobuild-User(master): Martin Schwenke <martins@samba.org>
Autobuild-Date(master): Tue Feb 22 00:17:12 UTC 2022 on sn-devel-184
lib/util/debug.c