Coverity complained about possible buffer overrun in two places added by
commit
1eb6d6527, and AFAICS it's reasonable to worry: even granting that
the WAL originator properly truncated the commit GID to GIDSIZE, we should
not really bet our lives on that having the same value as it does in the
current build. Hence, use strlcpy() not strcpy(), and adjust the pointer
advancement logic to be sure we skip over the whole source string even if
strlcpy() truncated it.
if (parsed->xinfo & XACT_XINFO_HAS_GID)
{
int gidlen;
- strcpy(parsed->twophase_gid, data);
- gidlen = strlen(parsed->twophase_gid) + 1;
+ strlcpy(parsed->twophase_gid, data, sizeof(parsed->twophase_gid));
+ gidlen = strlen(data) + 1;
data += MAXALIGN(gidlen);
}
}
if (parsed->xinfo & XACT_XINFO_HAS_GID)
{
int gidlen;
- strcpy(parsed->twophase_gid, data);
- gidlen = strlen(parsed->twophase_gid) + 1;
+ strlcpy(parsed->twophase_gid, data, sizeof(parsed->twophase_gid));
+ gidlen = strlen(data) + 1;
data += MAXALIGN(gidlen);
}
}