Defend against symlink attack by another process running as exim
[exim.git] / src / src / exim.c
index f2d0e9e656e118661c11541232cfa98a898a2b9c..91636fb30fc16ddb1648b085dfb74b6166434b95 100644 (file)
@@ -174,10 +174,8 @@ Returns:   nothing
 void
 set_process_info(const char *format, ...)
 {
-int len;
+int len = sprintf(CS process_info, "%5d ", (int)getpid());
 va_list ap;
-sprintf(CS process_info, "%5d ", (int)getpid());
-len = Ustrlen(process_info);
 va_start(ap, format);
 if (!string_vformat(process_info + len, PROCESS_INFO_SIZE - len - 2, format, ap))
   Ustrcpy(process_info + len, "**** string overflowed buffer ****");