[Devel] [PATCH 1/1] cgroups: strcpy destination string overflow

2010-10-18 Thread Evgeny Kuznetsov
From: Evgeny Kuznetsov Function "strcpy" is used without check for maximum allowed source string length and could cause destination string overflow. Check for string length is added before using "strcpy". Function now is return error if source string length is more than a max

[Devel] [PATCH 0/1] cgroups: strcpy destination string overflow

2010-10-18 Thread Evgeny Kuznetsov
Hi, Here is patch which fixes minor bug in /kernel/cgroup.c file. Function "strcpy" is used without check for maximum allowed source string length and could cause destination string overflow. Thanks, Best Regards, Evgeny Evgeny Kuznetsov (1): cgroups: strcpy destination strin