in RHEL6 those strings are copied using strcpy - I think it was changed in the STABLE branch to strncpy after a coverity scan

TBH the original strcpy is quite safe as the strings come from internal sources and are pre-validated.

Anyway, the arrays are allocated as size+1 so the strings will never overflow.

NACK.

On 11/10/12 15:21, Jan Pokorný wrote:
Hello once more,

I discovered cases potentially leading to string overruns later
in the processing.

Jan Pokorný (3):
   libcman: fix possible string nontermination: node name
   libcman: fix possible string nontermination: barrier name
   libcman: fix possible string nontermination: barrier name

  cman/lib/libcman.c | 12 ++++++------
  1 file changed, 6 insertions(+), 6 deletions(-)


Reply via email to