OpenCL: Avoid potential buffer overflow in cmdutils_opencl.c
authorManeesh Gupta <maneesh.gupta@amd.com>
Tue, 28 Apr 2015 07:38:31 +0000 (13:08 +0530)
committerMichael Niedermayer <michaelni@gmx.at>
Thu, 21 May 2015 18:43:37 +0000 (20:43 +0200)
commit1e6352578ae4319b2427f9f2ffb8042e8d11894f
tree64f242ca8f650361224c3dd7fc15e77f18c6a961
parentd269eb2c114f8ef24cd3aa79c1465d866087f072
OpenCL: Avoid potential buffer overflow in cmdutils_opencl.c

The opt_opencl_bench function copied the device name using strcpy without checking if the source string was larger.
This patch fixes this by replacing the strcpy with av_strlcpy, with the string copy size capped to the destination buffer size.

Signed-off-by: Maneesh Gupta <maneesh.gupta@amd.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
(cherry picked from commit cf234552b83a9503ff96572de2658b921b8842eb)

Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
cmdutils_opencl.c