We have heap corruption here for sure.
Signed-off-by: Denis V. Lunev
---
lib/exec.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/exec.c b/lib/exec.c
index e22a950..769d09e 100644
--- a/lib/exec.c
+++ b/lib/exec.c
@@ -1285,7 +1285,7 @@ int vzctl2_wrap_exec_script(char *
As a theoretical problem, dup_mmap() of an mm_struct with 6+ vmas
can loop while potentially allocating memory, with mm->mmap_sem held for
write by current thread. This is bad if current thread was selected as
an OOM victim, for current thread will continue allocations using memory
reserves wh
in commit 3f1147ffecc3 ("ve/module: export sysfs dentries in containers")
2) Buffer for path is made static in assumption, that modules load and
unload
my happen from time to time and there is not need to allocate this buffer
each
time we need to expose or hide module sysfs dentries
The commit is pushed to "branch-rh7-3.10.0-1160.80.1.vz7.191.x-ovz" and will
appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.80.1.vz7.191.2
-->
commit 2389d44ad3ab66777045aee2815b1510ed0997d3
Author: Alexander Atanasov
Date: Fri Dec 9 13:35:07 2022 +0200
ms/