This patch contains fixes for calls to potentially unsafe string manipulation functions. It is almost certain that some of these updates patch security vulnerabilities. Other changes may avert future vulnerabilities. In addition, TODO comments were added to certain sections of code where further checks should be implemented. This version of the patch makes changes to the following files in the most current CVS (as of today): block.c dyngen.c monitor.c sparc-dis.c thunk.c vl.c linux-user/elfload.c linux-user/path.c linux-user/syscall.c slirp/debug.c slirp/mbuf.c slirp/misc.c slirp/tcp_subr.c slirp/udp.c target-i386/helper2.c Any original code contained within this patch is hereby released into the public domain. All derivative portions of code contained within, for the purposes of documentation, are a part of QEMU, and are therefore protected by the copyright of their respective authors. While care was taken in making these changes, it is possible that this patch will break something. Use your own risk. Please report any success/failure to: tim {HYPHEN} qemu {AT} sentinelchicken {DOT} org.