diff options
| author | 2012-06-12 10:37:08 +0300 | |
|---|---|---|
| committer | 2012-06-12 09:54:36 -0400 | |
| commit | 0439f31c35d1da0b28988b308ea455e38e6a350d (patch) | |
| tree | 3d59dd6250c47968f5d6e521d3442525146660a4 /net | |
| parent | rpc_pipefs: allow rpc_purge_list to take a NULL waitq pointer (diff) | |
| download | wireguard-linux-0439f31c35d1da0b28988b308ea455e38e6a350d.tar.xz wireguard-linux-0439f31c35d1da0b28988b308ea455e38e6a350d.zip | |
NFSv4.1: integer overflow in decode_cb_sequence_args()
This seems like it could overflow on 32 bits. Use kmalloc_array() which
has overflow protection built in.
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
Diffstat (limited to 'net')
0 files changed, 0 insertions, 0 deletions
