From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 1360 invoked by alias); 2 Aug 2002 07:20:46 -0000 Mailing-List: contact libc-hacker-help@sources.redhat.com; run by ezmlm Precedence: bulk List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-hacker-owner@sources.redhat.com Received: (qmail 1334 invoked from network); 2 Aug 2002 07:20:45 -0000 Received: from unknown (HELO myware.mynet) (24.221.190.179) by sources.redhat.com with SMTP; 2 Aug 2002 07:20:45 -0000 Received: from redhat.com (myware.mynet [192.168.7.70]) (authenticated bits=0) by myware.mynet (8.12.3/8.12.3) with ESMTP id g727KbTo010850; Fri, 2 Aug 2002 00:20:37 -0700 Message-ID: <3D4A32C5.8090104@redhat.com> Date: Fri, 02 Aug 2002 00:20:00 -0000 From: Ulrich Drepper User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.1b) Gecko/20020726 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Jakub Jelinek CC: Glibc hackers Subject: Re: [PATCH] xdr_array and calloc security fix References: <20020802004635.Y20867@sunsite.ms.mff.cuni.cz> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-SW-Source: 2002-08/txt/msg00011.txt.bz2 Jakub Jelinek wrote: > 2002-08-02 Jakub Jelinek > > * malloc/malloc.c (public_cALLOc): Check for overflow on > multiplication. > * sunrpc/xdr_array.c (xdr_array): Likewise. > * sunrpc/rpc/types.h (mem_free): Add comment. I've applied the patch. Thanks, -- ---------------. ,-. 1325 Chesapeake Terrace Ulrich Drepper \ ,-------------------' \ Sunnyvale, CA 94089 USA Red Hat `--' drepper at redhat.com `------------------------