]> granicus.if.org Git - procps-ng/commit
top: concede integer overflow risks in procs_refresh()
authorJim Warner <james.warner@comcast.net>
Fri, 18 May 2018 05:00:00 +0000 (00:00 -0500)
committerCraig Small <csmall@enc.com.au>
Sat, 19 May 2018 11:38:19 +0000 (21:38 +1000)
commit59f39da852ad8ee2cb512b41a68e0c59ff7a791a
tree648a17042164b049ccb3c2d8d4947e670c6ebd80
parentc9dfcdebdc6b482ca2030c6ea3aa376c218232e9
top: concede integer overflow risks in procs_refresh()

This is as far as we need go with respect to the issue
of integer overflow addressed in that reference below.

That patch, of course, was reversed to prepare for us.

Reference(s):
. original qualys patch
0105-top-Prevent-integer-overflows-in-procs_refresh.patch
commit 131e5e2fe63f29edfc7df04b2b2a1682d93af846

Signed-off-by: Jim Warner <james.warner@comcast.net>
top/top.c