-
由 Jeremy Cline 提交于
'call' is a user-controlled value, so sanitize the array index after the bounds check to avoid speculating past the bounds of the 'nargs' array. Found with the help of Smatch: net/socket.c:2508 __do_sys_socketcall() warn: potential spectre issue 'nargs' [r] (local cap) Cc: Josh Poimboeuf <jpoimboe@redhat.com> Cc: stable@vger.kernel.org Signed-off-by: NJeremy Cline <jcline@redhat.com> Signed-off-by: NDavid S. Miller <davem@davemloft.net>
c8e8cd57