projects
/
linux-block.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
038f8b7
)
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
author
Mark Brown
<broonie@kernel.org>
Mon, 24 Jan 2022 15:32:53 +0000
(15:32 +0000)
committer
Greg Kroah-Hartman
<gregkh@linuxfoundation.org>
Tue, 8 Feb 2022 17:30:34 +0000
(18:30 +0100)
commit
4cf28e9ae6e2e11a044be1bcbcfa1b0d8675fe4d
upstream.
We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
Signed-off-by: Mark Brown <broonie@kernel.org>
Cc: stable@vger.kernel.org
Link:
https://lore.kernel.org/r/20220124153253.3548853-4-broonie@kernel.org
Signed-off-by: Mark Brown <broonie@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
sound/soc/soc-ops.c
patch
|
blob
|
blame
|
history
diff --git
a/sound/soc/soc-ops.c
b/sound/soc/soc-ops.c
index 982261e064ca0dbce2edee1b1d31c0dd112d0d72..f24f7354f46fe7ce48ae99ed521bec0891fedad1 100644
(file)
--- a/
sound/soc/soc-ops.c
+++ b/
sound/soc/soc-ops.c
@@
-880,6
+880,8
@@
int snd_soc_put_xr_sx(struct snd_kcontrol *kcontrol,
unsigned int i, regval, regmask;
int err;
+ if (val < mc->min || val > mc->max)
+ return -EINVAL;
if (invert)
val = max - val;
val &= mask;