mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-30 01:46:30 -05:00
c3c75e7b73
This reverts commit 7d24041ae3
.
A quick sanity check against cve.lineageos.org shows most of these are patched already.
--3way == bad way
32 lines
1.1 KiB
Diff
32 lines
1.1 KiB
Diff
From 81ce573830e9d5531531b3ec778c58e6b9167bcd Mon Sep 17 00:00:00 2001
|
|
From: Dan Carpenter <dan.carpenter@oracle.com>
|
|
Date: Wed, 5 Sep 2012 15:32:18 +0300
|
|
Subject: [PATCH] ALSA: compress_core: integer overflow in
|
|
snd_compr_allocate_buffer()
|
|
|
|
These are 32 bit values that come from the user, we need to check for
|
|
integer overflows or we could end up allocating a smaller buffer than
|
|
expected.
|
|
|
|
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
|
|
Signed-off-by: Takashi Iwai <tiwai@suse.de>
|
|
---
|
|
sound/core/compress_offload.c | 4 ++++
|
|
1 file changed, 4 insertions(+)
|
|
|
|
diff --git a/sound/core/compress_offload.c b/sound/core/compress_offload.c
|
|
index eb60cb8dbb8a6..68fe02c7400a2 100644
|
|
--- a/sound/core/compress_offload.c
|
|
+++ b/sound/core/compress_offload.c
|
|
@@ -407,6 +407,10 @@ static int snd_compr_allocate_buffer(struct snd_compr_stream *stream,
|
|
unsigned int buffer_size;
|
|
void *buffer;
|
|
|
|
+ if (params->buffer.fragment_size == 0 ||
|
|
+ params->buffer.fragments > SIZE_MAX / params->buffer.fragment_size)
|
|
+ return -EINVAL;
|
|
+
|
|
buffer_size = params->buffer.fragment_size * params->buffer.fragments;
|
|
if (stream->ops->copy) {
|
|
buffer = NULL;
|