diff options
author | Adrian Knoth <adi@drcomp.erfurt.thur.de> | 2011-02-23 11:43:14 +0100 |
---|---|---|
committer | Takashi Iwai <tiwai@suse.de> | 2011-02-23 15:46:29 +0100 |
commit | 4ab69a2b3b84415085d261bcf848b7a95c010c9d (patch) | |
tree | fb590d9c1a9158c686dd4eee1c7a728c4734f30b /sound/pci | |
parent | ALSA: hdspm - fix sync check on AES32 (diff) | |
download | linux-4ab69a2b3b84415085d261bcf848b7a95c010c9d.tar.xz linux-4ab69a2b3b84415085d261bcf848b7a95c010c9d.zip |
ALSA: hdspm - prevent reading unitialized stack memory
Original patch by Dan Rosenberg <drosenberg@vsecurity.com> under commit
e68d3b316ab7b02a074edc4f770e6a746390cb7d. I'm copying his text here:
The SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl in hdspm.c allow unprivileged
users to read uninitialized kernel stack memory, because several fields
of the hdspm_config struct declared on the stack are not altered
or zeroed before being copied back to the user. This patch takes care
of it.
Signed-off-by: Adrian Knoth <adi@drcomp.erfurt.thur.de>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Diffstat (limited to 'sound/pci')
-rw-r--r-- | sound/pci/rme9652/hdspm.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/sound/pci/rme9652/hdspm.c b/sound/pci/rme9652/hdspm.c index 0b0293fb8f09..ced1406d777f 100644 --- a/sound/pci/rme9652/hdspm.c +++ b/sound/pci/rme9652/hdspm.c @@ -6081,6 +6081,7 @@ static int snd_hdspm_hwdep_ioctl(struct snd_hwdep *hw, struct file *file, case SNDRV_HDSPM_IOCTL_GET_CONFIG: + memset(&info, 0, sizeof(info)); spin_lock_irq(&hdspm->lock); info.pref_sync_ref = hdspm_pref_sync_ref(hdspm); info.wordclock_sync_check = hdspm_wc_sync_check(hdspm); |