android_kernel_google_msm/sound
Siqi Lin 9e83134523 ALSA: info: Check for integer overflow in snd_info_entry_write()
snd_info_entry_write() resizes the buffer with an unsigned long
size argument that gets truncated because resize_info_buffer()
takes the size parameter as an unsigned int. On 64-bit kernels,
this causes the following copy_to_user() to write out-of-bounds
if (pos + count) can't be represented by an unsigned int.

Bug: 32510733
Change-Id: I9e8b55f93f2bd606b4a73b5a4525b71ee88c7c23
Signed-off-by: Siqi Lin <siqilin@google.com>
2017-06-07 13:18:23 -06:00
..
aoa
arm
atmel
compress_offload
core ALSA: info: Check for integer overflow in snd_info_entry_write() 2017-06-07 13:18:23 -06:00
drivers
firewire
i2c
isa
mips
oss
parisc
pci
pcmcia
ppc
sh
soc ASoC: msm: qdsp6v2: return error when copy from userspace fails 2017-05-02 13:50:08 -06:00
sparc
spi
synth
usb ALSA: usb-audio: Fix double-free in error paths after snd_usb_add_audio_stream() call 2016-11-11 13:37:28 +11:00
ac97_bus.c
Kconfig
last.c
Makefile
sound_core.c
sound_firmware.c