diff options
author | Adrian Knoth <adi@drcomp.erfurt.thur.de> | 2011-02-23 11:43:14 +0100 |
---|---|---|
committer | Takashi Iwai <tiwai@suse.de> | 2011-02-23 15:46:29 +0100 |
commit | 4ab69a2b3b84415085d261bcf848b7a95c010c9d (patch) | |
tree | fb590d9c1a9158c686dd4eee1c7a728c4734f30b /MAINTAINERS | |
parent | 7c4a95b5ec484244fc615be7b9f56c267c51ade6 (diff) | |
download | op-kernel-dev-4ab69a2b3b84415085d261bcf848b7a95c010c9d.zip op-kernel-dev-4ab69a2b3b84415085d261bcf848b7a95c010c9d.tar.gz |
ALSA: hdspm - prevent reading unitialized stack memory
Original patch by Dan Rosenberg <drosenberg@vsecurity.com> under commit
e68d3b316ab7b02a074edc4f770e6a746390cb7d. I'm copying his text here:
The SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl in hdspm.c allow unprivileged
users to read uninitialized kernel stack memory, because several fields
of the hdspm_config struct declared on the stack are not altered
or zeroed before being copied back to the user. This patch takes care
of it.
Signed-off-by: Adrian Knoth <adi@drcomp.erfurt.thur.de>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Diffstat (limited to 'MAINTAINERS')
0 files changed, 0 insertions, 0 deletions