diff options
author | Takashi Iwai <tiwai@suse.de> | 2018-04-24 08:01:48 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2018-05-01 15:13:06 -0700 |
commit | 9aa81e730fbdbcaff42e29f9213d10dc6d36bc0f (patch) | |
tree | b2ae70abdd9f17c9c0217e3d83e3d42bf11e5877 /crypto/crct10dif_common.c | |
parent | 551a1c8aa4295a8f5bec7f8da4e1ed24b4e8f06c (diff) |
ALSA: asihpi: Hardening for potential Spectre v1
commit f9d94b57e30fd1575b4935045b32d738668aa74b upstream.
As recently Smatch suggested, a couple of places in ASIHPI driver may
expand the array directly from the user-space value with speculation:
sound/pci/asihpi/hpimsginit.c:70 hpi_init_response() warn: potential spectre issue 'res_size' (local cap)
sound/pci/asihpi/hpioctl.c:189 asihpi_hpi_ioctl() warn: potential spectre issue 'adapters'
This patch puts array_index_nospec() for hardening against them.
BugLink: https://marc.info/?l=linux-kernel&m=152411496503418&w=2
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'crypto/crct10dif_common.c')
0 files changed, 0 insertions, 0 deletions