ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
authorMark Brown <broonie@kernel.org>
Mon, 24 Jan 2022 15:32:53 +0000 (15:32 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 8 Feb 2022 17:15:29 +0000 (18:15 +0100)
commit 4cf28e9ae6e2e11a044be1bcbcfa1b0d8675fe4d upstream.

We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.

Signed-off-by: Mark Brown <broonie@kernel.org>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20220124153253.3548853-4-broonie@kernel.org
Signed-off-by: Mark Brown <broonie@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
sound/soc/soc-ops.c

index 515d4a876ff31825dfb706e83d0bea0acd7a6b3c..4da6f66ea3a217edbb5ca8d398186c8902d581e2 100644 (file)
@@ -915,6 +915,8 @@ int snd_soc_put_xr_sx(struct snd_kcontrol *kcontrol,
        unsigned int i, regval, regmask;
        int err;
 
+       if (val < mc->min || val > mc->max)
+               return -EINVAL;
        if (invert)
                val = max - val;
        val &= mask;