From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754220Ab2DWITd (ORCPT ); Mon, 23 Apr 2012 04:19:33 -0400 Received: from smtp.fireflyinternet.com ([109.228.6.236]:44816 "EHLO fireflyinternet.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751721Ab2DWITS (ORCPT ); Mon, 23 Apr 2012 04:19:18 -0400 X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=78.156.66.37; From: Chris Wilson Subject: Re: [PATCH v2 2/2] drm/i915: fix integer overflow in i915_gem_do_execbuffer() To: Xi Wang , Daniel Vetter , Keith Packard Cc: intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, security@kernel.org, Xi Wang , stable@vger.kernel.org In-Reply-To: <1335168402-25174-2-git-send-email-xi.wang@gmail.com> References: <1335168402-25174-1-git-send-email-xi.wang@gmail.com> <1335168402-25174-2-git-send-email-xi.wang@gmail.com> Date: Mon, 23 Apr 2012 09:18:44 +0100 X-Originating-IP: 78.156.66.37 Message-ID: <1335169153_26005@CP5-2952> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 23 Apr 2012 04:06:42 -0400, Xi Wang wrote: > On 32-bit systems, a large args->num_cliprects from userspace via ioctl > may overflow the allocation size, leading to out-of-bounds access. > > This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid > allocation for execbuffer object list"). > > Signed-off-by: Xi Wang > Cc: Chris Wilson > Cc: stable@vger.kernel.org Reviewed-by: Chris Wilson -Chris -- Chris Wilson, Intel Open Source Technology Centre