From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: From: Chris Wilson Subject: Re: [PATCH v2 1/2] drm/i915: fix integer overflow in i915_gem_execbuffer2() To: Xi Wang , Daniel Vetter , Keith Packard Cc: intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, security@kernel.org, Xi Wang , stable@vger.kernel.org In-Reply-To: <1335168402-25174-1-git-send-email-xi.wang@gmail.com> References: <1335168402-25174-1-git-send-email-xi.wang@gmail.com> Date: Mon, 23 Apr 2012 09:18:25 +0100 Message-ID: <1335169134_26001@CP5-2952> Sender: linux-kernel-owner@vger.kernel.org List-ID: On Mon, 23 Apr 2012 04:06:41 -0400, Xi Wang wrote: > On 32-bit systems, a large args->buffer_count from userspace via ioctl > may overflow the allocation size, leading to out-of-bounds access. > > This vulnerability was introduced in commit 8408c282 ("drm/i915: > First try a normal large kmalloc for the temporary exec buffers"). > > Signed-off-by: Xi Wang > Cc: Chris Wilson > Cc: stable@vger.kernel.org Reviewed-by: Chris Wilson -Chris -- Chris Wilson, Intel Open Source Technology Centre