Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 11 Jan 2012 17:09:02 -0700
From: Kurt Seifried <>
CC: Eugene Teo <>,
        "Steven M. Christey" <>
Subject: Re: CVE request - kernel: drm: integer overflow in

On 01/11/2012 03:50 AM, Eugene Teo wrote:
> There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if
> userspace passes in a large num_clips.  The call to kmalloc would
> allocate a small buffer, and the call to fb->funcs->dirty may result in
> a memory corruption.
> Reported-by: Haogang Chen <>
> Signed-off-by: Xi Wang <>
> Upstream commit:
Please use CVE-2012-0044 for this issue.


-- Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ