Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 11 Jan 2012 17:09:02 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Eugene Teo <eugene@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request - kernel: drm: integer overflow in
 drm_mode_dirtyfb_ioctl()

On 01/11/2012 03:50 AM, Eugene Teo wrote:
> There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if
> userspace passes in a large num_clips.  The call to kmalloc would
> allocate a small buffer, and the call to fb->funcs->dirty may result in
> a memory corruption.
>
> Reported-by: Haogang Chen <haogangchen@...il.com>
> Signed-off-by: Xi Wang <xi.wang@...il.com>
>
> Upstream commit:
> http://git.kernel.org/linus/a5cd335165e31db9dbab636fd29895d41da55dd2
Please use CVE-2012-0044 for this issue.

-- 

-- Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.