On Mon, 23 Apr 2012 04:06:41 -0400, Xi Wang <xi.w...@gmail.com> wrote:
> On 32-bit systems, a large args->buffer_count from userspace via ioctl
> may overflow the allocation size, leading to out-of-bounds access.
> 
> This vulnerability was introduced in commit 8408c282 ("drm/i915:
> First try a normal large kmalloc for the temporary exec buffers").
> 
> Signed-off-by: Xi Wang <xi.w...@gmail.com>
> Cc: Chris Wilson <ch...@chris-wilson.co.uk>
> Cc: sta...@vger.kernel.org
Reviewed-by: Chris Wilson <ch...@chris-wilson.co.uk>
-Chris

-- 
Chris Wilson, Intel Open Source Technology Centre
_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/intel-gfx

Reply via email to