[PATCH v2 2/2] drm/i915: fix integer overflow in i915_gem_do_execbuffer()

2012-04-23 Thread Chris Wilson
On Mon, 23 Apr 2012 04:06:42 -0400, Xi Wang wrote: > On 32-bit systems, a large args->num_cliprects from userspace via ioctl > may overflow the allocation size, leading to out-of-bounds access. > > This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid > allocation for execbuffer

[PATCH v2 2/2] drm/i915: fix integer overflow in i915_gem_do_execbuffer()

2012-04-23 Thread Xi Wang
On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-off-by: Xi Wang Cc: Chris Wilson Cc:

Re: [PATCH v2 2/2] drm/i915: fix integer overflow in i915_gem_do_execbuffer()

2012-04-23 Thread Chris Wilson
On Mon, 23 Apr 2012 04:06:42 -0400, Xi Wang wrote: > On 32-bit systems, a large args->num_cliprects from userspace via ioctl > may overflow the allocation size, leading to out-of-bounds access. > > This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid > allocation for execbuffer

[PATCH v2 2/2] drm/i915: fix integer overflow in i915_gem_do_execbuffer()

2012-04-23 Thread Xi Wang
On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-off-by: Xi Wang Cc: Chris Wilson Cc: