On Mon, 23 Apr 2012 04:06:41 -0400, Xi Wang <xi.wang at gmail.com> wrote: > On 32-bit systems, a large args->buffer_count from userspace via ioctl > may overflow the allocation size, leading to out-of-bounds access. > > This vulnerability was introduced in commit 8408c282 ("drm/i915: > First try a normal large kmalloc for the temporary exec buffers"). > > Signed-off-by: Xi Wang <xi.wang at gmail.com> > Cc: Chris Wilson <chris at chris-wilson.co.uk> > Cc: stable at vger.kernel.org Reviewed-by: Chris Wilson <chris at chris-wilson.co.uk> -Chris -- Chris Wilson, Intel Open Source Technology Centre