Bug 824178 (CVE-2012-2384) - CVE-2012-2384 kernel: drm/i915: integer overflow in i915_gem_do_execbuffer()
Summary: CVE-2012-2384 kernel: drm/i915: integer overflow in i915_gem_do_execbuffer()
Alias: CVE-2012-2384
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20120423,repor...
Keywords: Security
Depends On: 824561 824563 824564 824565
Blocks: 824180
TreeView+ depends on / blocked
Reported: 2012-05-22 21:48 UTC by Petr Matousek
Modified: 2019-06-08 19:08 UTC (History)
24 users (show)

Clone Of:
Last Closed: 2013-08-24 12:39:57 UTC

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1304 normal SHIPPED_LIVE Moderate: kernel security and bug fix update 2012-09-25 22:58:04 UTC

Description Petr Matousek 2012-05-22 21:48:06 UTC
Description of the problem:
On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access.


Upstream fix:

Comment 1 Josh Boyer 2012-05-23 16:03:39 UTC
FYI.  This was fixed in 3.3.5 (stable commit 4a265435c87b19175c3906ff49ffe5bf4a4cc228).  All Fedora branches are on that or newer already.

Comment 2 Josh Boyer 2012-05-23 16:04:15 UTC
Sorry, that should have been stable commit 9f4660213e58b3b78dc75bf3e3b4126dbe9a0b14

Comment 5 Petr Matousek 2012-07-04 05:33:30 UTC

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2. This issue was addressed in Red Hat Enterprise Linux 6 via RHSA-2012:1304 https://rhn.redhat.com/errata/RHSA-2012-1304.html.

Comment 6 errata-xmlrpc 2012-09-25 18:59:53 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1304 https://rhn.redhat.com/errata/RHSA-2012-1304.html

Note You need to log in before you can comment on or make changes to this bug.