APPLIED [OEM-6.0]: [SRU][OEM-6.0/HWE-5.19][PATCH 0/1] CVE-2022-36280

Manuel Diewald manuel.diewald at canonical.com
Mon Apr 3 15:42:23 UTC 2023


On Fri, Mar 17, 2023 at 04:26:10PM -0400, Yuxuan Luo wrote:
> [Impact]
> A potential out-of-bound write vulnerability was found at drm/vmwgfx. Since the
> dimension parameter is not sanity checked, it is possible to overflow the
> memcpy, leading to crashes.
> 
> [Backport]
> It is a clean cherry pick.
> 
> [Test]
> Compile and smoke tested by modprobe the vmwgfx mod.
> 
> [Potential Regression]
> Expecting low risk as the commit only add two condition check.
> 
> Zack Rusin (1):
>   drm/vmwgfx: Validate the box size for the snooped cursor
> 
>  drivers/gpu/drm/vmwgfx/vmwgfx_kms.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> -- 
> 2.34.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

Applied to jammy:linux-oem-6.0. Thank you!



More information about the kernel-team mailing list