APPLIED [OEM-6.0]: [SRU][OEM-6.0/HWE-5.19][PATCH 0/1] CVE-2022-36280
Manuel Diewald
manuel.diewald at canonical.com
Mon Apr 3 15:42:23 UTC 2023
On Fri, Mar 17, 2023 at 04:26:10PM -0400, Yuxuan Luo wrote:
> [Impact]
> A potential out-of-bound write vulnerability was found at drm/vmwgfx. Since the
> dimension parameter is not sanity checked, it is possible to overflow the
> memcpy, leading to crashes.
>
> [Backport]
> It is a clean cherry pick.
>
> [Test]
> Compile and smoke tested by modprobe the vmwgfx mod.
>
> [Potential Regression]
> Expecting low risk as the commit only add two condition check.
>
> Zack Rusin (1):
> drm/vmwgfx: Validate the box size for the snooped cursor
>
> drivers/gpu/drm/vmwgfx/vmwgfx_kms.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
Applied to jammy:linux-oem-6.0. Thank you!
More information about the kernel-team
mailing list