oss-sec mailing list archives
Re: CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
From: <cve-assign () mitre org>
Date: Tue, 24 Jan 2017 03:12:09 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
[PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout. https://lkml.org/lkml/2017/1/17/761
Use CVE-2017-5576.
[PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing. https://lkml.org/lkml/2017/1/17/759
Use CVE-2017-5577. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYhwunAAoJEHb/MwWLVhi2S/wP/jt59qeY74I02n9My1lTZEYd jy7AWveL6n8B/Z3JTcJq+70wVn8wQ0j+oKI+Hd4PdQzK0inBYINgRvuPnrtFaY0R yNgJhfrOHyw+FRwrAqgjQeo/0iiWmmOus3iQeK/4z4snHFdo3nXkQULAS3hh5J0y U0EEubTWGp8czySRj325Lz05ZyRsTW8A3oIm/mtbocuh85r2OdHrisE8SxRvzmdM plXtCFqLzwnw4ay23VB7AsZOjJUknyxwohARgyQBLjIyRD/GGhKhblfAzbsJ1GeS C43os7VZkxlkZMIJJMt/C4iZJdihzVSuQ9sA70exo8bwBMcAs6Fa1IG8HuZTPQH5 bU1sBzKu55b/Iyo2CK3+fTDkNbvAggF0RzJkTUZ7FDuqupbpDgCCPOxqFc67cnkY 0sS4iVJRQctUSV2DCcbGvlxL3SMA1raBGzVszoPuhrM1KQP6cHGEj6Zkx/q2/UKh sCD9dV7ZUXo/HRGGfdgWmkMC1quhQ0Vbh7KQYna2Sb6CrUFVPfyyAymv4daF4xe/ HjjxrtLcsr75GbI4m7z7HvMHuR3Ec2ok6cx3NMM/G1ya8nhbjDJkgOd87DFohgYV OHvBTQbk1g955spSJsQNsI0W9UcORJ2/b7N0PR9JP4Xtn/61A1VNdZSUKijFl/s/ F6HMPX7zYdSE8i9NWJ7D =vnRT -----END PGP SIGNATURE-----
Current thread:
- CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow Murray McAllister (Jan 21)
- Re: CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow cve-assign (Jan 24)