Description
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate the box size for the snooped cursor Invalid userspace dma surface copies could potentially overflow the memcpy from the surface to the snooped image leading to crashes. To fix it the dimensions of the copybox have to be validated against the expected size of the snooped cursor.
Product status
2ac863719e518ae1a8f328849e64ea26a222f079 before ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6
2ac863719e518ae1a8f328849e64ea26a222f079 before 50d177f90b63ea4138560e500d92be5e4c928186
2ac863719e518ae1a8f328849e64ea26a222f079 before 6b4e70a428b5a11f56db94047b68e144529fe512
2ac863719e518ae1a8f328849e64ea26a222f079 before 94b283341f9f3f0ed56a360533766377a01540e0
2ac863719e518ae1a8f328849e64ea26a222f079 before 439cbbc1519547f9a7b483f0de33b556ebfec901
2ac863719e518ae1a8f328849e64ea26a222f079 before 6948e570f54f2044dd4da444b10471373a047eeb
2ac863719e518ae1a8f328849e64ea26a222f079 before 4d54d11b49860686331c58a00f733b16a93edfc4
2ac863719e518ae1a8f328849e64ea26a222f079 before 622d527decaac0eb65512acada935a0fdc1d0202
2ac863719e518ae1a8f328849e64ea26a222f079 before 4cf949c7fafe21e085a4ee386bb2dade9067316e
3.2
Any version before 3.2
4.9.337
4.14.303
4.19.270
5.4.229
5.10.163
5.15.87
6.0.18
6.1.4
6.2
References
git.kernel.org/...c/ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6
git.kernel.org/...c/50d177f90b63ea4138560e500d92be5e4c928186
git.kernel.org/...c/6b4e70a428b5a11f56db94047b68e144529fe512
git.kernel.org/...c/94b283341f9f3f0ed56a360533766377a01540e0
git.kernel.org/...c/439cbbc1519547f9a7b483f0de33b556ebfec901
git.kernel.org/...c/6948e570f54f2044dd4da444b10471373a047eeb
git.kernel.org/...c/4d54d11b49860686331c58a00f733b16a93edfc4
git.kernel.org/...c/622d527decaac0eb65512acada935a0fdc1d0202
git.kernel.org/...c/4cf949c7fafe21e085a4ee386bb2dade9067316e