Bugzilla – Bug 1225035
VUL-0: REJECTED: CVE-2023-52822: kernel: drm: vmwgfx_surface.c: copy user-array safely
Last modified: 2024-05-24 15:43:13 UTC
In the Linux kernel, the following vulnerability has been resolved: drm: vmwgfx_surface.c: copy user-array safely Currently, there is no overflow-check with memdup_user(). Use the new function memdup_array_user() instead of memdup_user() for duplicating the user-space array safely. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52822 https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2023/CVE-2023-52822.mbox https://git.kernel.org/stable/c/689b33b94f096e717cd8f140a8b5502e7e4fe759 https://git.kernel.org/stable/c/412ce89669341dfd8ed98a4746ad3dbe9653a7b8 https://git.kernel.org/stable/c/1eacb4c96e73225a2f6f276bade006abbe4d8341 https://git.kernel.org/stable/c/21e29f1437b7c36c76efa908589578eaf0f50900 https://git.kernel.org/stable/c/06ab64a0d836ac430c5f94669710a78aa43942cb https://www.cve.org/CVERecord?id=CVE-2023-52822
As pointed by Jiri Bohac, this is not really necessary as the range check is done properly here. Close as INVALID.
CVE is rejected: https://lore.kernel.org/linux-cve-announce/2024052435-REJECTED-a3f3@gregkh/