Description: drm/vmwgfx: 4 byte read of uninitialised kernel memory in vmw_gb_surface_define_ioctl() References: http://www.openwall.com/lists/oss-security/2017/06/13/2 Notes: bwh> Introduced by commit a97e21923b42 "drm/vmwgfx: Hook up guest-backed surfaces" Bugs: upstream: released (4.12-rc5) [07678eca2cf9c9a18584e546c2b2a0d0c9a3150c] 4.9-upstream-stable: released (4.9.32) [7860d0e5e2bf986d4bd06e7b029786747b5dc766] 3.16-upstream-stable: released (3.16.46) [26823129d84c6ca3e12b17af7a8e78c579b3bca5] 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.11.6-1) 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/x86/drm-vmwgfx-Make-sure-backup_handle-is-always-valid.patch] 3.16-jessie-security: released (3.16.43-2+deb8u3) [bugfix/x86/drm-vmwgfx-Make-sure-backup_handle-is-always-valid.patch] 3.2-wheezy-security: N/A "Vulnerable code not present"