CVE-2010-2803

The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html Mailing List Third Party Advisory
http://secunia.com/advisories/41512 Broken Link
http://www.debian.org/security/2010/dsa-2094 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0842.html Broken Link
http://www.vupen.com/english/advisories/2010/2430 Broken Link
http://www.vupen.com/english/advisories/2011/0298 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=621435 Exploit Issue Tracking Patch Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html Mailing List Third Party Advisory
http://secunia.com/advisories/41512 Broken Link
http://www.debian.org/security/2010/dsa-2094 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0842.html Broken Link
http://www.vupen.com/english/advisories/2010/2430 Broken Link
http://www.vupen.com/english/advisories/2011/0298 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=621435 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*

History

21 Nov 2024, 01:17

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05 - () http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05 -
References () http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd - () http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd -
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd -
References () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/41512 - Broken Link () http://secunia.com/advisories/41512 - Broken Link
References () http://www.debian.org/security/2010/dsa-2094 - Third Party Advisory () http://www.debian.org/security/2010/dsa-2094 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53 - Broken Link () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53 - Broken Link
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21 - Broken Link () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21 - Broken Link
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6 - Broken Link () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6 - Broken Link
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4 - Broken Link () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link
References () http://www.vupen.com/english/advisories/2010/2430 - Broken Link () http://www.vupen.com/english/advisories/2010/2430 - Broken Link
References () http://www.vupen.com/english/advisories/2011/0298 - Broken Link () http://www.vupen.com/english/advisories/2011/0298 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=621435 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=621435 - Exploit, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2010-09-08 20:00

Updated : 2024-11-21 01:17


NVD link : CVE-2010-2803

Mitre link : CVE-2010-2803

CVE.ORG link : CVE-2010-2803


JSON object : View

Products Affected

opensuse

  • opensuse

suse

  • linux_enterprise_server
  • linux_enterprise_desktop
  • linux_enterprise_real_time
  • linux_enterprise_high_availability_extension

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor