The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05 - | |
References | () http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd - | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/41512 - Broken Link | |
References | () http://www.debian.org/security/2010/dsa-2094 - Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53 - Broken Link | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21 - Broken Link | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6 - Broken Link | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0842.html - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/2430 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0298 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=621435 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2010-09-08 20:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2803
Mitre link : CVE-2010-2803
CVE.ORG link : CVE-2010-2803
JSON object : View
Products Affected
opensuse
- opensuse
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_real_time
- linux_enterprise_high_availability_extension
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor