CVE-2010-2803

The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
References
Link Resource
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6 Broken Link
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=621435 Exploit Issue Tracking Patch Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21 Broken Link
http://www.debian.org/security/2010/dsa-2094 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html Mailing List Third Party Advisory
http://secunia.com/advisories/41512 Broken Link
http://www.vupen.com/english/advisories/2010/2430 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html Mailing List Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0842.html Broken Link
http://www.vupen.com/english/advisories/2011/0298 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html Mailing List Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*

Information

Published : 2010-09-08 13:00

Updated : 2023-02-12 19:18


NVD link : CVE-2010-2803

Mitre link : CVE-2010-2803


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

suse

  • linux_enterprise_desktop
  • linux_enterprise_real_time
  • linux_enterprise_high_availability_extension
  • linux_enterprise_server

linux

  • linux_kernel

debian

  • debian_linux

opensuse

  • opensuse