CVE-2010-2803
Summary
| CVE | CVE-2010-2803 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-09-08 20:00:00 UTC |
| Updated | 2023-02-13 03:18:00 UTC |
| Description | The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 5.0 | All | All | All |
| Operating System | Debian | Debian Linux | 5.0 | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Opensuse | Opensuse | 11.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.3 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.3 | All | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise High Availability Extension | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise High Availability Extension | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Real Time | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Real Time | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp1 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE Security Announcement: Realtime Linux Kernel (S | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Broken Link |
| kernel/git/torvalds/linux.git - Linux kernel source tree | MISC | git.kernel.org | |
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| 404: File not found | CONFIRM | www.kernel.org | Broken Link |
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| 404: File not found | CONFIRM | www.kernel.org | Broken Link |
| git.kernel.org | CONFIRM | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| Support | REDHAT | www.redhat.com | Broken Link |
| git.kernel.org | MISC | git.kernel.org | |
| 404: File not found | CONFIRM | www.kernel.org | Broken Link |
| Support / Security / Advisories / / MDVSA-2010:198 | Mandriva | MANDRIVA | www.mandriva.com | Broken Link |
| 404: File not found | CONFIRM | www.kernel.org | Broken Link |
| git.kernel.org | MISC | git.kernel.org | |
| kernel/git/torvalds/linux.git - Linux kernel source tree | CONFIRM | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| SUSE update for kernel - Secunia.com | SECUNIA | secunia.com | Broken Link |
| Bug 621435 – CVE-2010-2803 kernel: drm ioctls infoleak | CONFIRM | bugzilla.redhat.com | Exploit, Issue Tracking, Patch, Third Party Advisory |
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| git.kernel.org | CONFIRM | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| Debian -- Security Information -- DSA-2094-1 linux-2.6 | DEBIAN | www.debian.org | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Broken Link |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.