{ "schema_version": "1.4.0", "id": "GHSA-jq68-96jh-4wjh", "modified": "2022-05-13T01:18:05Z", "published": "2022-05-13T01:18:05Z", "aliases": [ "CVE-2010-2803" ], "details": "The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2803" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621435" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git;a=commit;h=1b2f1489633888d4a06028315dc19d65768a1c05" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git;a=commit;h=b9f0aee83335db1f3915f4e42a5e21b351740afd" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b9f0aee83335db1f3915f4e42a5e21b351740afd" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/41512" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2094" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2430" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0298" } ], "database_specific": { "cwe_ids": [ "CWE-200" ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-09-08T20:00:00Z" } }