CVE-2010-2962

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4

http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html

http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html

http://secunia.com/advisories/42745

http://secunia.com/advisories/42758

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36

http://www.redhat.com/support/errata/RHSA-2010-0842.html

http://www.redhat.com/support/errata/RHSA-2010-0958.html

http://www.securityfocus.com/bid/44067

http://www.ubuntu.com/usn/USN-1041-1

http://www.vupen.com/english/advisories/2010/3321

http://www.vupen.com/english/advisories/2011/0070

http://www.vupen.com/english/advisories/2011/0298

https://bugzilla.redhat.com/show_bug.cgi?id=637688

Details

Source: MITRE

Published: 2010-11-26

Updated: 2020-08-14

Type: CWE-20

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (13 total)

IDNameProductFamilySeverity
75551openSUSE Security Update : kernel (openSUSE-SU-2010:0734-1)NessusSuSE Local Security Checks
high
68668Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2012-2001)NessusOracle Linux Local Security Checks
high
68175Oracle Linux 5 : Unbreakable Enterprise kernel (ELSA-2010-2011)NessusOracle Linux Local Security Checks
high
65101Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1083-1)NessusUbuntu Local Security Checks
critical
65103Ubuntu 10.04 LTS / 10.10 : linux-mvl-dove vulnerabilities (USN-1093-1)NessusUbuntu Local Security Checks
high
60893Scientific Linux Security Update : kernel on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
high
55077USN-1119-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
high
51612SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 3276 / 3280 / 3284)NessusSuSE Local Security Checks
high
51453Ubuntu 9.10 / 10.04 LTS / 10.10 : linux, linux-ec2 vulnerabilities (USN-1041-1)NessusUbuntu Local Security Checks
high
51374Fedora 13 : kernel-2.6.34.7-66.fc13 (2010-18983)NessusFedora Local Security Checks
high
50629RHEL 6 : kernel (RHSA-2010:0842)NessusRed Hat Local Security Checks
high
50400Fedora 14 : kernel-2.6.35.6-48.fc14 (2010-16826)NessusFedora Local Security Checks
high
50015openSUSE Security Update : kernel (openSUSE-SU-2010:0738-1)NessusSuSE Local Security Checks
high