First published: Mon Sep 27 2010(Updated: )
Description of problem: Kees found a flaw in the i915 GEM ioctl interface that does not check destination addresses during memory copies, allowing arbitrary memory writes into the kernel. The flaws are in drivers/gpu/drm/i915/i915_gem.c in i915_gem_pread_ioctl() and i915_gem_pwrite_ioctl(), which do no access_ok() checks on args->data_ptr. (Actually, there is one check path: i915_gem_gtt_pwrite_fast() does the check, but none of the other helpers do.). Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.36 | |
Fedoraproject Fedora | =13 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Fedora | =13 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2962 is classified as a high severity vulnerability due to its potential for arbitrary memory writes into the kernel.
Fixing CVE-2010-2962 involves updating to a Linux kernel version later than 2.6.36 which includes the necessary patches.
CVE-2010-2962 affects multiple Linux distributions, including Debian, Fedora, openSUSE, and various versions of Ubuntu.
Exploitation of CVE-2010-2962 can lead to privilege escalation and the potential execution of arbitrary code within the kernel.
The vulnerability arises from flaws in the i915 GEM ioctl interface, specifically in the i915_gem_pread_ioctl() and i915_gem_pwrite_ioctl() functions.