First published: Wed Feb 23 2011(Updated: )
Description: It has been found that drm_modeset_ctl() did not properly validate input parameters. The issue is that the crtc variable there is signed. So a large enough value passed in the modeset parameter structure will be treated as negative, escaping the check for proper range later. This variable is later used as an index variable effectively allowing out of bounds writes of zero integers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.38 | |
OpenBSD | <=4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1013 is classified as a high severity vulnerability due to its potential to cause a denial of service or escalate privileges.
To fix CVE-2011-1013, update your Linux kernel to version 2.6.38 or later and ensure your OpenBSD system is updated past version 4.8.
CVE-2011-1013 affects the Linux kernel versions prior to 2.6.38 and OpenBSD versions up to and including 4.8.
Exploiting CVE-2011-1013 could allow an attacker to bypass input validation checks, leading to system instability or potential privilege escalation.
The vendor for CVE-2011-1013 includes the maintainers of the Linux kernel and OpenBSD.