idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
31,008
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static int ip_vs_stats_seq_open(struct inode *inode, struct file *file) { return single_open(file, ip_vs_stats_show, NULL); }
106,604,023,563,235,230,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,009
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static int ip_vs_stats_show(struct seq_file *seq, void *v) { /* 01234567 01234567 01234567 0123456701234567 0123456701234567 */ seq_puts(seq, " Total Incoming Outgoing Incoming Outgoing\n"); seq_printf(seq, " Conns Packets Packets Bytes Bytes\n"); s...
289,117,329,727,704,100,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,010
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static __inline__ unsigned ip_vs_svc_fwm_hashkey(__u32 fwmark) { return fwmark & IP_VS_SVC_TAB_MASK; }
181,035,999,124,844,340,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,011
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static int ip_vs_svc_hash(struct ip_vs_service *svc) { unsigned hash; if (svc->flags & IP_VS_SVC_F_HASHED) { pr_err("%s(): request for already hashed, called from %pF\n", __func__, __builtin_return_address(0)); return 0; } if (svc->fwmark == 0) { /* * Hash it by <protocol,addr,port> in ip_vs_sv...
188,365,138,071,918,020,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,012
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
ip_vs_svc_hashkey(int af, unsigned proto, const union nf_inet_addr *addr, __be16 port) { register unsigned porth = ntohs(port); __be32 addr_fold = addr->ip; #ifdef CONFIG_IP_VS_IPV6 if (af == AF_INET6) addr_fold = addr->ip6[0]^addr->ip6[1]^ addr->ip6[2]^addr->ip6[3]; #endif return (proto^ntohl(addr_f...
210,033,081,911,639,450,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,013
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static int ip_vs_svc_unhash(struct ip_vs_service *svc) { if (!(svc->flags & IP_VS_SVC_F_HASHED)) { pr_err("%s(): request for unhash flagged, called from %pF\n", __func__, __builtin_return_address(0)); return 0; } if (svc->fwmark == 0) { /* Remove it from the ip_vs_svc_table table */ list_del(&svc->...
37,417,406,555,059,320,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,014
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static void ip_vs_trash_cleanup(void) { struct ip_vs_dest *dest, *nxt; list_for_each_entry_safe(dest, nxt, &ip_vs_dest_trash, n_list) { list_del(&dest->n_list); ip_vs_dst_reset(dest); __ip_vs_unbind_svc(dest); kfree(dest); } }
197,623,414,427,507,950,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,015
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
ip_vs_use_count_dec(void) { module_put(THIS_MODULE); }
109,468,946,366,392,520,000,000,000,000,000,000,000
ip_vs_ctl.c
198,232,056,816,623,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,016
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
ip_vs_use_count_inc(void) { return try_module_get(THIS_MODULE); }
112,437,273,843,331,130,000,000,000,000,000,000,000
ip_vs_ctl.c
198,232,056,816,623,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,017
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static int ip_vs_zero_all(void) { int idx; struct ip_vs_service *svc; for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) { list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) { ip_vs_zero_service(svc); } } for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) { list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx],...
320,211,315,552,868,070,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,018
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
static int ip_vs_zero_service(struct ip_vs_service *svc) { struct ip_vs_dest *dest; write_lock_bh(&__ip_vs_svc_lock); list_for_each_entry(dest, &svc->destinations, n_list) { ip_vs_zero_stats(&dest->stats); } ip_vs_zero_stats(&svc->stats); write_unlock_bh(&__ip_vs_svc_lock); return 0; }
119,308,955,085,028,050,000,000,000,000,000,000,000
ip_vs_ctl.c
198,232,056,816,623,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,019
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
proc_do_defense_mode(ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int *valp = table->data; int val = *valp; int rc; rc = proc_dointvec(table, write, buffer, lenp, ppos); if (write && (*valp != val)) { if ((*valp < 0) || (*valp > 3)) { /* Restore the correct value */ ...
297,862,670,840,082,070,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,020
linux
04bcef2a83f40c6db24222b27a52892cba39dffb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb
ipvs: Add boundary check on ioctl arguments The ipvs code has a nifty system for doing the size of ioctl command copies; it defines an array with values into which it indexes the cmd to find the right length. Unfortunately, the ipvs code forgot to check if the cmd was in the range that the array provides, allowing fo...
0
proc_do_sync_threshold(ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int *valp = table->data; int val[2]; int rc; /* backup the value first */ memcpy(val, valp, sizeof(val)); rc = proc_dointvec(table, write, buffer, lenp, ppos); if (write && (valp[0] < 0 || valp[1] < ...
325,408,278,383,517,460,000,000,000,000,000,000,000
ip_vs_ctl.c
105,962,925,241,335,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4588
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal...
https://nvd.nist.gov/vuln/detail/CVE-2013-4588
31,021
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
__gfn_to_pfn_memslot(struct kvm_memory_slot *slot, gfn_t gfn, bool atomic, bool *async, bool write_fault, bool *writable) { unsigned long addr = __gfn_to_hva_many(slot, gfn, NULL, write_fault); if (addr == KVM_HVA_ERR_RO_BAD) return KVM_PFN_ERR_RO_FAULT; if (kvm_is_error_hva(addr)) return KVM_PFN_NOSLOT...
305,549,896,885,654,680,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,022
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int __kvm_io_bus_read(struct kvm_io_bus *bus, struct kvm_io_range *range, void *val) { int idx; idx = kvm_io_bus_get_first_dev(bus, range->addr, range->len); if (idx < 0) return -EOPNOTSUPP; while (idx < bus->dev_count && kvm_io_bus_cmp(range, &bus->range[idx]) == 0) { if (!kvm_iodevice_read(...
145,915,217,480,025,400,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,023
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int __kvm_io_bus_write(struct kvm_io_bus *bus, struct kvm_io_range *range, const void *val) { int idx; idx = kvm_io_bus_get_first_dev(bus, range->addr, range->len); if (idx < 0) return -EOPNOTSUPP; while (idx < bus->dev_count && kvm_io_bus_cmp(range, &bus->range[idx]) == 0) { if (!kvm_iodevi...
115,487,718,799,862,790,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,024
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int __kvm_set_memory_region(struct kvm *kvm, struct kvm_userspace_memory_region *mem) { int r; gfn_t base_gfn; unsigned long npages; struct kvm_memory_slot *slot; struct kvm_memory_slot old, new; struct kvm_memslots *slots = NULL, *old_memslots; enum kvm_mr_change change; r = check_memory_region_flags(m...
280,749,019,021,715,170,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,025
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int create_vcpu_fd(struct kvm_vcpu *vcpu) { return anon_inode_getfd("kvm-vcpu", &kvm_vcpu_fops, vcpu, O_RDWR | O_CLOEXEC); }
84,911,699,929,749,920,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,026
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
unsigned long gfn_to_hva_prot(struct kvm *kvm, gfn_t gfn, bool *writable) { struct kvm_memory_slot *slot = gfn_to_memslot(kvm, gfn); unsigned long hva = __gfn_to_hva_many(slot, gfn, NULL, false); if (!kvm_is_error_hva(hva) && writable) *writable = !memslot_is_readonly(slot); return hva; }
153,269,206,535,923,980,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,027
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void hardware_disable(void) { raw_spin_lock(&kvm_count_lock); if (kvm_usage_count) hardware_disable_nolock(NULL); raw_spin_unlock(&kvm_count_lock); }
218,067,860,787,987,500,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,028
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void hardware_disable_all(void) { raw_spin_lock(&kvm_count_lock); hardware_disable_all_nolock(); raw_spin_unlock(&kvm_count_lock); }
199,598,314,552,180,120,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,029
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void hardware_enable(void) { raw_spin_lock(&kvm_count_lock); if (kvm_usage_count) hardware_enable_nolock(NULL); raw_spin_unlock(&kvm_count_lock); }
37,889,775,446,387,515,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,030
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int hardware_enable_all(void) { int r = 0; raw_spin_lock(&kvm_count_lock); kvm_usage_count++; if (kvm_usage_count == 1) { atomic_set(&hardware_enable_failed, 0); on_each_cpu(hardware_enable_nolock, NULL, 1); if (atomic_read(&hardware_enable_failed)) { hardware_disable_all_nolock(); r = -EBUSY;...
154,642,110,972,312,690,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,031
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static struct kvm_memslots *install_new_memslots(struct kvm *kvm, struct kvm_memslots *slots, struct kvm_memory_slot *new) { struct kvm_memslots *old_memslots = kvm->memslots; update_memslots(slots, new, kvm->memslots->generation); rcu_assign_pointer(kvm->memslots, slots); synchronize_srcu_expedited(&kvm->srcu);...
214,996,493,293,420,830,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,032
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_clear_guest_page(struct kvm *kvm, gfn_t gfn, int offset, int len) { const void *zero_page = (const void *) __va(page_to_phys(ZERO_PAGE(0))); return kvm_write_guest_page(kvm, gfn, zero_page, offset, len); }
89,559,619,556,442,700,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,033
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_cpu_hotplug(struct notifier_block *notifier, unsigned long val, void *v) { int cpu = (long)v; val &= ~CPU_TASKS_FROZEN; switch (val) { case CPU_DYING: printk(KERN_INFO "kvm: disabling virtualization on CPU%d\n", cpu); hardware_disable(); break; case CPU_STARTING: printk(KERN_...
277,672,408,141,153,270,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,034
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static struct kvm *kvm_create_vm(unsigned long type) { int r, i; struct kvm *kvm = kvm_arch_alloc_vm(); if (!kvm) return ERR_PTR(-ENOMEM); r = kvm_arch_init_vm(kvm, type); if (r) goto out_err_nodisable; r = hardware_enable_all(); if (r) goto out_err_nodisable; #ifdef CONFIG_HAVE_KVM_IRQCHIP INIT_HLIST...
30,091,123,293,266,050,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,035
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void kvm_destroy_devices(struct kvm *kvm) { struct list_head *node, *tmp; list_for_each_safe(node, tmp, &kvm->devices) { struct kvm_device *dev = list_entry(node, struct kvm_device, vm_node); list_del(node); dev->ops->destroy(dev); } }
151,029,183,915,672,580,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,036
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void kvm_destroy_vm(struct kvm *kvm) { int i; struct mm_struct *mm = kvm->mm; kvm_arch_sync_events(kvm); spin_lock(&kvm_lock); list_del(&kvm->vm_list); spin_unlock(&kvm_lock); kvm_free_irq_routing(kvm); for (i = 0; i < KVM_NR_BUSES; i++) kvm_io_bus_destroy(kvm->buses[i]); kvm_coalesced_mmio_free(kvm)...
18,411,436,723,197,986,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,037
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static long kvm_dev_ioctl_check_extension_generic(long arg) { switch (arg) { case KVM_CAP_USER_MEMORY: case KVM_CAP_DESTROY_MEMORY_REGION_WORKS: case KVM_CAP_JOIN_MEMORY_REGIONS_WORKS: #ifdef CONFIG_KVM_APIC_ARCHITECTURE case KVM_CAP_SET_BOOT_CPU_ID: #endif case KVM_CAP_INTERNAL_ERROR_DATA: #ifdef CONFIG_HAVE_KVM...
148,975,919,806,504,180,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,038
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_dev_ioctl_create_vm(unsigned long type) { int r; struct kvm *kvm; kvm = kvm_create_vm(type); if (IS_ERR(kvm)) return PTR_ERR(kvm); #ifdef KVM_COALESCED_MMIO_PAGE_OFFSET r = kvm_coalesced_mmio_init(kvm); if (r < 0) { kvm_put_kvm(kvm); return r; } #endif r = anon_inode_getfd("kvm-vm", &kvm_v...
290,640,068,266,604,100,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,039
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
struct kvm_device *kvm_device_from_filp(struct file *filp) { if (filp->f_op != &kvm_device_fops) return NULL; return filp->private_data; }
124,832,036,853,493,230,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,040
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static long kvm_device_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) { struct kvm_device *dev = filp->private_data; switch (ioctl) { case KVM_SET_DEVICE_ATTR: return kvm_device_ioctl_attr(dev, dev->ops->set_attr, arg); case KVM_GET_DEVICE_ATTR: return kvm_device_ioctl_attr(dev, dev->o...
28,857,459,004,721,513,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,041
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_device_ioctl_attr(struct kvm_device *dev, int (*accessor)(struct kvm_device *dev, struct kvm_device_attr *attr), unsigned long arg) { struct kvm_device_attr attr; if (!accessor) return -EPERM; if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) return -EFAULT; return ...
98,223,960,929,602,000,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,042
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_device_release(struct inode *inode, struct file *filp) { struct kvm_device *dev = filp->private_data; struct kvm *kvm = dev->kvm; kvm_put_kvm(kvm); return 0; }
284,888,209,411,114,260,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,043
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void kvm_exit(void) { kvm_exit_debug(); misc_deregister(&kvm_dev); kmem_cache_destroy(kvm_vcpu_cache); kvm_async_pf_deinit(); unregister_syscore_ops(&kvm_syscore_ops); unregister_reboot_notifier(&kvm_reboot_notifier); unregister_cpu_notifier(&kvm_cpu_notifier); on_each_cpu(hardware_disable_nolock, NULL, 1); kv...
108,688,853,336,512,740,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,044
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void kvm_free_physmem_slot(struct kvm *kvm, struct kvm_memory_slot *free, struct kvm_memory_slot *dont) { if (!dont || free->dirty_bitmap != dont->dirty_bitmap) kvm_destroy_dirty_bitmap(free); kvm_arch_free_memslot(kvm, free, dont); free->npages = 0; }
64,651,389,263,286,350,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,045
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log, int *is_dirty) { struct kvm_memory_slot *memslot; int r, i; unsigned long n; unsigned long any = 0; r = -EINVAL; if (log->slot >= KVM_USER_MEM_SLOTS) goto out; memslot = id_to_memslot(kvm->memslots, log->slot); r = -ENOENT; if (!memslot->...
143,890,719,198,490,240,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,046
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_gfn_to_hva_cache_init(struct kvm *kvm, struct gfn_to_hva_cache *ghc, gpa_t gpa, unsigned long len) { struct kvm_memslots *slots = kvm_memslots(kvm); int offset = offset_in_page(gpa); gfn_t start_gfn = gpa >> PAGE_SHIFT; gfn_t end_gfn = (gpa + len - 1) >> PAGE_SHIFT; gfn_t nr_pages_needed = end_gfn...
175,026,242,501,100,180,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,047
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_init(void *opaque, unsigned vcpu_size, unsigned vcpu_align, struct module *module) { int r; int cpu; r = kvm_arch_init(opaque); if (r) goto out_fail; /* * kvm_arch_init makes sure there's at most one caller * for architectures that support multiple implementations, * like intel and amd on x86...
279,388,397,509,459,270,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,048
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_init_debug(void) { int r = -EEXIST; struct kvm_stats_debugfs_item *p; kvm_debugfs_dir = debugfs_create_dir("kvm", NULL); if (kvm_debugfs_dir == NULL) goto out; for (p = debugfs_entries; p->name; ++p) { p->dentry = debugfs_create_file(p->name, 0444, kvm_debugfs_dir, (void *)(long)p->offse...
209,221,547,707,084,900,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,049
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_io_bus_get_first_dev(struct kvm_io_bus *bus, gpa_t addr, int len) { struct kvm_io_range *range, key; int off; key = (struct kvm_io_range) { .addr = addr, .len = len, }; range = bsearch(&key, bus->range, bus->dev_count, sizeof(struct kvm_io_range), kvm_io_bus_sort_cmp); if (range ==...
264,036,624,461,579,050,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,050
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_io_bus_insert_dev(struct kvm_io_bus *bus, struct kvm_io_device *dev, gpa_t addr, int len) { bus->range[bus->dev_count++] = (struct kvm_io_range) { .addr = addr, .len = len, .dev = dev, }; sort(bus->range, bus->dev_count, sizeof(struct kvm_io_range), kvm_io_bus_sort_cmp, NULL); return 0...
44,432,804,522,600,170,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,051
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_io_bus_read(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr, int len, void *val) { struct kvm_io_bus *bus; struct kvm_io_range range; int r; range = (struct kvm_io_range) { .addr = addr, .len = len, }; bus = srcu_dereference(kvm->buses[bus_idx], &kvm->srcu); r = __kvm_io_bus_read(bus, &rang...
123,211,404,279,107,160,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,052
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_io_bus_register_dev(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr, int len, struct kvm_io_device *dev) { struct kvm_io_bus *new_bus, *bus; bus = kvm->buses[bus_idx]; /* exclude ioeventfd which is limited by maximum fd */ if (bus->dev_count - bus->ioeventfd_count > NR_IOBUS_DEVS - 1) return -EN...
2,830,118,232,910,359,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,053
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_io_bus_sort_cmp(const void *p1, const void *p2) { return kvm_io_bus_cmp(p1, p2); }
154,193,039,234,386,500,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,054
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_io_bus_write(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr, int len, const void *val) { struct kvm_io_bus *bus; struct kvm_io_range range; int r; range = (struct kvm_io_range) { .addr = addr, .len = len, }; bus = srcu_dereference(kvm->buses[bus_idx], &kvm->srcu); r = __kvm_io_bus_write(b...
40,366,859,070,903,246,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,055
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int kvm_ioctl_create_device(struct kvm *kvm, struct kvm_create_device *cd) { struct kvm_device_ops *ops = NULL; struct kvm_device *dev; bool test = cd->flags & KVM_CREATE_DEVICE_TEST; int ret; switch (cd->type) { #ifdef CONFIG_KVM_MPIC case KVM_DEV_TYPE_FSL_MPIC_20: case KVM_DEV_TYPE_FSL_MPIC_42: ...
92,936,346,832,113,980,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,056
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
bool kvm_is_mmio_pfn(pfn_t pfn) { if (pfn_valid(pfn)) return PageReserved(pfn_to_page(pfn)); return true; }
132,334,736,178,124,060,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,057
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_is_visible_gfn(struct kvm *kvm, gfn_t gfn) { struct kvm_memory_slot *memslot = gfn_to_memslot(kvm, gfn); if (!memslot || memslot->id >= KVM_USER_MEM_SLOTS || memslot->flags & KVM_MEMSLOT_INVALID) return 0; return 1; }
161,824,197,340,086,570,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,058
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void kvm_make_mclock_inprogress_request(struct kvm *kvm) { make_all_cpus_request(kvm, KVM_REQ_MCLOCK_INPROGRESS); }
246,450,632,082,860,700,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,059
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void kvm_make_scan_ioapic_request(struct kvm *kvm) { make_all_cpus_request(kvm, KVM_REQ_SCAN_IOAPIC); }
176,389,906,853,039,700,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,060
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static struct page *kvm_pfn_to_page(pfn_t pfn) { if (is_error_noslot_pfn(pfn)) return KVM_ERR_PTR_BAD_PAGE; if (kvm_is_mmio_pfn(pfn)) { WARN_ON(1); return KVM_ERR_PTR_BAD_PAGE; } return pfn_to_page(pfn); }
17,064,278,006,562,168,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,061
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_read_guest_atomic(struct kvm *kvm, gpa_t gpa, void *data, unsigned long len) { int r; unsigned long addr; gfn_t gfn = gpa >> PAGE_SHIFT; int offset = offset_in_page(gpa); addr = gfn_to_hva_prot(kvm, gfn, NULL); if (kvm_is_error_hva(addr)) return -EFAULT; pagefault_disable(); r = kvm_read_hva_ato...
52,661,071,990,941,640,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,062
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_read_guest_cached(struct kvm *kvm, struct gfn_to_hva_cache *ghc, void *data, unsigned long len) { struct kvm_memslots *slots = kvm_memslots(kvm); int r; BUG_ON(len > ghc->len); if (slots->generation != ghc->generation) kvm_gfn_to_hva_cache_init(kvm, ghc, ghc->gpa, ghc->len); if (unlikely(!ghc->m...
280,728,273,752,709,160,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,063
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset, int len) { int r; unsigned long addr; addr = gfn_to_hva_prot(kvm, gfn, NULL); if (kvm_is_error_hva(addr)) return -EFAULT; r = kvm_read_hva(data, (void __user *)addr + offset, len); if (r) return -EFAULT; return 0; }
143,665,486,029,530,050,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,064
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void kvm_release_pfn_clean(pfn_t pfn) { if (!is_error_noslot_pfn(pfn) && !kvm_is_mmio_pfn(pfn)) put_page(pfn_to_page(pfn)); }
56,635,057,527,954,040,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,065
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void kvm_resume(void) { if (kvm_usage_count) { WARN_ON(raw_spin_is_locked(&kvm_count_lock)); hardware_enable_nolock(NULL); } }
102,165,783,845,655,570,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,066
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void kvm_sched_in(struct preempt_notifier *pn, int cpu) { struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn); if (vcpu->preempted) vcpu->preempted = false; kvm_arch_vcpu_load(vcpu, cpu); }
1,795,571,999,290,661,500,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,067
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static void kvm_sched_out(struct preempt_notifier *pn, struct task_struct *next) { struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn); if (current->state == TASK_RUNNING) vcpu->preempted = true; kvm_arch_vcpu_put(vcpu); }
230,737,573,868,762,160,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,068
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_set_memory_region(struct kvm *kvm, struct kvm_userspace_memory_region *mem) { int r; mutex_lock(&kvm->slots_lock); r = __kvm_set_memory_region(kvm, mem); mutex_unlock(&kvm->slots_lock); return r; }
87,337,061,381,031,430,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,069
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static long kvm_vcpu_compat_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) { struct kvm_vcpu *vcpu = filp->private_data; void __user *argp = compat_ptr(arg); int r; if (vcpu->kvm->mm != current->mm) return -EIO; switch (ioctl) { case KVM_SET_SIGNAL_MASK: { struct kvm_signal_mask __use...
109,068,194,155,314,700,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,070
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id) { struct page *page; int r; mutex_init(&vcpu->mutex); vcpu->cpu = -1; vcpu->kvm = kvm; vcpu->vcpu_id = id; vcpu->pid = NULL; init_waitqueue_head(&vcpu->wq); kvm_async_pf_vcpu_init(vcpu); page = alloc_page(GFP_KERNEL | __GFP_ZERO); if (!...
245,632,189,526,777,070,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,071
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static long kvm_vcpu_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) { struct kvm_vcpu *vcpu = filp->private_data; void __user *argp = (void __user *)arg; int r; struct kvm_fpu *fpu = NULL; struct kvm_sregs *kvm_sregs = NULL; if (vcpu->kvm->mm != current->mm) return -EIO; #if defined(CON...
83,496,155,809,671,640,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,072
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void kvm_vcpu_on_spin(struct kvm_vcpu *me) { struct kvm *kvm = me->kvm; struct kvm_vcpu *vcpu; int last_boosted_vcpu = me->kvm->last_boosted_vcpu; int yielded = 0; int try = 3; int pass; int i; kvm_vcpu_set_in_spin_loop(me, true); /* * We boost the priority of a VCPU that is runnable but not * currently r...
136,051,312,767,745,640,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,073
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
bool kvm_vcpu_yield_to(struct kvm_vcpu *target) { struct pid *pid; struct task_struct *task = NULL; bool ret = false; rcu_read_lock(); pid = rcu_dereference(target->pid); if (pid) task = get_pid_task(target->pid, PIDTYPE_PID); rcu_read_unlock(); if (!task) return ret; if (task->flags & PF_VCPU) { put_ta...
116,658,728,129,139,330,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,074
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static long kvm_vm_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) { struct kvm *kvm = filp->private_data; void __user *argp = (void __user *)arg; int r; if (kvm->mm != current->mm) return -EIO; switch (ioctl) { case KVM_CREATE_VCPU: r = kvm_vm_ioctl_create_vcpu(kvm, arg); break; cas...
270,115,332,143,555,500,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,075
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int kvm_vm_ioctl_set_memory_region(struct kvm *kvm, struct kvm_userspace_memory_region *mem) { if (mem->slot >= KVM_USER_MEM_SLOTS) return -EINVAL; return kvm_set_memory_region(kvm, mem); }
41,602,138,234,263,650,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,076
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void mark_page_dirty_in_slot(struct kvm *kvm, struct kvm_memory_slot *memslot, gfn_t gfn) { if (memslot && memslot->dirty_bitmap) { unsigned long rel_gfn = gfn - memslot->base_gfn; set_bit_le(rel_gfn, memslot->dirty_bitmap); } }
12,521,417,733,473,842,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,077
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
void update_memslots(struct kvm_memslots *slots, struct kvm_memory_slot *new, u64 last_generation) { if (new) { int id = new->id; struct kvm_memory_slot *old = id_to_memslot(slots, id); unsigned long npages = old->npages; *old = *new; if (new->npages != npages) sort_memslots(slots); } slots->ge...
9,179,421,510,843,846,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,078
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
int vcpu_load(struct kvm_vcpu *vcpu) { int cpu; if (mutex_lock_killable(&vcpu->mutex)) return -EINTR; if (unlikely(vcpu->pid != current->pids[PIDTYPE_PID].pid)) { /* The thread running this VCPU changed. */ struct pid *oldpid = vcpu->pid; struct pid *newpid = get_task_pid(current, PIDTYPE_PID); rcu_assign...
164,902,944,540,874,300,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,079
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int vcpu_stat_get(void *_offset, u64 *val) { unsigned offset = (long)_offset; struct kvm *kvm; struct kvm_vcpu *vcpu; int i; *val = 0; spin_lock(&kvm_lock); list_for_each_entry(kvm, &vm_list, vm_list) kvm_for_each_vcpu(i, vcpu, kvm) *val += *(u32 *)((void *)vcpu + offset); spin_unlock(&kvm_lock); ...
313,054,754,979,537,200,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,080
linux
338c7dbadd2671189cec7faf64c84d01071b3f96
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96
KVM: Improve create VCPU parameter (CVE-2013-4587) In multiple functions the vcpu_id is used as an offset into a bitfield. Ag malicious user could specify a vcpu_id greater than 255 in order to set or clear bits in kernel memory. This could be used to elevate priveges in the kernel. This patch verifies that the vcp...
0
static int vm_stat_get(void *_offset, u64 *val) { unsigned offset = (long)_offset; struct kvm *kvm; *val = 0; spin_lock(&kvm_lock); list_for_each_entry(kvm, &vm_list, vm_list) *val += *(u32 *)((void *)kvm + offset); spin_unlock(&kvm_lock); return 0; }
37,226,428,561,728,344,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4587
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
https://nvd.nist.gov/vuln/detail/CVE-2013-4587
31,081
linux
0e033e04c2678dbbe74a46b23fffb7bb918c288e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288e
ipv6: fix headroom calculation in udp6_ufo_fragment Commit 1e2bd517c108816220f262d7954b697af03b5f9c ("udp6: Fix udp fragmentation for tunnel traffic.") changed the calculation if there is enough space to include a fragment header in the skb from a skb->mac_header dervived one to skb_headroom. Because we already peeled...
0
int __init udp_offload_init(void) { return inet6_add_offload(&udpv6_offload, IPPROTO_UDP); }
147,043,238,962,258,000,000,000,000,000,000,000,000
udp_offload.c
268,267,300,744,756,900,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4563
The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP pack...
https://nvd.nist.gov/vuln/detail/CVE-2013-4563
31,082
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void SendATCommand(struct mp_port *mtpt) { unsigned char ch[] = {0x61,0x74,0x0d,0x0a,0x0}; unsigned char lineControl; unsigned char i=0; unsigned char Divisor = 0xc; lineControl = serial_inp(mtpt,UART_LCR); serial_outp(mtpt,UART_LCR,(lineControl | UART_LCR_DLAB)); serial_outp(mtpt,UART_DLL,(Divisor & 0xf...
203,261,191,044,079,040,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,083
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static inline int __mp_put_char(struct sb_uart_port *port, struct circ_buf *circ, unsigned char c) { unsigned long flags; int ret = 0; if (!circ->buf) return 0; spin_lock_irqsave(&port->lock, flags); if (uart_circ_chars_free(circ) != 0) { circ->buf[circ->head] = c; circ->head = (circ->head + 1) & (UART_XMI...
269,741,518,207,422,200,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,084
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void __mp_start(struct tty_struct *tty) { struct sb_uart_state *state = tty->driver_data; struct sb_uart_port *port = state->port; if (!uart_circ_empty(&state->info->xmit) && state->info->xmit.buf && !tty->stopped && !tty->hw_stopped) port->ops->start_tx(port); }
110,925,200,527,061,800,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,085
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void autoconfig(struct mp_port *mtpt, unsigned int probeflags) { unsigned char status1, scratch, scratch2, scratch3; unsigned char save_lcr, save_mcr; unsigned long flags; unsigned char u_type; unsigned char b_ret = 0; if (!mtpt->port.iobase && !mtpt->port.mapbase && !mtpt->port.membase) return; DEBU...
132,374,873,872,400,830,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,086
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void autoconfig_irq(struct mp_port *mtpt) { unsigned char save_mcr, save_ier; unsigned long irqs; int irq; /* forget possible initially masked and pending IRQ */ probe_irq_off(probe_irq_on()); save_mcr = serial_inp(mtpt, UART_MCR); save_ier = serial_inp(mtpt, UART_IER); serial_outp(mtpt, UART_MCR, UART_...
165,461,688,977,053,120,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,087
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static _INLINE_ void check_modem_status(struct mp_port *mtpt) { int status; status = serial_in(mtpt, UART_MSR); if ((status & UART_MSR_ANY_DELTA) == 0) return; if (status & UART_MSR_TERI) mtpt->port.icount.rng++; if (status & UART_MSR_DDSR) mtpt->port.icount.dsr++; if (status & UART_MSR_DDCD) sb_uart_h...
96,692,901,510,647,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,088
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int get_deep_fifo(struct sb_uart_port *port) { int afr_status = 0; afr_status = sb1054_get_register(port, PAGE_4, SB105X_AFR); return afr_status; }
141,528,086,126,941,210,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,089
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int get_device_type(int arg) { int ret; ret = inb(mp_devs[arg].option_reg_addr+MP_OPTR_DIR0); ret = (ret & 0xf0) >> 4; switch (ret) { case DIR_UART_16C550: return PORT_16C55X; case DIR_UART_16C1050: return PORT...
311,813,092,650,473,440,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,090
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int get_multidrop_addr(struct sb_uart_port *port) { return sb1054_get_register(port, PAGE_3, SB105X_XOFF2); }
248,298,953,816,183,160,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,091
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int init_mp_dev(struct pci_dev *pcidev, mppcibrd_t brd) { static struct mp_device_t *sbdev = mp_devs; unsigned long addr = 0; int j; struct resource *ret = NULL; sbdev->device_id = brd.device_id; pci_read_config_byte(pcidev, PCI_CLASS_REVISION, &(sbdev->revision)); sbdev->name = brd.name; sbdev->uart_ac...
45,295,663,173,145,900,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,092
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_add_one_port(struct uart_driver *drv, struct sb_uart_port *port) { struct sb_uart_state *state; int ret = 0; if (port->line >= drv->nr) return -EINVAL; state = drv->state + port->line; MP_MUTEX_LOCK(mp_mutex); if (state->port) { ret = -EINVAL; goto out; } state->port = port; spin_lock...
251,701,204,388,930,900,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,093
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_block_til_ready(struct file *filp, struct sb_uart_state *state) { DECLARE_WAITQUEUE(wait, current); struct sb_uart_info *info = state->info; struct sb_uart_port *port = state->port; unsigned int mctrl; info->blocked_open++; state->count--; add_wait_queue(&info->open_wait, &wait); while (1) { s...
149,568,202,452,637,680,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,094
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_break_ctl(struct tty_struct *tty, int break_state) { struct sb_uart_state *state = tty->driver_data; struct sb_uart_port *port = state->port; MP_STATE_LOCK(state); if (port->type != PORT_UNKNOWN) port->ops->break_ctl(port, break_state); MP_STATE_UNLOCK(state); return 0; }
203,661,703,434,994,400,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,095
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void mp_change_speed(struct sb_uart_state *state, struct MP_TERMIOS *old_termios) { struct tty_struct *tty = state->info->tty; struct sb_uart_port *port = state->port; if (!tty || port->type == PORT_UNKNOWN) return; if (tty->termios.c_cflag & CRTSCTS) state->info->flags |= UIF_CTS_FLOW; else state->...
33,310,556,860,886,370,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,096
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_chars_in_buffer(struct tty_struct *tty) { struct sb_uart_state *state = tty->driver_data; return uart_circ_chars_pending(&state->info->xmit); }
261,995,532,482,826,970,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,097
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void mp_close(struct tty_struct *tty, struct file *filp) { struct sb_uart_state *state = tty->driver_data; struct sb_uart_port *port; printk("mp_close!\n"); if (!state || !state->port) return; port = state->port; printk("close1 %d\n", __LINE__); MP_STATE_LOCK(state); printk("close2 %d\n", __LINE__)...
332,165,524,159,587,570,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,098
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_do_autoconfig(struct sb_uart_state *state) { struct sb_uart_port *port = state->port; int flags, ret; if (!capable(CAP_SYS_ADMIN)) return -EPERM; if (mutex_lock_interruptible(&state->mutex)) return -ERESTARTSYS; ret = -EBUSY; if (uart_users(state) == 1) { mp_shutdown(state); if (port->typ...
246,718,848,517,003,500,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,099
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void mp_flush_buffer(struct tty_struct *tty) { struct sb_uart_state *state = tty->driver_data; struct sb_uart_port *port; unsigned long flags; if (!state || !state->info) { return; } port = state->port; spin_lock_irqsave(&port->lock, flags); uart_circ_clear(&state->info->xmit); spin_unlock_irqrestor...
324,719,414,286,225,050,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,100
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_get_info(struct sb_uart_state *state, struct serial_struct *retinfo) { struct sb_uart_port *port = state->port; struct serial_struct tmp; memset(&tmp, 0, sizeof(tmp)); tmp.type = port->type; tmp.line = port->line; tmp.port = port->iobase; if (HIGH_BITS_OFFSET) tmp.port_high = (long) ...
64,279,584,214,654,150,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,101
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_get_lsr_info(struct sb_uart_state *state, unsigned int *value) { struct sb_uart_port *port = state->port; unsigned int result; result = port->ops->tx_empty(port); if (port->x_char || ((uart_circ_chars_pending(&state->info->xmit) > 0) && !state->info->tty->stopped && !state->info->tty->hw_stop...
152,625,243,437,063,980,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,102
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void mp_hangup(struct tty_struct *tty) { struct sb_uart_state *state = tty->driver_data; MP_STATE_LOCK(state); if (state->info && state->info->flags & UIF_NORMAL_ACTIVE) { mp_flush_buffer(tty); mp_shutdown(state); state->count = 0; state->info->flags &= ~UIF_NORMAL_ACTIVE; state->info->tty = NULL; ...
121,669,019,666,626,430,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,103
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_ioctl(struct tty_struct *tty, unsigned int cmd, unsigned long arg) { struct sb_uart_state *state = tty->driver_data; struct mp_port *info = (struct mp_port *)state->port; int ret = -ENOIOCTLCMD; switch (cmd) { case TIOCSMULTIDROP: /* set multi-drop mode enable or disable, and default operation ...
277,560,440,242,429,470,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,104
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_open(struct tty_struct *tty, struct file *filp) { struct uart_driver *drv = (struct uart_driver *)tty->driver->driver_state; struct sb_uart_state *state; int retval; int line = tty->index; struct mp_port *mtpt; retval = -ENODEV; if (line >= tty->driver->num) goto fail; state = uart_get(drv, l...
224,138,490,953,889,950,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,105
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_put_char(struct tty_struct *tty, unsigned char ch) { struct sb_uart_state *state = tty->driver_data; return __mp_put_char(state->port, &state->info->xmit, ch); }
195,180,259,558,653,800,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,106
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static void mp_put_chars(struct tty_struct *tty) { mp_start(tty); }
130,230,351,025,636,950,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516
31,107
linux
a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427
Staging: sb105x: info leak in mp_get_count() The icount.reserved[] array isn't initialized so it leaks stack information to userspace. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Li...
0
static int mp_register_driver(struct uart_driver *drv) { struct tty_driver *normal = NULL; int i, retval; drv->state = kmalloc(sizeof(struct sb_uart_state) * drv->nr, GFP_KERNEL); retval = -ENOMEM; if (!drv->state) { printk("SB PCI Error: Kernel memory allocation error!\n"); goto out; } memset(drv->state, ...
276,609,319,441,949,100,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-4516
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-4516