idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
31,008 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static int ip_vs_stats_seq_open(struct inode *inode, struct file *file)
{
return single_open(file, ip_vs_stats_show, NULL);
}
| 106,604,023,563,235,230,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,009 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static int ip_vs_stats_show(struct seq_file *seq, void *v)
{
/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
seq_puts(seq,
" Total Incoming Outgoing Incoming Outgoing\n");
seq_printf(seq,
" Conns Packets Packets Bytes Bytes\n");
s... | 289,117,329,727,704,100,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,010 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static __inline__ unsigned ip_vs_svc_fwm_hashkey(__u32 fwmark)
{
return fwmark & IP_VS_SVC_TAB_MASK;
}
| 181,035,999,124,844,340,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,011 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static int ip_vs_svc_hash(struct ip_vs_service *svc)
{
unsigned hash;
if (svc->flags & IP_VS_SVC_F_HASHED) {
pr_err("%s(): request for already hashed, called from %pF\n",
__func__, __builtin_return_address(0));
return 0;
}
if (svc->fwmark == 0) {
/*
* Hash it by <protocol,addr,port> in ip_vs_sv... | 188,365,138,071,918,020,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,012 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | ip_vs_svc_hashkey(int af, unsigned proto, const union nf_inet_addr *addr,
__be16 port)
{
register unsigned porth = ntohs(port);
__be32 addr_fold = addr->ip;
#ifdef CONFIG_IP_VS_IPV6
if (af == AF_INET6)
addr_fold = addr->ip6[0]^addr->ip6[1]^
addr->ip6[2]^addr->ip6[3];
#endif
return (proto^ntohl(addr_f... | 210,033,081,911,639,450,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,013 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static int ip_vs_svc_unhash(struct ip_vs_service *svc)
{
if (!(svc->flags & IP_VS_SVC_F_HASHED)) {
pr_err("%s(): request for unhash flagged, called from %pF\n",
__func__, __builtin_return_address(0));
return 0;
}
if (svc->fwmark == 0) {
/* Remove it from the ip_vs_svc_table table */
list_del(&svc->... | 37,417,406,555,059,320,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,014 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static void ip_vs_trash_cleanup(void)
{
struct ip_vs_dest *dest, *nxt;
list_for_each_entry_safe(dest, nxt, &ip_vs_dest_trash, n_list) {
list_del(&dest->n_list);
ip_vs_dst_reset(dest);
__ip_vs_unbind_svc(dest);
kfree(dest);
}
}
| 197,623,414,427,507,950,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,015 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | ip_vs_use_count_dec(void)
{
module_put(THIS_MODULE);
}
| 109,468,946,366,392,520,000,000,000,000,000,000,000 | ip_vs_ctl.c | 198,232,056,816,623,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,016 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | ip_vs_use_count_inc(void)
{
return try_module_get(THIS_MODULE);
}
| 112,437,273,843,331,130,000,000,000,000,000,000,000 | ip_vs_ctl.c | 198,232,056,816,623,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,017 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static int ip_vs_zero_all(void)
{
int idx;
struct ip_vs_service *svc;
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
ip_vs_zero_service(svc);
}
}
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx],... | 320,211,315,552,868,070,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,018 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | static int ip_vs_zero_service(struct ip_vs_service *svc)
{
struct ip_vs_dest *dest;
write_lock_bh(&__ip_vs_svc_lock);
list_for_each_entry(dest, &svc->destinations, n_list) {
ip_vs_zero_stats(&dest->stats);
}
ip_vs_zero_stats(&svc->stats);
write_unlock_bh(&__ip_vs_svc_lock);
return 0;
}
| 119,308,955,085,028,050,000,000,000,000,000,000,000 | ip_vs_ctl.c | 198,232,056,816,623,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,019 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | proc_do_defense_mode(ctl_table *table, int write,
void __user *buffer, size_t *lenp, loff_t *ppos)
{
int *valp = table->data;
int val = *valp;
int rc;
rc = proc_dointvec(table, write, buffer, lenp, ppos);
if (write && (*valp != val)) {
if ((*valp < 0) || (*valp > 3)) {
/* Restore the correct value */
... | 297,862,670,840,082,070,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,020 | linux | 04bcef2a83f40c6db24222b27a52892cba39dffb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb | ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 0 | proc_do_sync_threshold(ctl_table *table, int write,
void __user *buffer, size_t *lenp, loff_t *ppos)
{
int *valp = table->data;
int val[2];
int rc;
/* backup the value first */
memcpy(val, valp, sizeof(val));
rc = proc_dointvec(table, write, buffer, lenp, ppos);
if (write && (valp[0] < 0 || valp[1] < ... | 325,408,278,383,517,460,000,000,000,000,000,000,000 | ip_vs_ctl.c | 105,962,925,241,335,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4588 | Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system cal... | https://nvd.nist.gov/vuln/detail/CVE-2013-4588 |
31,021 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | __gfn_to_pfn_memslot(struct kvm_memory_slot *slot, gfn_t gfn, bool atomic,
bool *async, bool write_fault, bool *writable)
{
unsigned long addr = __gfn_to_hva_many(slot, gfn, NULL, write_fault);
if (addr == KVM_HVA_ERR_RO_BAD)
return KVM_PFN_ERR_RO_FAULT;
if (kvm_is_error_hva(addr))
return KVM_PFN_NOSLOT... | 305,549,896,885,654,680,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,022 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int __kvm_io_bus_read(struct kvm_io_bus *bus, struct kvm_io_range *range,
void *val)
{
int idx;
idx = kvm_io_bus_get_first_dev(bus, range->addr, range->len);
if (idx < 0)
return -EOPNOTSUPP;
while (idx < bus->dev_count &&
kvm_io_bus_cmp(range, &bus->range[idx]) == 0) {
if (!kvm_iodevice_read(... | 145,915,217,480,025,400,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,023 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int __kvm_io_bus_write(struct kvm_io_bus *bus,
struct kvm_io_range *range, const void *val)
{
int idx;
idx = kvm_io_bus_get_first_dev(bus, range->addr, range->len);
if (idx < 0)
return -EOPNOTSUPP;
while (idx < bus->dev_count &&
kvm_io_bus_cmp(range, &bus->range[idx]) == 0) {
if (!kvm_iodevi... | 115,487,718,799,862,790,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,024 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int __kvm_set_memory_region(struct kvm *kvm,
struct kvm_userspace_memory_region *mem)
{
int r;
gfn_t base_gfn;
unsigned long npages;
struct kvm_memory_slot *slot;
struct kvm_memory_slot old, new;
struct kvm_memslots *slots = NULL, *old_memslots;
enum kvm_mr_change change;
r = check_memory_region_flags(m... | 280,749,019,021,715,170,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,025 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int create_vcpu_fd(struct kvm_vcpu *vcpu)
{
return anon_inode_getfd("kvm-vcpu", &kvm_vcpu_fops, vcpu, O_RDWR | O_CLOEXEC);
}
| 84,911,699,929,749,920,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,026 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | unsigned long gfn_to_hva_prot(struct kvm *kvm, gfn_t gfn, bool *writable)
{
struct kvm_memory_slot *slot = gfn_to_memslot(kvm, gfn);
unsigned long hva = __gfn_to_hva_many(slot, gfn, NULL, false);
if (!kvm_is_error_hva(hva) && writable)
*writable = !memslot_is_readonly(slot);
return hva;
}
| 153,269,206,535,923,980,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,027 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void hardware_disable(void)
{
raw_spin_lock(&kvm_count_lock);
if (kvm_usage_count)
hardware_disable_nolock(NULL);
raw_spin_unlock(&kvm_count_lock);
}
| 218,067,860,787,987,500,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,028 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void hardware_disable_all(void)
{
raw_spin_lock(&kvm_count_lock);
hardware_disable_all_nolock();
raw_spin_unlock(&kvm_count_lock);
}
| 199,598,314,552,180,120,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,029 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void hardware_enable(void)
{
raw_spin_lock(&kvm_count_lock);
if (kvm_usage_count)
hardware_enable_nolock(NULL);
raw_spin_unlock(&kvm_count_lock);
}
| 37,889,775,446,387,515,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,030 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int hardware_enable_all(void)
{
int r = 0;
raw_spin_lock(&kvm_count_lock);
kvm_usage_count++;
if (kvm_usage_count == 1) {
atomic_set(&hardware_enable_failed, 0);
on_each_cpu(hardware_enable_nolock, NULL, 1);
if (atomic_read(&hardware_enable_failed)) {
hardware_disable_all_nolock();
r = -EBUSY;... | 154,642,110,972,312,690,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,031 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static struct kvm_memslots *install_new_memslots(struct kvm *kvm,
struct kvm_memslots *slots, struct kvm_memory_slot *new)
{
struct kvm_memslots *old_memslots = kvm->memslots;
update_memslots(slots, new, kvm->memslots->generation);
rcu_assign_pointer(kvm->memslots, slots);
synchronize_srcu_expedited(&kvm->srcu);... | 214,996,493,293,420,830,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,032 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_clear_guest_page(struct kvm *kvm, gfn_t gfn, int offset, int len)
{
const void *zero_page = (const void *) __va(page_to_phys(ZERO_PAGE(0)));
return kvm_write_guest_page(kvm, gfn, zero_page, offset, len);
}
| 89,559,619,556,442,700,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,033 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_cpu_hotplug(struct notifier_block *notifier, unsigned long val,
void *v)
{
int cpu = (long)v;
val &= ~CPU_TASKS_FROZEN;
switch (val) {
case CPU_DYING:
printk(KERN_INFO "kvm: disabling virtualization on CPU%d\n",
cpu);
hardware_disable();
break;
case CPU_STARTING:
printk(KERN_... | 277,672,408,141,153,270,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,034 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static struct kvm *kvm_create_vm(unsigned long type)
{
int r, i;
struct kvm *kvm = kvm_arch_alloc_vm();
if (!kvm)
return ERR_PTR(-ENOMEM);
r = kvm_arch_init_vm(kvm, type);
if (r)
goto out_err_nodisable;
r = hardware_enable_all();
if (r)
goto out_err_nodisable;
#ifdef CONFIG_HAVE_KVM_IRQCHIP
INIT_HLIST... | 30,091,123,293,266,050,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,035 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void kvm_destroy_devices(struct kvm *kvm)
{
struct list_head *node, *tmp;
list_for_each_safe(node, tmp, &kvm->devices) {
struct kvm_device *dev =
list_entry(node, struct kvm_device, vm_node);
list_del(node);
dev->ops->destroy(dev);
}
}
| 151,029,183,915,672,580,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,036 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void kvm_destroy_vm(struct kvm *kvm)
{
int i;
struct mm_struct *mm = kvm->mm;
kvm_arch_sync_events(kvm);
spin_lock(&kvm_lock);
list_del(&kvm->vm_list);
spin_unlock(&kvm_lock);
kvm_free_irq_routing(kvm);
for (i = 0; i < KVM_NR_BUSES; i++)
kvm_io_bus_destroy(kvm->buses[i]);
kvm_coalesced_mmio_free(kvm)... | 18,411,436,723,197,986,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,037 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static long kvm_dev_ioctl_check_extension_generic(long arg)
{
switch (arg) {
case KVM_CAP_USER_MEMORY:
case KVM_CAP_DESTROY_MEMORY_REGION_WORKS:
case KVM_CAP_JOIN_MEMORY_REGIONS_WORKS:
#ifdef CONFIG_KVM_APIC_ARCHITECTURE
case KVM_CAP_SET_BOOT_CPU_ID:
#endif
case KVM_CAP_INTERNAL_ERROR_DATA:
#ifdef CONFIG_HAVE_KVM... | 148,975,919,806,504,180,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,038 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_dev_ioctl_create_vm(unsigned long type)
{
int r;
struct kvm *kvm;
kvm = kvm_create_vm(type);
if (IS_ERR(kvm))
return PTR_ERR(kvm);
#ifdef KVM_COALESCED_MMIO_PAGE_OFFSET
r = kvm_coalesced_mmio_init(kvm);
if (r < 0) {
kvm_put_kvm(kvm);
return r;
}
#endif
r = anon_inode_getfd("kvm-vm", &kvm_v... | 290,640,068,266,604,100,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,039 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | struct kvm_device *kvm_device_from_filp(struct file *filp)
{
if (filp->f_op != &kvm_device_fops)
return NULL;
return filp->private_data;
}
| 124,832,036,853,493,230,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,040 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static long kvm_device_ioctl(struct file *filp, unsigned int ioctl,
unsigned long arg)
{
struct kvm_device *dev = filp->private_data;
switch (ioctl) {
case KVM_SET_DEVICE_ATTR:
return kvm_device_ioctl_attr(dev, dev->ops->set_attr, arg);
case KVM_GET_DEVICE_ATTR:
return kvm_device_ioctl_attr(dev, dev->o... | 28,857,459,004,721,513,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,041 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_device_ioctl_attr(struct kvm_device *dev,
int (*accessor)(struct kvm_device *dev,
struct kvm_device_attr *attr),
unsigned long arg)
{
struct kvm_device_attr attr;
if (!accessor)
return -EPERM;
if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
return -EFAULT;
return ... | 98,223,960,929,602,000,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,042 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_device_release(struct inode *inode, struct file *filp)
{
struct kvm_device *dev = filp->private_data;
struct kvm *kvm = dev->kvm;
kvm_put_kvm(kvm);
return 0;
}
| 284,888,209,411,114,260,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,043 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void kvm_exit(void)
{
kvm_exit_debug();
misc_deregister(&kvm_dev);
kmem_cache_destroy(kvm_vcpu_cache);
kvm_async_pf_deinit();
unregister_syscore_ops(&kvm_syscore_ops);
unregister_reboot_notifier(&kvm_reboot_notifier);
unregister_cpu_notifier(&kvm_cpu_notifier);
on_each_cpu(hardware_disable_nolock, NULL, 1);
kv... | 108,688,853,336,512,740,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,044 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void kvm_free_physmem_slot(struct kvm *kvm, struct kvm_memory_slot *free,
struct kvm_memory_slot *dont)
{
if (!dont || free->dirty_bitmap != dont->dirty_bitmap)
kvm_destroy_dirty_bitmap(free);
kvm_arch_free_memslot(kvm, free, dont);
free->npages = 0;
}
| 64,651,389,263,286,350,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,045 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_get_dirty_log(struct kvm *kvm,
struct kvm_dirty_log *log, int *is_dirty)
{
struct kvm_memory_slot *memslot;
int r, i;
unsigned long n;
unsigned long any = 0;
r = -EINVAL;
if (log->slot >= KVM_USER_MEM_SLOTS)
goto out;
memslot = id_to_memslot(kvm->memslots, log->slot);
r = -ENOENT;
if (!memslot->... | 143,890,719,198,490,240,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,046 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_gfn_to_hva_cache_init(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
gpa_t gpa, unsigned long len)
{
struct kvm_memslots *slots = kvm_memslots(kvm);
int offset = offset_in_page(gpa);
gfn_t start_gfn = gpa >> PAGE_SHIFT;
gfn_t end_gfn = (gpa + len - 1) >> PAGE_SHIFT;
gfn_t nr_pages_needed = end_gfn... | 175,026,242,501,100,180,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,047 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_init(void *opaque, unsigned vcpu_size, unsigned vcpu_align,
struct module *module)
{
int r;
int cpu;
r = kvm_arch_init(opaque);
if (r)
goto out_fail;
/*
* kvm_arch_init makes sure there's at most one caller
* for architectures that support multiple implementations,
* like intel and amd on x86... | 279,388,397,509,459,270,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,048 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_init_debug(void)
{
int r = -EEXIST;
struct kvm_stats_debugfs_item *p;
kvm_debugfs_dir = debugfs_create_dir("kvm", NULL);
if (kvm_debugfs_dir == NULL)
goto out;
for (p = debugfs_entries; p->name; ++p) {
p->dentry = debugfs_create_file(p->name, 0444, kvm_debugfs_dir,
(void *)(long)p->offse... | 209,221,547,707,084,900,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,049 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_io_bus_get_first_dev(struct kvm_io_bus *bus,
gpa_t addr, int len)
{
struct kvm_io_range *range, key;
int off;
key = (struct kvm_io_range) {
.addr = addr,
.len = len,
};
range = bsearch(&key, bus->range, bus->dev_count,
sizeof(struct kvm_io_range), kvm_io_bus_sort_cmp);
if (range ==... | 264,036,624,461,579,050,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,050 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_io_bus_insert_dev(struct kvm_io_bus *bus, struct kvm_io_device *dev,
gpa_t addr, int len)
{
bus->range[bus->dev_count++] = (struct kvm_io_range) {
.addr = addr,
.len = len,
.dev = dev,
};
sort(bus->range, bus->dev_count, sizeof(struct kvm_io_range),
kvm_io_bus_sort_cmp, NULL);
return 0... | 44,432,804,522,600,170,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,051 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_io_bus_read(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
int len, void *val)
{
struct kvm_io_bus *bus;
struct kvm_io_range range;
int r;
range = (struct kvm_io_range) {
.addr = addr,
.len = len,
};
bus = srcu_dereference(kvm->buses[bus_idx], &kvm->srcu);
r = __kvm_io_bus_read(bus, &rang... | 123,211,404,279,107,160,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,052 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_io_bus_register_dev(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
int len, struct kvm_io_device *dev)
{
struct kvm_io_bus *new_bus, *bus;
bus = kvm->buses[bus_idx];
/* exclude ioeventfd which is limited by maximum fd */
if (bus->dev_count - bus->ioeventfd_count > NR_IOBUS_DEVS - 1)
return -EN... | 2,830,118,232,910,359,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,053 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_io_bus_sort_cmp(const void *p1, const void *p2)
{
return kvm_io_bus_cmp(p1, p2);
}
| 154,193,039,234,386,500,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,054 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_io_bus_write(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
int len, const void *val)
{
struct kvm_io_bus *bus;
struct kvm_io_range range;
int r;
range = (struct kvm_io_range) {
.addr = addr,
.len = len,
};
bus = srcu_dereference(kvm->buses[bus_idx], &kvm->srcu);
r = __kvm_io_bus_write(b... | 40,366,859,070,903,246,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,055 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int kvm_ioctl_create_device(struct kvm *kvm,
struct kvm_create_device *cd)
{
struct kvm_device_ops *ops = NULL;
struct kvm_device *dev;
bool test = cd->flags & KVM_CREATE_DEVICE_TEST;
int ret;
switch (cd->type) {
#ifdef CONFIG_KVM_MPIC
case KVM_DEV_TYPE_FSL_MPIC_20:
case KVM_DEV_TYPE_FSL_MPIC_42:
... | 92,936,346,832,113,980,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,056 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | bool kvm_is_mmio_pfn(pfn_t pfn)
{
if (pfn_valid(pfn))
return PageReserved(pfn_to_page(pfn));
return true;
}
| 132,334,736,178,124,060,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,057 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_is_visible_gfn(struct kvm *kvm, gfn_t gfn)
{
struct kvm_memory_slot *memslot = gfn_to_memslot(kvm, gfn);
if (!memslot || memslot->id >= KVM_USER_MEM_SLOTS ||
memslot->flags & KVM_MEMSLOT_INVALID)
return 0;
return 1;
}
| 161,824,197,340,086,570,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,058 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void kvm_make_mclock_inprogress_request(struct kvm *kvm)
{
make_all_cpus_request(kvm, KVM_REQ_MCLOCK_INPROGRESS);
}
| 246,450,632,082,860,700,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,059 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void kvm_make_scan_ioapic_request(struct kvm *kvm)
{
make_all_cpus_request(kvm, KVM_REQ_SCAN_IOAPIC);
}
| 176,389,906,853,039,700,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,060 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static struct page *kvm_pfn_to_page(pfn_t pfn)
{
if (is_error_noslot_pfn(pfn))
return KVM_ERR_PTR_BAD_PAGE;
if (kvm_is_mmio_pfn(pfn)) {
WARN_ON(1);
return KVM_ERR_PTR_BAD_PAGE;
}
return pfn_to_page(pfn);
}
| 17,064,278,006,562,168,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,061 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_read_guest_atomic(struct kvm *kvm, gpa_t gpa, void *data,
unsigned long len)
{
int r;
unsigned long addr;
gfn_t gfn = gpa >> PAGE_SHIFT;
int offset = offset_in_page(gpa);
addr = gfn_to_hva_prot(kvm, gfn, NULL);
if (kvm_is_error_hva(addr))
return -EFAULT;
pagefault_disable();
r = kvm_read_hva_ato... | 52,661,071,990,941,640,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,062 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_read_guest_cached(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
void *data, unsigned long len)
{
struct kvm_memslots *slots = kvm_memslots(kvm);
int r;
BUG_ON(len > ghc->len);
if (slots->generation != ghc->generation)
kvm_gfn_to_hva_cache_init(kvm, ghc, ghc->gpa, ghc->len);
if (unlikely(!ghc->m... | 280,728,273,752,709,160,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,063 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset,
int len)
{
int r;
unsigned long addr;
addr = gfn_to_hva_prot(kvm, gfn, NULL);
if (kvm_is_error_hva(addr))
return -EFAULT;
r = kvm_read_hva(data, (void __user *)addr + offset, len);
if (r)
return -EFAULT;
return 0;
}
| 143,665,486,029,530,050,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,064 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void kvm_release_pfn_clean(pfn_t pfn)
{
if (!is_error_noslot_pfn(pfn) && !kvm_is_mmio_pfn(pfn))
put_page(pfn_to_page(pfn));
}
| 56,635,057,527,954,040,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,065 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void kvm_resume(void)
{
if (kvm_usage_count) {
WARN_ON(raw_spin_is_locked(&kvm_count_lock));
hardware_enable_nolock(NULL);
}
}
| 102,165,783,845,655,570,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,066 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void kvm_sched_in(struct preempt_notifier *pn, int cpu)
{
struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn);
if (vcpu->preempted)
vcpu->preempted = false;
kvm_arch_vcpu_load(vcpu, cpu);
}
| 1,795,571,999,290,661,500,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,067 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static void kvm_sched_out(struct preempt_notifier *pn,
struct task_struct *next)
{
struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn);
if (current->state == TASK_RUNNING)
vcpu->preempted = true;
kvm_arch_vcpu_put(vcpu);
}
| 230,737,573,868,762,160,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,068 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_set_memory_region(struct kvm *kvm,
struct kvm_userspace_memory_region *mem)
{
int r;
mutex_lock(&kvm->slots_lock);
r = __kvm_set_memory_region(kvm, mem);
mutex_unlock(&kvm->slots_lock);
return r;
}
| 87,337,061,381,031,430,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,069 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static long kvm_vcpu_compat_ioctl(struct file *filp,
unsigned int ioctl, unsigned long arg)
{
struct kvm_vcpu *vcpu = filp->private_data;
void __user *argp = compat_ptr(arg);
int r;
if (vcpu->kvm->mm != current->mm)
return -EIO;
switch (ioctl) {
case KVM_SET_SIGNAL_MASK: {
struct kvm_signal_mask __use... | 109,068,194,155,314,700,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,070 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
{
struct page *page;
int r;
mutex_init(&vcpu->mutex);
vcpu->cpu = -1;
vcpu->kvm = kvm;
vcpu->vcpu_id = id;
vcpu->pid = NULL;
init_waitqueue_head(&vcpu->wq);
kvm_async_pf_vcpu_init(vcpu);
page = alloc_page(GFP_KERNEL | __GFP_ZERO);
if (!... | 245,632,189,526,777,070,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,071 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static long kvm_vcpu_ioctl(struct file *filp,
unsigned int ioctl, unsigned long arg)
{
struct kvm_vcpu *vcpu = filp->private_data;
void __user *argp = (void __user *)arg;
int r;
struct kvm_fpu *fpu = NULL;
struct kvm_sregs *kvm_sregs = NULL;
if (vcpu->kvm->mm != current->mm)
return -EIO;
#if defined(CON... | 83,496,155,809,671,640,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,072 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void kvm_vcpu_on_spin(struct kvm_vcpu *me)
{
struct kvm *kvm = me->kvm;
struct kvm_vcpu *vcpu;
int last_boosted_vcpu = me->kvm->last_boosted_vcpu;
int yielded = 0;
int try = 3;
int pass;
int i;
kvm_vcpu_set_in_spin_loop(me, true);
/*
* We boost the priority of a VCPU that is runnable but not
* currently r... | 136,051,312,767,745,640,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,073 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | bool kvm_vcpu_yield_to(struct kvm_vcpu *target)
{
struct pid *pid;
struct task_struct *task = NULL;
bool ret = false;
rcu_read_lock();
pid = rcu_dereference(target->pid);
if (pid)
task = get_pid_task(target->pid, PIDTYPE_PID);
rcu_read_unlock();
if (!task)
return ret;
if (task->flags & PF_VCPU) {
put_ta... | 116,658,728,129,139,330,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,074 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static long kvm_vm_ioctl(struct file *filp,
unsigned int ioctl, unsigned long arg)
{
struct kvm *kvm = filp->private_data;
void __user *argp = (void __user *)arg;
int r;
if (kvm->mm != current->mm)
return -EIO;
switch (ioctl) {
case KVM_CREATE_VCPU:
r = kvm_vm_ioctl_create_vcpu(kvm, arg);
break;
cas... | 270,115,332,143,555,500,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,075 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int kvm_vm_ioctl_set_memory_region(struct kvm *kvm,
struct kvm_userspace_memory_region *mem)
{
if (mem->slot >= KVM_USER_MEM_SLOTS)
return -EINVAL;
return kvm_set_memory_region(kvm, mem);
}
| 41,602,138,234,263,650,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,076 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void mark_page_dirty_in_slot(struct kvm *kvm, struct kvm_memory_slot *memslot,
gfn_t gfn)
{
if (memslot && memslot->dirty_bitmap) {
unsigned long rel_gfn = gfn - memslot->base_gfn;
set_bit_le(rel_gfn, memslot->dirty_bitmap);
}
}
| 12,521,417,733,473,842,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,077 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | void update_memslots(struct kvm_memslots *slots, struct kvm_memory_slot *new,
u64 last_generation)
{
if (new) {
int id = new->id;
struct kvm_memory_slot *old = id_to_memslot(slots, id);
unsigned long npages = old->npages;
*old = *new;
if (new->npages != npages)
sort_memslots(slots);
}
slots->ge... | 9,179,421,510,843,846,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,078 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | int vcpu_load(struct kvm_vcpu *vcpu)
{
int cpu;
if (mutex_lock_killable(&vcpu->mutex))
return -EINTR;
if (unlikely(vcpu->pid != current->pids[PIDTYPE_PID].pid)) {
/* The thread running this VCPU changed. */
struct pid *oldpid = vcpu->pid;
struct pid *newpid = get_task_pid(current, PIDTYPE_PID);
rcu_assign... | 164,902,944,540,874,300,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,079 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int vcpu_stat_get(void *_offset, u64 *val)
{
unsigned offset = (long)_offset;
struct kvm *kvm;
struct kvm_vcpu *vcpu;
int i;
*val = 0;
spin_lock(&kvm_lock);
list_for_each_entry(kvm, &vm_list, vm_list)
kvm_for_each_vcpu(i, vcpu, kvm)
*val += *(u32 *)((void *)vcpu + offset);
spin_unlock(&kvm_lock);
... | 313,054,754,979,537,200,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,080 | linux | 338c7dbadd2671189cec7faf64c84d01071b3f96 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96 | KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 0 | static int vm_stat_get(void *_offset, u64 *val)
{
unsigned offset = (long)_offset;
struct kvm *kvm;
*val = 0;
spin_lock(&kvm_lock);
list_for_each_entry(kvm, &vm_list, vm_list)
*val += *(u32 *)((void *)kvm + offset);
spin_unlock(&kvm_lock);
return 0;
}
| 37,226,428,561,728,344,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4587 | Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. | https://nvd.nist.gov/vuln/detail/CVE-2013-4587 |
31,081 | linux | 0e033e04c2678dbbe74a46b23fffb7bb918c288e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288e | ipv6: fix headroom calculation in udp6_ufo_fragment
Commit 1e2bd517c108816220f262d7954b697af03b5f9c ("udp6: Fix udp
fragmentation for tunnel traffic.") changed the calculation if
there is enough space to include a fragment header in the skb from a
skb->mac_header dervived one to skb_headroom. Because we already peeled... | 0 | int __init udp_offload_init(void)
{
return inet6_add_offload(&udpv6_offload, IPPROTO_UDP);
}
| 147,043,238,962,258,000,000,000,000,000,000,000,000 | udp_offload.c | 268,267,300,744,756,900,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4563 | The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP pack... | https://nvd.nist.gov/vuln/detail/CVE-2013-4563 |
31,082 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void SendATCommand(struct mp_port *mtpt)
{
unsigned char ch[] = {0x61,0x74,0x0d,0x0a,0x0};
unsigned char lineControl;
unsigned char i=0;
unsigned char Divisor = 0xc;
lineControl = serial_inp(mtpt,UART_LCR);
serial_outp(mtpt,UART_LCR,(lineControl | UART_LCR_DLAB));
serial_outp(mtpt,UART_DLL,(Divisor & 0xf... | 203,261,191,044,079,040,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,083 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static inline int __mp_put_char(struct sb_uart_port *port, struct circ_buf *circ, unsigned char c)
{
unsigned long flags;
int ret = 0;
if (!circ->buf)
return 0;
spin_lock_irqsave(&port->lock, flags);
if (uart_circ_chars_free(circ) != 0) {
circ->buf[circ->head] = c;
circ->head = (circ->head + 1) & (UART_XMI... | 269,741,518,207,422,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,084 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void __mp_start(struct tty_struct *tty)
{
struct sb_uart_state *state = tty->driver_data;
struct sb_uart_port *port = state->port;
if (!uart_circ_empty(&state->info->xmit) && state->info->xmit.buf &&
!tty->stopped && !tty->hw_stopped)
port->ops->start_tx(port);
}
| 110,925,200,527,061,800,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,085 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void autoconfig(struct mp_port *mtpt, unsigned int probeflags)
{
unsigned char status1, scratch, scratch2, scratch3;
unsigned char save_lcr, save_mcr;
unsigned long flags;
unsigned char u_type;
unsigned char b_ret = 0;
if (!mtpt->port.iobase && !mtpt->port.mapbase && !mtpt->port.membase)
return;
DEBU... | 132,374,873,872,400,830,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,086 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void autoconfig_irq(struct mp_port *mtpt)
{
unsigned char save_mcr, save_ier;
unsigned long irqs;
int irq;
/* forget possible initially masked and pending IRQ */
probe_irq_off(probe_irq_on());
save_mcr = serial_inp(mtpt, UART_MCR);
save_ier = serial_inp(mtpt, UART_IER);
serial_outp(mtpt, UART_MCR, UART_... | 165,461,688,977,053,120,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,087 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static _INLINE_ void check_modem_status(struct mp_port *mtpt)
{
int status;
status = serial_in(mtpt, UART_MSR);
if ((status & UART_MSR_ANY_DELTA) == 0)
return;
if (status & UART_MSR_TERI)
mtpt->port.icount.rng++;
if (status & UART_MSR_DDSR)
mtpt->port.icount.dsr++;
if (status & UART_MSR_DDCD)
sb_uart_h... | 96,692,901,510,647,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,088 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int get_deep_fifo(struct sb_uart_port *port)
{
int afr_status = 0;
afr_status = sb1054_get_register(port, PAGE_4, SB105X_AFR);
return afr_status;
}
| 141,528,086,126,941,210,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,089 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int get_device_type(int arg)
{
int ret;
ret = inb(mp_devs[arg].option_reg_addr+MP_OPTR_DIR0);
ret = (ret & 0xf0) >> 4;
switch (ret)
{
case DIR_UART_16C550:
return PORT_16C55X;
case DIR_UART_16C1050:
return PORT... | 311,813,092,650,473,440,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,090 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int get_multidrop_addr(struct sb_uart_port *port)
{
return sb1054_get_register(port, PAGE_3, SB105X_XOFF2);
}
| 248,298,953,816,183,160,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,091 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int init_mp_dev(struct pci_dev *pcidev, mppcibrd_t brd)
{
static struct mp_device_t *sbdev = mp_devs;
unsigned long addr = 0;
int j;
struct resource *ret = NULL;
sbdev->device_id = brd.device_id;
pci_read_config_byte(pcidev, PCI_CLASS_REVISION, &(sbdev->revision));
sbdev->name = brd.name;
sbdev->uart_ac... | 45,295,663,173,145,900,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,092 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_add_one_port(struct uart_driver *drv, struct sb_uart_port *port)
{
struct sb_uart_state *state;
int ret = 0;
if (port->line >= drv->nr)
return -EINVAL;
state = drv->state + port->line;
MP_MUTEX_LOCK(mp_mutex);
if (state->port) {
ret = -EINVAL;
goto out;
}
state->port = port;
spin_lock... | 251,701,204,388,930,900,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,093 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_block_til_ready(struct file *filp, struct sb_uart_state *state)
{
DECLARE_WAITQUEUE(wait, current);
struct sb_uart_info *info = state->info;
struct sb_uart_port *port = state->port;
unsigned int mctrl;
info->blocked_open++;
state->count--;
add_wait_queue(&info->open_wait, &wait);
while (1) {
s... | 149,568,202,452,637,680,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,094 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_break_ctl(struct tty_struct *tty, int break_state)
{
struct sb_uart_state *state = tty->driver_data;
struct sb_uart_port *port = state->port;
MP_STATE_LOCK(state);
if (port->type != PORT_UNKNOWN)
port->ops->break_ctl(port, break_state);
MP_STATE_UNLOCK(state);
return 0;
}
| 203,661,703,434,994,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,095 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void mp_change_speed(struct sb_uart_state *state, struct MP_TERMIOS *old_termios)
{
struct tty_struct *tty = state->info->tty;
struct sb_uart_port *port = state->port;
if (!tty || port->type == PORT_UNKNOWN)
return;
if (tty->termios.c_cflag & CRTSCTS)
state->info->flags |= UIF_CTS_FLOW;
else
state->... | 33,310,556,860,886,370,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,096 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_chars_in_buffer(struct tty_struct *tty)
{
struct sb_uart_state *state = tty->driver_data;
return uart_circ_chars_pending(&state->info->xmit);
}
| 261,995,532,482,826,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,097 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void mp_close(struct tty_struct *tty, struct file *filp)
{
struct sb_uart_state *state = tty->driver_data;
struct sb_uart_port *port;
printk("mp_close!\n");
if (!state || !state->port)
return;
port = state->port;
printk("close1 %d\n", __LINE__);
MP_STATE_LOCK(state);
printk("close2 %d\n", __LINE__)... | 332,165,524,159,587,570,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,098 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_do_autoconfig(struct sb_uart_state *state)
{
struct sb_uart_port *port = state->port;
int flags, ret;
if (!capable(CAP_SYS_ADMIN))
return -EPERM;
if (mutex_lock_interruptible(&state->mutex))
return -ERESTARTSYS;
ret = -EBUSY;
if (uart_users(state) == 1) {
mp_shutdown(state);
if (port->typ... | 246,718,848,517,003,500,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,099 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void mp_flush_buffer(struct tty_struct *tty)
{
struct sb_uart_state *state = tty->driver_data;
struct sb_uart_port *port;
unsigned long flags;
if (!state || !state->info) {
return;
}
port = state->port;
spin_lock_irqsave(&port->lock, flags);
uart_circ_clear(&state->info->xmit);
spin_unlock_irqrestor... | 324,719,414,286,225,050,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,100 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_get_info(struct sb_uart_state *state, struct serial_struct *retinfo)
{
struct sb_uart_port *port = state->port;
struct serial_struct tmp;
memset(&tmp, 0, sizeof(tmp));
tmp.type = port->type;
tmp.line = port->line;
tmp.port = port->iobase;
if (HIGH_BITS_OFFSET)
tmp.port_high = (long) ... | 64,279,584,214,654,150,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,101 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_get_lsr_info(struct sb_uart_state *state, unsigned int *value)
{
struct sb_uart_port *port = state->port;
unsigned int result;
result = port->ops->tx_empty(port);
if (port->x_char ||
((uart_circ_chars_pending(&state->info->xmit) > 0) &&
!state->info->tty->stopped && !state->info->tty->hw_stop... | 152,625,243,437,063,980,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,102 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void mp_hangup(struct tty_struct *tty)
{
struct sb_uart_state *state = tty->driver_data;
MP_STATE_LOCK(state);
if (state->info && state->info->flags & UIF_NORMAL_ACTIVE) {
mp_flush_buffer(tty);
mp_shutdown(state);
state->count = 0;
state->info->flags &= ~UIF_NORMAL_ACTIVE;
state->info->tty = NULL;
... | 121,669,019,666,626,430,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,103 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_ioctl(struct tty_struct *tty, unsigned int cmd, unsigned long arg)
{
struct sb_uart_state *state = tty->driver_data;
struct mp_port *info = (struct mp_port *)state->port;
int ret = -ENOIOCTLCMD;
switch (cmd) {
case TIOCSMULTIDROP:
/* set multi-drop mode enable or disable, and default operation ... | 277,560,440,242,429,470,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,104 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_open(struct tty_struct *tty, struct file *filp)
{
struct uart_driver *drv = (struct uart_driver *)tty->driver->driver_state;
struct sb_uart_state *state;
int retval;
int line = tty->index;
struct mp_port *mtpt;
retval = -ENODEV;
if (line >= tty->driver->num)
goto fail;
state = uart_get(drv, l... | 224,138,490,953,889,950,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,105 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_put_char(struct tty_struct *tty, unsigned char ch)
{
struct sb_uart_state *state = tty->driver_data;
return __mp_put_char(state->port, &state->info->xmit, ch);
}
| 195,180,259,558,653,800,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,106 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static void mp_put_chars(struct tty_struct *tty)
{
mp_start(tty);
}
| 130,230,351,025,636,950,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
31,107 | linux | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | 0 | static int mp_register_driver(struct uart_driver *drv)
{
struct tty_driver *normal = NULL;
int i, retval;
drv->state = kmalloc(sizeof(struct sb_uart_state) * drv->nr, GFP_KERNEL);
retval = -ENOMEM;
if (!drv->state)
{
printk("SB PCI Error: Kernel memory allocation error!\n");
goto out;
}
memset(drv->state, ... | 276,609,319,441,949,100,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-4516 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2013-4516 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.