CVE-2014-0972 (GCVE-0-2014-0972)
Vulnerability from cvelistv5 – Published: 2014-08-01 10:00 – Updated: 2024-08-06 09:34
VLAI?
Summary
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write to arbitrary memory locations, by using a crafted GPU command stream to modify the contents of a certain register.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:34:40.748Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write to arbitrary memory locations, by using a crafted GPU command stream to modify the contents of a certain register."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-08-25T18:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-0972",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write to arbitrary memory locations, by using a crafted GPU command stream to modify the contents of a certain register."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972",
"refsource": "CONFIRM",
"url": "https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-0972",
"datePublished": "2014-08-01T10:00:00",
"dateReserved": "2014-01-07T00:00:00",
"dateUpdated": "2024-08-06T09:34:40.748Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82BFCD06-425A-469F-BD52-56C78AB11D54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2E29DBF-4869-41F8-85F6-091F1B34D8F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D3B42C6-F8F7-493C-81AD-A112A207FC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F7F6E06-C45C-47E5-B745-33B1A5083F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C8DB4C3-3A34-496E-9422-3D7E1425B7D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B167417-35A9-42BA-874E-0B32EE44AFE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F93FA4BD-DD95-4402-AC27-C1FB86469A52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6C0F8A-CD4A-4B7C-84D2-79150FBAAFF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E392CFA9-C390-4F31-A826-5D2BE237FFD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA49E4BE-25FF-469E-BD82-390F1F705673\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD74D1CD-DBA8-487D-AE08-F3565B12B5D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A00D89D-63B9-425D-AF50-B274491FA470\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F18C21F4-F5AB-49D0-8B77-6768337B391A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16CCD06D-0248-4802-8FAB-A8411F102078\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08315601-ECBF-489B-8482-4D075ABB8B94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93FEF076-6924-4671-A7B4-619582B1F491\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E89A6BA-599E-4C5F-B60F-FF8175A1EE57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D0D9E5A-3D4D-41F3-85DE-AA029C0ED86F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC580424-3A41-4110-9CDD-C72B52FD360A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A88D6F21-5D58-4BF2-A3DD-6E1C21A464E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D16E881-C08D-4C23-BA7F-C2811EA65E6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"677023A0-0628-41D0-99B7-CEF547DA7249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD77E075-1B20-4EE2-A14F-49772963E589\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E85620CE-8085-4FE9-B8FE-11585FB2C4AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24FC9829-EF73-4FF6-B752-8EFB4223703A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F416D6E-9CF0-47E3-BEF9-97571888FB47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B7FC7D-3287-4B15-879E-321F663EB508\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1A9A837-2771-4443-A18A-1CE2386FBBF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6016DD8-1AB1-43F9-9652-A47FD48861E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"23289CA4-3FE3-43E7-9793-3120928DD43D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"631355B2-8B51-4F16-8733-9C54539E77C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BCE7F05-607F-48E2-B371-FBDCA585561A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"177D555B-CD3B-4E3E-97BD-103AB2A6051A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"45A19E0E-D07B-43E6-B334-A7A3FE4367C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8C0E4F9-F1B8-459B-9A4F-42164EBCFD61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D220E16-C172-4A6A-971B-6B1B6CA6AA8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D45AF000-98BE-4C23-8E40-A8E202800DC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E922227-ADB4-41CC-AC2E-10D0F9FD165E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0BED70D-0E2E-433A-A8B1-3418793969CD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write to arbitrary memory locations, by using a crafted GPU command stream to modify the contents of a certain register.\"}, {\"lang\": \"es\", \"value\": \"El controlador kgsl graphics para el kernel de Linux 3.x, utilizado en las contribuciones de Qualcomm Innovation Center (QuIC) Android para los dispositivos MSM y otros productos, no previene debidamente el acceso de escritura a los registros de contexto IOMMU, lo que permite a usuarios locales seleccionar una tabla de p\\u00e1ginas personalizadas, y como consecuencia escribir en localizaciones arbitrarias de la memoria, mediante el uso de un flujo manipulado de comandos GPU para modificar los contenidos de cierto registro.\"}]",
"id": "CVE-2014-0972",
"lastModified": "2024-11-21T02:03:08.190",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-08-01T11:13:08.353",
"references": "[{\"url\": \"https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-0972\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-08-01T11:13:08.353\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write to arbitrary memory locations, by using a crafted GPU command stream to modify the contents of a certain register.\"},{\"lang\":\"es\",\"value\":\"El controlador kgsl graphics para el kernel de Linux 3.x, utilizado en las contribuciones de Qualcomm Innovation Center (QuIC) Android para los dispositivos MSM y otros productos, no previene debidamente el acceso de escritura a los registros de contexto IOMMU, lo que permite a usuarios locales seleccionar una tabla de p\u00e1ginas personalizadas, y como consecuencia escribir en localizaciones arbitrarias de la memoria, mediante el uso de un flujo manipulado de comandos GPU para modificar los contenidos de cierto registro.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BFCD06-425A-469F-BD52-56C78AB11D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E29DBF-4869-41F8-85F6-091F1B34D8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3B42C6-F8F7-493C-81AD-A112A207FC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F7F6E06-C45C-47E5-B745-33B1A5083F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C8DB4C3-3A34-496E-9422-3D7E1425B7D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B167417-35A9-42BA-874E-0B32EE44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93FA4BD-DD95-4402-AC27-C1FB86469A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6C0F8A-CD4A-4B7C-84D2-79150FBAAFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E392CFA9-C390-4F31-A826-5D2BE237FFD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA49E4BE-25FF-469E-BD82-390F1F705673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD74D1CD-DBA8-487D-AE08-F3565B12B5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A00D89D-63B9-425D-AF50-B274491FA470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18C21F4-F5AB-49D0-8B77-6768337B391A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16CCD06D-0248-4802-8FAB-A8411F102078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08315601-ECBF-489B-8482-4D075ABB8B94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93FEF076-6924-4671-A7B4-619582B1F491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E89A6BA-599E-4C5F-B60F-FF8175A1EE57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D0D9E5A-3D4D-41F3-85DE-AA029C0ED86F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC580424-3A41-4110-9CDD-C72B52FD360A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A88D6F21-5D58-4BF2-A3DD-6E1C21A464E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D16E881-C08D-4C23-BA7F-C2811EA65E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677023A0-0628-41D0-99B7-CEF547DA7249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD77E075-1B20-4EE2-A14F-49772963E589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85620CE-8085-4FE9-B8FE-11585FB2C4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FC9829-EF73-4FF6-B752-8EFB4223703A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F416D6E-9CF0-47E3-BEF9-97571888FB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B7FC7D-3287-4B15-879E-321F663EB508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A9A837-2771-4443-A18A-1CE2386FBBF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6016DD8-1AB1-43F9-9652-A47FD48861E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"23289CA4-3FE3-43E7-9793-3120928DD43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"631355B2-8B51-4F16-8733-9C54539E77C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCE7F05-607F-48E2-B371-FBDCA585561A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"177D555B-CD3B-4E3E-97BD-103AB2A6051A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A19E0E-D07B-43E6-B334-A7A3FE4367C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C0E4F9-F1B8-459B-9A4F-42164EBCFD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D220E16-C172-4A6A-971B-6B1B6CA6AA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45AF000-98BE-4C23-8E40-A8E202800DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E922227-ADB4-41CC-AC2E-10D0F9FD165E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BED70D-0E2E-433A-A8B1-3418793969CD\"}]}]}],\"references\":[{\"url\":\"https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…