Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*", "matchCriteriaId": "82BFCD06-425A-469F-BD52-56C78AB11D54", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*", "matchCriteriaId": "B2E29DBF-4869-41F8-85F6-091F1B34D8F8", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*", "matchCriteriaId": "6D3B42C6-F8F7-493C-81AD-A112A207FC58", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*", "matchCriteriaId": "6F7F6E06-C45C-47E5-B745-33B1A5083F43", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*", "matchCriteriaId": "4C8DB4C3-3A34-496E-9422-3D7E1425B7D8", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*", "matchCriteriaId": "9B167417-35A9-42BA-874E-0B32EE44AFE4", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*", "matchCriteriaId": "F93FA4BD-DD95-4402-AC27-C1FB86469A52", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*", "matchCriteriaId": "AF6C0F8A-CD4A-4B7C-84D2-79150FBAAFF5", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*", "matchCriteriaId": "E392CFA9-C390-4F31-A826-5D2BE237FFD8", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "DA49E4BE-25FF-469E-BD82-390F1F705673", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*", "matchCriteriaId": "FD74D1CD-DBA8-487D-AE08-F3565B12B5D3", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*", "matchCriteriaId": "9A00D89D-63B9-425D-AF50-B274491FA470", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*", "matchCriteriaId": "F18C21F4-F5AB-49D0-8B77-6768337B391A", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*", "matchCriteriaId": "16CCD06D-0248-4802-8FAB-A8411F102078", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*", "matchCriteriaId": "08315601-ECBF-489B-8482-4D075ABB8B94", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*", "matchCriteriaId": "93FEF076-6924-4671-A7B4-619582B1F491", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*", "matchCriteriaId": "0E89A6BA-599E-4C5F-B60F-FF8175A1EE57", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*", "matchCriteriaId": "1D0D9E5A-3D4D-41F3-85DE-AA029C0ED86F", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC580424-3A41-4110-9CDD-C72B52FD360A", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "A88D6F21-5D58-4BF2-A3DD-6E1C21A464E8", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D16E881-C08D-4C23-BA7F-C2811EA65E6D", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "677023A0-0628-41D0-99B7-CEF547DA7249", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "DD77E075-1B20-4EE2-A14F-49772963E589", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "E85620CE-8085-4FE9-B8FE-11585FB2C4AF", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "24FC9829-EF73-4FF6-B752-8EFB4223703A", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "6F416D6E-9CF0-47E3-BEF9-97571888FB47", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C5B7FC7D-3287-4B15-879E-321F663EB508", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1A9A837-2771-4443-A18A-1CE2386FBBF6", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*", "matchCriteriaId": "E6016DD8-1AB1-43F9-9652-A47FD48861E0", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*", "matchCriteriaId": "23289CA4-3FE3-43E7-9793-3120928DD43D", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*", "matchCriteriaId": "631355B2-8B51-4F16-8733-9C54539E77C8", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*", "matchCriteriaId": "3BCE7F05-607F-48E2-B371-FBDCA585561A", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*", "matchCriteriaId": "177D555B-CD3B-4E3E-97BD-103AB2A6051A", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*", "matchCriteriaId": "45A19E0E-D07B-43E6-B334-A7A3FE4367C5", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*", "matchCriteriaId": "A8C0E4F9-F1B8-459B-9A4F-42164EBCFD61", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D220E16-C172-4A6A-971B-6B1B6CA6AA8F", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "D45AF000-98BE-4C23-8E40-A8E202800DC7", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*", "matchCriteriaId": "7E922227-ADB4-41CC-AC2E-10D0F9FD165E", "vulnerable": true}, {"criteria": "cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*", "matchCriteriaId": "C0BED70D-0E2E-433A-A8B1-3418793969CD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write to arbitrary memory locations, by using a crafted GPU command stream to modify the contents of a certain register."}, {"lang": "es", "value": "El controlador kgsl graphics para el kernel de Linux 3.x, utilizado en las contribuciones de Qualcomm Innovation Center (QuIC) Android para los dispositivos MSM y otros productos, no previene debidamente el acceso de escritura a los registros de contexto IOMMU, lo que permite a usuarios locales seleccionar una tabla de p\u00e1ginas personalizadas, y como consecuencia escribir en localizaciones arbitrarias de la memoria, mediante el uso de un flujo manipulado de comandos GPU para modificar los contenidos de cierto registro."}], "id": "CVE-2014-0972", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-08-01T11:13:08.353", "references": [{"source": "cve@mitre.org", "url": "https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.codeaurora.org/projects/security-advisories/unprivileged-gpu-command-streams-can-change-the-iommu-page-table-cve-2014-0972"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}