CVE-2013-2147
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
07/06/2013
Last modified:
11/04/2025
Description
The HP Smart Array controller disk-array driver and Compaq SMART2 controller disk-array driver in the Linux kernel through 3.9.4 do not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via (1) a crafted IDAGETPCIINFO command for a /dev/ida device, related to the ida_locked_ioctl function in drivers/block/cpqarray.c or (2) a crafted CCISS_PASSTHRU32 command for a /dev/cciss device, related to the cciss_ioctl32_passthru function in drivers/block/cciss.c.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.9.4 (including) | |
| cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://lkml.org/lkml/2013/6/3/127
- http://lkml.org/lkml/2013/6/3/131
- http://rhn.redhat.com/errata/RHSA-2013-1166.html
- http://www.openwall.com/lists/oss-security/2013/06/05/25
- http://www.ubuntu.com/usn/USN-1994-1
- http://www.ubuntu.com/usn/USN-1996-1
- http://www.ubuntu.com/usn/USN-1997-1
- http://www.ubuntu.com/usn/USN-1999-1
- http://www.ubuntu.com/usn/USN-2015-1
- http://www.ubuntu.com/usn/USN-2016-1
- http://www.ubuntu.com/usn/USN-2017-1
- http://www.ubuntu.com/usn/USN-2020-1
- http://www.ubuntu.com/usn/USN-2023-1
- http://www.ubuntu.com/usn/USN-2050-1
- https://bugzilla.redhat.com/show_bug.cgi?id=971242
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://lkml.org/lkml/2013/6/3/127
- http://lkml.org/lkml/2013/6/3/131
- http://rhn.redhat.com/errata/RHSA-2013-1166.html
- http://www.openwall.com/lists/oss-security/2013/06/05/25
- http://www.ubuntu.com/usn/USN-1994-1
- http://www.ubuntu.com/usn/USN-1996-1
- http://www.ubuntu.com/usn/USN-1997-1
- http://www.ubuntu.com/usn/USN-1999-1
- http://www.ubuntu.com/usn/USN-2015-1
- http://www.ubuntu.com/usn/USN-2016-1
- http://www.ubuntu.com/usn/USN-2017-1
- http://www.ubuntu.com/usn/USN-2020-1
- http://www.ubuntu.com/usn/USN-2023-1
- http://www.ubuntu.com/usn/USN-2050-1
- https://bugzilla.redhat.com/show_bug.cgi?id=971242



