idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
24,178 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int write_note_info(struct elf_note_info *info,
struct file *file, loff_t *foffset)
{
int i;
struct list_head *t;
for (i = 0; i < info->numnote; i++)
if (!writenote(info->notes + i, file, foffset))
return 0;
/* write out the thread status notes section */
list_for_each(t, &info->thread_list) {
... | 295,731,081,521,717,020,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,179 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int writenote(struct memelfnote *men, struct file *file,
loff_t *foffset)
{
struct elf_note en;
en.n_namesz = strlen(men->name) + 1;
en.n_descsz = men->datasz;
en.n_type = men->type;
DUMP_WRITE(&en, sizeof(en), foffset);
DUMP_WRITE(men->name, en.n_namesz, foffset);
if (!alignfile(file, foffset))
ret... | 237,155,389,335,719,760,000,000,000,000,000,000,000 | binfmt_elf.c | 233,173,923,575,517,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,180 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | build_path_from_dentry(struct dentry *direntry)
{
struct dentry *temp;
int namelen;
int dfsplen;
char *full_path;
char dirsep;
struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
unsigned seq;
dirsep = CIFS_DIR_SEP(cifs_sb);
if (tcon->Flags & SMB_SHA... | 237,237,655,254,560,000,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,181 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | static int cifs_ci_compare(const struct dentry *parent,
const struct inode *pinode,
const struct dentry *dentry, const struct inode *inode,
unsigned int len, const char *str, const struct qstr *name)
{
struct nls_table *codepage = CIFS_SB(pinode->i_sb)->local_nls;
if ((name->len == len) &&
(nls_strnicmp(c... | 91,666,071,633,238,240,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,182 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | static int cifs_ci_hash(const struct dentry *dentry, const struct inode *inode,
struct qstr *q)
{
struct nls_table *codepage = CIFS_SB(dentry->d_sb)->local_nls;
unsigned long hash;
int i;
hash = init_name_hash();
for (i = 0; i < q->len; i++)
hash = partial_name_hash(nls_tolower(codepage, q->name[i]),
ha... | 143,493,950,549,700,640,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,183 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | cifs_create(struct inode *inode, struct dentry *direntry, int mode,
struct nameidata *nd)
{
int rc = -ENOENT;
int xid;
int create_options = CREATE_NOT_DIR;
__u32 oplock = 0;
int oflags;
/*
* BB below access is probably too much for mknod to request
* but we have to do query and setpathinfo so requesting
... | 53,766,617,010,655,330,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,184 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd)
{
if (nd && (nd->flags & LOOKUP_RCU))
return -ECHILD;
if (direntry->d_inode) {
if (cifs_revalidate_dentry(direntry))
return 0;
else {
/*
* Forcibly invalidate automounting directory inodes
* (remote DFS directories) so to have them
... | 266,655,600,446,060,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,185 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode,
dev_t device_number)
{
int rc = -EPERM;
int xid;
int create_options = CREATE_NOT_DIR | CREATE_OPTION_SPECIAL;
struct cifs_sb_info *cifs_sb;
struct tcon_link *tlink;
struct cifs_tcon *pTcon;
struct cifs_io_parms io_parms;
char *full_path = ... | 294,067,938,757,214,330,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,186 | linux | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08 | None | 0 | renew_parental_timestamps(struct dentry *direntry)
{
/* BB check if there is a way to get the kernel to do this or if we
really need this */
do {
direntry->d_time = jiffies;
direntry = direntry->d_parent;
} while (!IS_ROOT(direntry));
}
| 116,036,247,517,392,090,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2012-1090 | The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. | https://nvd.nist.gov/vuln/detail/CVE-2012-1090 |
24,187 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | static kadm5_ret_t add_to_history(krb5_context context,
krb5_kvno hist_kvno,
osa_princ_ent_t adb,
kadm5_policy_ent_t pol,
osa_pw_hist_ent *pw)
{
osa_pw_hist_ent *histp;
uint32_... | 63,860,412,133,141,050,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,188 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | check_pw_reuse(krb5_context context,
krb5_keyblock *hist_keyblocks,
int n_new_key_data, krb5_key_data *new_key_data,
unsigned int n_pw_hist_data, osa_pw_hist_ent *pw_hist_data)
{
unsigned int x, y, z;
krb5_keyblock newkey, histkey, *kb;
krb5_key_data *key_data;
... | 287,402,041,613,244,850,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,189 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | static void cleanup_key_data(context, count, data)
krb5_context context;
int count;
krb5_key_data * data;
{
int i, j;
for (i = 0; i < count; i++)
for (j = 0; j < data[i].key_data_ver; j++)
if (data[i].key_data_length[j])
krb5_db_free(c... | 152,876,358,984,415,200,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,190 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | int create_history_entry(krb5_context context,
krb5_keyblock *hist_key, int n_key_data,
krb5_key_data *key_data, osa_pw_hist_ent *hist)
{
int i, ret;
krb5_keyblock key;
krb5_keysalt salt;
hist->key_data = (krb5_key_data*)malloc(n_key_data*sizeof(krb5_ke... | 73,443,158,408,158,880,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,191 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | static int decrypt_key_data(krb5_context context,
int n_key_data, krb5_key_data *key_data,
krb5_keyblock **keyblocks, int *n_keys)
{
krb5_keyblock *keys;
int ret, i;
keys = (krb5_keyblock *) malloc(n_key_data*sizeof(krb5_keyblock));
if (keys == NU... | 288,286,156,212,644,400,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,192 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | void free_history_entry(krb5_context context, osa_pw_hist_ent *hist)
{
int i;
for (i = 0; i < hist->n_key_data; i++)
krb5_free_key_data_contents(context, &hist->key_data[i]);
free(hist->key_data);
}
| 54,452,265,882,822,260,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,193 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_chpass_principal(void *server_handle,
krb5_principal principal, char *password)
{
return
kadm5_chpass_principal_3(server_handle, principal, FALSE,
0, NULL, password);
}
| 63,652,481,527,733,460,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,194 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_chpass_principal_3(void *server_handle,
krb5_principal principal, krb5_boolean keepold,
int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
char *password)
{
krb5_int32 now;
kadm5_policy_ent_rec pol;
osa_prin... | 107,267,619,462,969,450,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,195 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_copy_principal(krb5_context context, krb5_const_principal inprinc, krb5_principal *outprinc)
{
register krb5_principal tempprinc;
register int i, nelems;
tempprinc = (krb5_principal)krb5_db_alloc(context, NULL, sizeof(krb5_principal_data));
if (tempprinc == 0)
return ENOMEM;
VALGRIN... | 65,474,722,469,543,670,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,196 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_create_principal(void *server_handle,
kadm5_principal_ent_t entry, long mask,
char *password)
{
return
kadm5_create_principal_3(server_handle, entry, mask,
0, NULL, password);
}
| 212,662,112,202,327,430,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,197 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_create_principal_3(void *server_handle,
kadm5_principal_ent_t entry, long mask,
int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
char *password)
{
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
kadm5_policy_en... | 310,216,220,629,832,660,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,198 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_ret_t kadm5_decrypt_key(void *server_handle,
kadm5_principal_ent_t entry, krb5_int32
ktype, krb5_int32 stype, krb5_int32
kvno, krb5_keyblock *keyblock,
krb5_keysalt *keysalt, int *kvnop)
{
k... | 179,256,936,649,434,000,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,199 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_delete_principal(void *server_handle, krb5_principal principal)
{
unsigned int ret;
kadm5_policy_ent_rec polent;
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
kadm5_server_handle_t handle = server_handle;
CHECK_HANDLE(server_handle);
krb5_cl... | 113,216,267,715,935,800,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,200 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_free_principal(krb5_context context, krb5_principal val)
{
register krb5_int32 i;
if (!val)
return;
if (val->data) {
i = krb5_princ_size(context, val);
while(--i >= 0)
krb5_db_free(context, krb5_princ_component(context, val, i)->data);
krb5_db_free(context... | 166,521,146,005,056,500,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,201 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_get_principal(void *server_handle, krb5_principal principal,
kadm5_principal_ent_t entry,
long in_mask)
{
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
krb5_error_code ret = 0;
long mask;
int i;
... | 207,255,978,085,364,650,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,202 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_get_principal_keys(void *server_handle /* IN */,
krb5_principal principal /* IN */,
krb5_keyblock **keyblocks /* OUT */,
int *n_keys /* OUT */)
{
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
kadm5_ret_t ... | 259,910,800,043,101,840,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,203 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_get_strings(void *server_handle, krb5_principal principal,
krb5_string_attr **strings_out, int *count_out)
{
kadm5_server_handle_t handle = server_handle;
kadm5_ret_t ret;
krb5_db_entry *kdb = NULL;
*strings_out = NULL;
*count_out = 0;
CHECK_HANDLE(server_handle);
if... | 243,373,784,351,591,940,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,204 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_launch_task (krb5_context context,
const char *task_path, char * const task_argv[],
const char *buffer)
{
kadm5_ret_t ret;
int data_pipe[2];
ret = pipe (data_pipe);
if (ret)
ret = errno;
if (!ret) {
pid_t pid = fork ();
if (pid ==... | 187,860,418,752,926,600,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,205 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_modify_principal(void *server_handle,
kadm5_principal_ent_t entry, long mask)
{
int ret, ret2, i;
kadm5_policy_ent_rec npol, opol;
int have_npol = 0, have_opol = 0;
krb5_db_entry *kdb;
krb5_tl_data *tl_data_... | 255,276,484,532,036,870,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,206 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_purgekeys(void *server_handle,
krb5_principal principal,
int keepkvno)
{
kadm5_server_handle_t handle = server_handle;
kadm5_ret_t ret;
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
krb5_key_data *old_keydata;
int n_old_keydata;
int i, j, k;
CHECK_HAND... | 38,724,746,883,680,490,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,207 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_randkey_principal_3(void *server_handle,
krb5_principal principal,
krb5_boolean keepold,
int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
krb5_keyblock **keyblocks,
int *n_keys)
{
kr... | 44,639,990,974,772,965,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,208 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_rename_principal(void *server_handle,
krb5_principal source, krb5_principal target)
{
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
krb5_error_code ret;
kadm5_server_handle_t handle = server_handle;
krb5_int16 stype, i;
krb5_data *salt = NULL;
CHECK_HANDLE(server_h... | 305,775,194,077,278,900,000,000,000,000,000,000,000 | svr_principal.c | 270,585,709,681,308,150,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,209 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_set_string(void *server_handle, krb5_principal principal,
const char *key, const char *value)
{
kadm5_server_handle_t handle = server_handle;
kadm5_ret_t ret;
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
CHECK_HANDLE(server_handle);
if (principal == NULL || key == NULL)
... | 68,845,528,963,675,890,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,210 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_set_use_password_server (void)
{
use_password_server = 1;
}
| 230,545,508,634,110,870,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,211 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_setkey_principal(void *server_handle,
krb5_principal principal,
krb5_keyblock *keyblocks,
int n_keys)
{
return
kadm5_setkey_principal_3(server_handle, principal,
FALSE, 0, NULL,
... | 9,448,859,774,450,809,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,212 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_setkey_principal_3(void *server_handle,
krb5_principal principal,
krb5_boolean keepold,
int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
krb5_keyblock *keyblocks,
int n_keys)
{
krb5_db_en... | 64,777,596,466,119,110,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,213 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_setv4key_principal(void *server_handle,
krb5_principal principal,
krb5_keyblock *keyblock)
{
krb5_db_entry *kdb;
osa_princ_ent_rec adb;
krb5_int32 now;
kadm5_policy_ent_rec pol;
krb5_keysalt ... | 94,472,577,876,810,270,000,000,000,000,000,000,000 | svr_principal.c | 265,907,974,596,756,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,214 | krb5 | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | 0 | kadm5_ret_t krb5_copy_key_data_contents(context, from, to)
krb5_context context;
krb5_key_data *from, *to;
{
int i, idx;
*to = *from;
idx = (from->key_data_ver == 1 ? 1 : 2);
for (i = 0; i < idx; i++) {
if ( from->key_data_length[i] ) {
to->key_data_contents[i] = malloc(fr... | 207,147,260,481,545,560,000,000,000,000,000,000,000 | svr_principal.c | 254,658,728,888,016,480,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2012-1013 | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas... | https://nvd.nist.gov/vuln/detail/CVE-2012-1013 |
24,215 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE0(getpgrp)
{
return sys_getpgid(0);
}
| 54,637,526,262,175,530,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,216 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE0(setsid)
{
struct task_struct *group_leader = current->group_leader;
struct pid *sid = task_pid(group_leader);
pid_t session = pid_vnr(sid);
int err = -EPERM;
write_lock_irq(&tasklist_lock);
/* Fail if I am already a session leader */
if (group_leader->signal->leader)
goto out;
/* Fail if a p... | 329,902,184,973,653,830,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,217 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(setgid, gid_t, gid)
{
struct user_namespace *ns = current_user_ns();
const struct cred *old;
struct cred *new;
int retval;
kgid_t kgid;
kgid = make_kgid(ns, gid);
if (!gid_valid(kgid))
return -EINVAL;
new = prepare_creds();
if (!new)
return -ENOMEM;
old = current_cred();
retval = -EPER... | 149,453,344,197,488,800,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,218 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(setuid, uid_t, uid)
{
struct user_namespace *ns = current_user_ns();
const struct cred *old;
struct cred *new;
int retval;
kuid_t kuid;
kuid = make_kuid(ns, uid);
if (!uid_valid(kuid))
return -EINVAL;
new = prepare_creds();
if (!new)
return -ENOMEM;
old = current_cred();
retval = -EPER... | 73,009,167,199,380,030,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,219 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(setfsuid, uid_t, uid)
{
const struct cred *old;
struct cred *new;
uid_t old_fsuid;
kuid_t kuid;
old = current_cred();
old_fsuid = from_kuid_munged(old->user_ns, old->fsuid);
kuid = make_kuid(old->user_ns, uid);
if (!uid_valid(kuid))
return old_fsuid;
new = prepare_creds();
if (!new)
ret... | 211,037,779,440,413,660,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,220 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(setfsgid, gid_t, gid)
{
const struct cred *old;
struct cred *new;
gid_t old_fsgid;
kgid_t kgid;
old = current_cred();
old_fsgid = from_kgid_munged(old->user_ns, old->fsgid);
kgid = make_kgid(old->user_ns, gid);
if (!gid_valid(kgid))
return old_fsgid;
new = prepare_creds();
if (!new)
ret... | 108,571,696,176,029,770,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,221 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(times, struct tms __user *, tbuf)
{
if (tbuf) {
struct tms tmp;
do_sys_times(&tmp);
if (copy_to_user(tbuf, &tmp, sizeof(struct tms)))
return -EFAULT;
}
force_successful_syscall_return();
return (long) jiffies_64_to_clock_t(get_jiffies_64());
}
| 274,843,324,272,078,730,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,222 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(getpgid, pid_t, pid)
{
struct task_struct *p;
struct pid *grp;
int retval;
rcu_read_lock();
if (!pid)
grp = task_pgrp(current);
else {
retval = -ESRCH;
p = find_task_by_vpid(pid);
if (!p)
goto out;
grp = task_pgrp(p);
if (!grp)
goto out;
retval = security_task_getpgid(p);
i... | 156,259,015,797,964,040,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,223 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(getsid, pid_t, pid)
{
struct task_struct *p;
struct pid *sid;
int retval;
rcu_read_lock();
if (!pid)
sid = task_session(current);
else {
retval = -ESRCH;
p = find_task_by_vpid(pid);
if (!p)
goto out;
sid = task_session(p);
if (!sid)
goto out;
retval = security_task_getsid(p);... | 164,676,094,530,120,630,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,224 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(newuname, struct new_utsname __user *, name)
{
int errno = 0;
down_read(&uts_sem);
if (copy_to_user(name, utsname(), sizeof *name))
errno = -EFAULT;
up_read(&uts_sem);
if (!errno && override_release(name->release, sizeof(name->release)))
errno = -EFAULT;
if (!errno && override_architecture(n... | 147,432,215,957,728,730,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,225 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(uname, struct old_utsname __user *, name)
{
int error = 0;
if (!name)
return -EFAULT;
down_read(&uts_sem);
if (copy_to_user(name, utsname(), sizeof(*name)))
error = -EFAULT;
up_read(&uts_sem);
if (!error && override_release(name->release, sizeof(name->release)))
error = -EFAULT;
if (!err... | 159,439,178,925,847,300,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,226 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(olduname, struct oldold_utsname __user *, name)
{
int error;
if (!name)
return -EFAULT;
if (!access_ok(VERIFY_WRITE, name, sizeof(struct oldold_utsname)))
return -EFAULT;
down_read(&uts_sem);
error = __copy_to_user(&name->sysname, &utsname()->sysname,
__OLD_UTS_LEN);
error |= __put... | 285,970,518,852,297,700,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,227 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE1(umask, int, mask)
{
mask = xchg(¤t->fs->umask, mask & S_IRWXUGO);
return mask;
}
| 82,917,129,590,445,120,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,228 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(setreuid, uid_t, ruid, uid_t, euid)
{
struct user_namespace *ns = current_user_ns();
const struct cred *old;
struct cred *new;
int retval;
kuid_t kruid, keuid;
kruid = make_kuid(ns, ruid);
keuid = make_kuid(ns, euid);
if ((ruid != (uid_t) -1) && !uid_valid(kruid))
return -EINVAL;
if ((euid ... | 117,846,837,590,806,480,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,229 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(setpgid, pid_t, pid, pid_t, pgid)
{
struct task_struct *p;
struct task_struct *group_leader = current->group_leader;
struct pid *pgrp;
int err;
if (!pid)
pid = task_pid_vnr(group_leader);
if (!pgid)
pgid = pid;
if (pgid < 0)
return -EINVAL;
rcu_read_lock();
/* From this point forward we... | 90,616,032,696,533,300,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,230 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(gethostname, char __user *, name, int, len)
{
int i, errno;
struct new_utsname *u;
if (len < 0)
return -EINVAL;
down_read(&uts_sem);
u = utsname();
i = 1 + strlen(u->nodename);
if (i > len)
i = len;
errno = 0;
if (copy_to_user(name, u->nodename, i))
errno = -EFAULT;
up_read(&uts_sem);
... | 195,732,898,906,589,220,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,231 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(setdomainname, char __user *, name, int, len)
{
int errno;
char tmp[__NEW_UTS_LEN];
if (!ns_capable(current->nsproxy->uts_ns->user_ns, CAP_SYS_ADMIN))
return -EPERM;
if (len < 0 || len > __NEW_UTS_LEN)
return -EINVAL;
down_write(&uts_sem);
errno = -EFAULT;
if (!copy_from_user(tmp, name, len... | 88,938,904,043,438,250,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,232 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(getrlimit, unsigned int, resource, struct rlimit __user *, rlim)
{
struct rlimit value;
int ret;
ret = do_prlimit(current, resource, NULL, &value);
if (!ret)
ret = copy_to_user(rlim, &value, sizeof(*rlim)) ? -EFAULT : 0;
return ret;
}
| 217,049,987,065,464,230,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,233 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim)
{
struct rlimit new_rlim;
if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
return -EFAULT;
return do_prlimit(current, resource, &new_rlim, NULL);
}
| 43,599,591,709,475,900,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,234 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE2(getrusage, int, who, struct rusage __user *, ru)
{
if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN &&
who != RUSAGE_THREAD)
return -EINVAL;
return getrusage(current, who, ru);
}
| 57,622,139,388,468,030,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,235 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE3(setpriority, int, which, int, who, int, niceval)
{
struct task_struct *g, *p;
struct user_struct *user;
const struct cred *cred = current_cred();
int error = -EINVAL;
struct pid *pgrp;
kuid_t uid;
if (which > PRIO_USER || which < PRIO_PROCESS)
goto out;
/* normalize: avoid signed division (r... | 118,055,202,349,142,580,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,236 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE3(getresuid, uid_t __user *, ruidp, uid_t __user *, euidp, uid_t __user *, suidp)
{
const struct cred *cred = current_cred();
int retval;
uid_t ruid, euid, suid;
ruid = from_kuid_munged(cred->user_ns, cred->uid);
euid = from_kuid_munged(cred->user_ns, cred->euid);
suid = from_kuid_munged(cred->user... | 137,304,087,249,625,070,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,237 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE3(setresgid, gid_t, rgid, gid_t, egid, gid_t, sgid)
{
struct user_namespace *ns = current_user_ns();
const struct cred *old;
struct cred *new;
int retval;
kgid_t krgid, kegid, ksgid;
krgid = make_kgid(ns, rgid);
kegid = make_kgid(ns, egid);
ksgid = make_kgid(ns, sgid);
if ((rgid != (gid_t) -1) ... | 328,440,511,571,388,900,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,238 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE3(getresgid, gid_t __user *, rgidp, gid_t __user *, egidp, gid_t __user *, sgidp)
{
const struct cred *cred = current_cred();
int retval;
gid_t rgid, egid, sgid;
rgid = from_kgid_munged(cred->user_ns, cred->gid);
egid = from_kgid_munged(cred->user_ns, cred->egid);
sgid = from_kgid_munged(cred->user... | 176,571,410,091,558,900,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,239 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE3(getcpu, unsigned __user *, cpup, unsigned __user *, nodep,
struct getcpu_cache __user *, unused)
{
int err = 0;
int cpu = raw_smp_processor_id();
if (cpup)
err |= put_user(cpu, cpup);
if (nodep)
err |= put_user(cpu_to_node(cpu), nodep);
return err ? -EFAULT : 0;
}
| 77,455,433,754,778,175,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,240 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE4(prlimit64, pid_t, pid, unsigned int, resource,
const struct rlimit64 __user *, new_rlim,
struct rlimit64 __user *, old_rlim)
{
struct rlimit64 old64, new64;
struct rlimit old, new;
struct task_struct *tsk;
int ret;
if (new_rlim) {
if (copy_from_user(&new64, new_rlim, sizeof(new64)))
retur... | 40,352,818,104,466,730,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,241 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3,
unsigned long, arg4, unsigned long, arg5)
{
struct task_struct *me = current;
unsigned char comm[sizeof(me->comm)];
long error;
error = security_task_prctl(option, arg2, arg3, arg4, arg5);
if (error != -ENOSYS)
return error;
error... | 332,378,857,758,883,350,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,242 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int __orderly_poweroff(void)
{
int argc;
char **argv;
static char *envp[] = {
"HOME=/",
"PATH=/sbin:/bin:/usr/sbin:/usr/bin",
NULL
};
int ret;
argv = argv_split(GFP_ATOMIC, poweroff_cmd, &argc);
if (argv == NULL) {
printk(KERN_WARNING "%s failed to allocate memory for \"%s\"\n",
__func__... | 239,675,544,154,694,500,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,243 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void accumulate_thread_rusage(struct task_struct *t, struct rusage *r)
{
r->ru_nvcsw += t->nvcsw;
r->ru_nivcsw += t->nivcsw;
r->ru_minflt += t->min_flt;
r->ru_majflt += t->maj_flt;
r->ru_inblock += task_io_get_inblock(t);
r->ru_oublock += task_io_get_oublock(t);
}
| 71,029,230,042,518,360,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,244 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void argv_cleanup(struct subprocess_info *info)
{
argv_free(info->argv);
}
| 87,610,276,657,029,490,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,245 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int check_prlimit_permission(struct task_struct *task)
{
const struct cred *cred = current_cred(), *tcred;
if (current == task)
return 0;
tcred = __task_cred(task);
if (uid_eq(cred->uid, tcred->euid) &&
uid_eq(cred->uid, tcred->suid) &&
uid_eq(cred->uid, tcred->uid) &&
gid_eq(cred->gid, t... | 24,521,527,941,324,005,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,246 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | void ctrl_alt_del(void)
{
static DECLARE_WORK(cad_work, deferred_cad);
if (C_A_D)
schedule_work(&cad_work);
else
kill_cad_pid(SIGINT, 1);
}
| 49,912,537,323,977,490,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,247 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void deferred_cad(struct work_struct *dummy)
{
kernel_restart(NULL);
}
| 121,522,515,745,834,570,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,248 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | int do_prlimit(struct task_struct *tsk, unsigned int resource,
struct rlimit *new_rlim, struct rlimit *old_rlim)
{
struct rlimit *rlim;
int retval = 0;
if (resource >= RLIM_NLIMITS)
return -EINVAL;
if (new_rlim) {
if (new_rlim->rlim_cur > new_rlim->rlim_max)
return -EINVAL;
if (resource == RLIMIT_NOFILE... | 167,139,635,918,182,680,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,249 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | void emergency_restart(void)
{
kmsg_dump(KMSG_DUMP_EMERG);
machine_emergency_restart();
}
| 172,888,107,600,185,860,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,250 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void k_getrusage(struct task_struct *p, int who, struct rusage *r)
{
struct task_struct *t;
unsigned long flags;
cputime_t tgutime, tgstime, utime, stime;
unsigned long maxrss = 0;
memset((char *) r, 0, sizeof *r);
utime = stime = 0;
if (who == RUSAGE_THREAD) {
task_times(current, &utime, &stime);
a... | 14,869,869,729,376,568,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,251 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | void kernel_power_off(void)
{
kernel_shutdown_prepare(SYSTEM_POWER_OFF);
if (pm_power_off_prepare)
pm_power_off_prepare();
disable_nonboot_cpus();
syscore_shutdown();
printk(KERN_EMERG "Power down.\n");
kmsg_dump(KMSG_DUMP_POWEROFF);
machine_power_off();
}
| 225,821,082,914,905,900,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,252 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | void kernel_restart(char *cmd)
{
kernel_restart_prepare(cmd);
disable_nonboot_cpus();
if (!cmd)
printk(KERN_EMERG "Restarting system.\n");
else
printk(KERN_EMERG "Restarting system with command '%s'.\n", cmd);
kmsg_dump(KMSG_DUMP_RESTART);
machine_restart(cmd);
}
| 269,218,735,579,204,100,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,253 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | void kernel_restart_prepare(char *cmd)
{
blocking_notifier_call_chain(&reboot_notifier_list, SYS_RESTART, cmd);
system_state = SYSTEM_RESTART;
usermodehelper_disable();
device_shutdown();
syscore_shutdown();
}
| 242,229,161,376,547,950,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,254 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void kernel_shutdown_prepare(enum system_states state)
{
blocking_notifier_call_chain(&reboot_notifier_list,
(state == SYSTEM_HALT)?SYS_HALT:SYS_POWER_OFF, NULL);
system_state = state;
usermodehelper_disable();
device_shutdown();
}
| 109,003,537,055,123,600,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,255 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | int orderly_poweroff(bool force)
{
int ret = __orderly_poweroff();
if (ret && force) {
printk(KERN_WARNING "Failed to start orderly shutdown: "
"forcing the issue\n");
/*
* I guess this should try to kick off some daemon to sync and
* poweroff asap. Or not even bother syncing if we're doing an
... | 63,935,393,854,715,970,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,256 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int prctl_get_tid_address(struct task_struct *me, int __user **tid_addr)
{
return put_user(me->clear_child_tid, tid_addr);
}
| 322,073,420,458,993,330,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,257 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int prctl_get_tid_address(struct task_struct *me, int __user **tid_addr)
{
return -EINVAL;
}
| 132,998,367,366,019,200,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,258 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int prctl_set_mm(int opt, unsigned long addr,
unsigned long arg4, unsigned long arg5)
{
unsigned long rlim = rlimit(RLIMIT_DATA);
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma;
int error;
if (arg5 || (arg4 && opt != PR_SET_MM_AUXV))
return -EINVAL;
if (!capable(CAP_SYS_RESOURCE))
... | 60,843,206,254,355,500,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,259 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int prctl_set_mm(int opt, unsigned long addr,
unsigned long arg4, unsigned long arg5)
{
return -EINVAL;
}
| 11,941,728,175,176,370,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,260 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int prctl_set_mm_exe_file(struct mm_struct *mm, unsigned int fd)
{
struct fd exe;
struct dentry *dentry;
int err;
exe = fdget(fd);
if (!exe.file)
return -EBADF;
dentry = exe.file->f_path.dentry;
/*
* Because the original mm->exe_file points to executable file, make
* sure that this one is executa... | 53,751,252,529,883,820,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,261 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static inline bool rlim64_is_infinity(__u64 rlim64)
{
#if BITS_PER_LONG < 64
return rlim64 >= ULONG_MAX;
#else
return rlim64 == RLIM64_INFINITY;
#endif
}
| 316,835,324,453,316,970,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,262 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void rlim64_to_rlim(const struct rlimit64 *rlim64, struct rlimit *rlim)
{
if (rlim64_is_infinity(rlim64->rlim_cur))
rlim->rlim_cur = RLIM_INFINITY;
else
rlim->rlim_cur = (unsigned long)rlim64->rlim_cur;
if (rlim64_is_infinity(rlim64->rlim_max))
rlim->rlim_max = RLIM_INFINITY;
else
rlim->rlim_max = (u... | 13,331,424,374,458,818,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,263 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static void rlim_to_rlim64(const struct rlimit *rlim, struct rlimit64 *rlim64)
{
if (rlim->rlim_cur == RLIM_INFINITY)
rlim64->rlim_cur = RLIM64_INFINITY;
else
rlim64->rlim_cur = rlim->rlim_cur;
if (rlim->rlim_max == RLIM_INFINITY)
rlim64->rlim_max = RLIM64_INFINITY;
else
rlim64->rlim_max = rlim->rlim_max;
}... | 277,344,683,053,685,200,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,264 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int set_one_prio(struct task_struct *p, int niceval, int error)
{
int no_nice;
if (!set_one_prio_perm(p)) {
error = -EPERM;
goto out;
}
if (niceval < task_nice(p) && !can_nice(p, niceval)) {
error = -EACCES;
goto out;
}
no_nice = security_task_setnice(p, niceval);
if (no_nice) {
error = no_nice... | 303,348,639,032,489,000,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,265 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static bool set_one_prio_perm(struct task_struct *p)
{
const struct cred *cred = current_cred(), *pcred = __task_cred(p);
if (uid_eq(pcred->uid, cred->euid) ||
uid_eq(pcred->euid, cred->euid))
return true;
if (ns_capable(pcred->user_ns, CAP_SYS_NICE))
return true;
return false;
}
| 33,496,947,514,161,460,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,266 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 0 | static int set_user(struct cred *new)
{
struct user_struct *new_user;
new_user = alloc_uid(new->uid);
if (!new_user)
return -EAGAIN;
/*
* We don't fail in case of NPROC limit excess here because too many
* poorly written programs don't check set*uid() return code, assuming
* it never fails if called by ro... | 39,530,695,063,808,845,000,000,000,000,000,000,000 | sys.c | 308,050,338,192,613,660,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
24,267 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 0 | struct io_context *alloc_io_context(gfp_t gfp_flags, int node)
{
struct io_context *ret;
ret = kmem_cache_alloc_node(iocontext_cachep, gfp_flags, node);
if (ret) {
atomic_long_set(&ret->refcount, 1);
atomic_set(&ret->nr_tasks, 1);
spin_lock_init(&ret->lock);
ret->ioprio_changed = 0;
ret->ioprio = 0;
re... | 140,562,196,767,187,040,000,000,000,000,000,000,000 | blk-ioc.c | 264,446,797,429,152,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
24,268 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 0 | static int __init blk_ioc_init(void)
{
iocontext_cachep = kmem_cache_create("blkdev_ioc",
sizeof(struct io_context), 0, SLAB_PANIC, NULL);
return 0;
}
| 107,727,565,927,534,910,000,000,000,000,000,000,000 | blk-ioc.c | 264,446,797,429,152,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
24,269 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 0 | static void cfq_dtor(struct io_context *ioc)
{
if (!hlist_empty(&ioc->cic_list)) {
struct cfq_io_context *cic;
cic = list_entry(ioc->cic_list.first, struct cfq_io_context,
cic_list);
cic->dtor(ioc);
}
}
| 220,270,290,602,694,420,000,000,000,000,000,000,000 | blk-ioc.c | 264,446,797,429,152,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
24,270 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 0 | void copy_io_context(struct io_context **pdst, struct io_context **psrc)
{
struct io_context *src = *psrc;
struct io_context *dst = *pdst;
if (src) {
BUG_ON(atomic_long_read(&src->refcount) == 0);
atomic_long_inc(&src->refcount);
put_io_context(dst);
*pdst = src;
}
}
| 277,625,653,825,795,400,000,000,000,000,000,000,000 | blk-ioc.c | 264,446,797,429,152,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
24,271 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 0 | struct io_context *current_io_context(gfp_t gfp_flags, int node)
{
struct task_struct *tsk = current;
struct io_context *ret;
ret = tsk->io_context;
if (likely(ret))
return ret;
ret = alloc_io_context(gfp_flags, node);
if (ret) {
/* make sure set_task_ioprio() sees the settings above */
smp_wmb();
tsk->... | 2,882,878,489,322,067,700,000,000,000,000,000,000 | blk-ioc.c | 264,446,797,429,152,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
24,272 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 0 | struct io_context *get_io_context(gfp_t gfp_flags, int node)
{
struct io_context *ret = NULL;
/*
* Check for unlikely race with exiting task. ioc ref count is
* zero when ioc is being detached.
*/
do {
ret = current_io_context(gfp_flags, node);
if (unlikely(!ret))
break;
} while (!atomic_long_inc_not_... | 45,827,592,830,402,330,000,000,000,000,000,000,000 | blk-ioc.c | 264,446,797,429,152,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
24,273 | suhosin | 73b1968ee30f6d9d2dae497544b910e68e114bfa | https://github.com/stefanesser/suhosin | https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa | Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory) | 0 | int suhosin_header_handler(sapi_header_struct *sapi_header, sapi_header_op_enum op, sapi_headers_struct *sapi_headers TSRMLS_DC)
#else
int suhosin_header_handler(sapi_header_struct *sapi_header, sapi_headers_struct *sapi_headers TSRMLS_DC)
#endif
{
int retval = SAPI_HEADER_ADD, i;
char *tmp;
#if PHP_VERSION_ID >= 50... | 206,460,468,463,429,560,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-0807 | Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in... | https://nvd.nist.gov/vuln/detail/CVE-2012-0807 |
24,274 | suhosin | 73b1968ee30f6d9d2dae497544b910e68e114bfa | https://github.com/stefanesser/suhosin | https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa | Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory) | 0 | void suhosin_hook_header_handler()
{
if (orig_header_handler == NULL) {
orig_header_handler = sapi_module.header_handler;
sapi_module.header_handler = suhosin_header_handler;
}
}
| 91,431,765,496,538,310,000,000,000,000,000,000,000 | header.c | 86,130,229,650,537,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0807 | Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in... | https://nvd.nist.gov/vuln/detail/CVE-2012-0807 |
24,275 | suhosin | 73b1968ee30f6d9d2dae497544b910e68e114bfa | https://github.com/stefanesser/suhosin | https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa | Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory) | 0 | void suhosin_unhook_header_handler()
{
sapi_module.header_handler = orig_header_handler;
orig_header_handler = NULL;
}
| 283,145,017,249,604,700,000,000,000,000,000,000,000 | header.c | 86,130,229,650,537,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0807 | Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in... | https://nvd.nist.gov/vuln/detail/CVE-2012-0807 |
24,276 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | __acquires(rcu)
{
rcu_read_lock();
return *pos ? igmp_mc_get_idx(seq, *pos - 1) : SEQ_START_TOKEN;
}
| 13,542,956,060,418,180,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,277 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | __acquires(rcu)
{
rcu_read_lock();
return *pos ? igmp_mcf_get_idx(seq, *pos - 1) : SEQ_START_TOKEN;
}
| 125,612,289,547,333,700,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.