idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
24,178
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int write_note_info(struct elf_note_info *info, struct file *file, loff_t *foffset) { int i; struct list_head *t; for (i = 0; i < info->numnote; i++) if (!writenote(info->notes + i, file, foffset)) return 0; /* write out the thread status notes section */ list_for_each(t, &info->thread_list) { ...
295,731,081,521,717,020,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,179
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int writenote(struct memelfnote *men, struct file *file, loff_t *foffset) { struct elf_note en; en.n_namesz = strlen(men->name) + 1; en.n_descsz = men->datasz; en.n_type = men->type; DUMP_WRITE(&en, sizeof(en), foffset); DUMP_WRITE(men->name, en.n_namesz, foffset); if (!alignfile(file, foffset)) ret...
237,155,389,335,719,760,000,000,000,000,000,000,000
binfmt_elf.c
233,173,923,575,517,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,180
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
build_path_from_dentry(struct dentry *direntry) { struct dentry *temp; int namelen; int dfsplen; char *full_path; char dirsep; struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb); struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb); unsigned seq; dirsep = CIFS_DIR_SEP(cifs_sb); if (tcon->Flags & SMB_SHA...
237,237,655,254,560,000,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,181
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
static int cifs_ci_compare(const struct dentry *parent, const struct inode *pinode, const struct dentry *dentry, const struct inode *inode, unsigned int len, const char *str, const struct qstr *name) { struct nls_table *codepage = CIFS_SB(pinode->i_sb)->local_nls; if ((name->len == len) && (nls_strnicmp(c...
91,666,071,633,238,240,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,182
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
static int cifs_ci_hash(const struct dentry *dentry, const struct inode *inode, struct qstr *q) { struct nls_table *codepage = CIFS_SB(dentry->d_sb)->local_nls; unsigned long hash; int i; hash = init_name_hash(); for (i = 0; i < q->len; i++) hash = partial_name_hash(nls_tolower(codepage, q->name[i]), ha...
143,493,950,549,700,640,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,183
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
cifs_create(struct inode *inode, struct dentry *direntry, int mode, struct nameidata *nd) { int rc = -ENOENT; int xid; int create_options = CREATE_NOT_DIR; __u32 oplock = 0; int oflags; /* * BB below access is probably too much for mknod to request * but we have to do query and setpathinfo so requesting ...
53,766,617,010,655,330,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,184
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd) { if (nd && (nd->flags & LOOKUP_RCU)) return -ECHILD; if (direntry->d_inode) { if (cifs_revalidate_dentry(direntry)) return 0; else { /* * Forcibly invalidate automounting directory inodes * (remote DFS directories) so to have them ...
266,655,600,446,060,600,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,185
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode, dev_t device_number) { int rc = -EPERM; int xid; int create_options = CREATE_NOT_DIR | CREATE_OPTION_SPECIAL; struct cifs_sb_info *cifs_sb; struct tcon_link *tlink; struct cifs_tcon *pTcon; struct cifs_io_parms io_parms; char *full_path = ...
294,067,938,757,214,330,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,186
linux
88d7d4e4a439f32acc56a6d860e415ee71d3df08
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
None
0
renew_parental_timestamps(struct dentry *direntry) { /* BB check if there is a way to get the kernel to do this or if we really need this */ do { direntry->d_time = jiffies; direntry = direntry->d_parent; } while (!IS_ROOT(direntry)); }
116,036,247,517,392,090,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
https://nvd.nist.gov/vuln/detail/CVE-2012-1090
24,187
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
static kadm5_ret_t add_to_history(krb5_context context, krb5_kvno hist_kvno, osa_princ_ent_t adb, kadm5_policy_ent_t pol, osa_pw_hist_ent *pw) { osa_pw_hist_ent *histp; uint32_...
63,860,412,133,141,050,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,188
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
check_pw_reuse(krb5_context context, krb5_keyblock *hist_keyblocks, int n_new_key_data, krb5_key_data *new_key_data, unsigned int n_pw_hist_data, osa_pw_hist_ent *pw_hist_data) { unsigned int x, y, z; krb5_keyblock newkey, histkey, *kb; krb5_key_data *key_data; ...
287,402,041,613,244,850,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,189
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
static void cleanup_key_data(context, count, data) krb5_context context; int count; krb5_key_data * data; { int i, j; for (i = 0; i < count; i++) for (j = 0; j < data[i].key_data_ver; j++) if (data[i].key_data_length[j]) krb5_db_free(c...
152,876,358,984,415,200,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,190
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
int create_history_entry(krb5_context context, krb5_keyblock *hist_key, int n_key_data, krb5_key_data *key_data, osa_pw_hist_ent *hist) { int i, ret; krb5_keyblock key; krb5_keysalt salt; hist->key_data = (krb5_key_data*)malloc(n_key_data*sizeof(krb5_ke...
73,443,158,408,158,880,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,191
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
static int decrypt_key_data(krb5_context context, int n_key_data, krb5_key_data *key_data, krb5_keyblock **keyblocks, int *n_keys) { krb5_keyblock *keys; int ret, i; keys = (krb5_keyblock *) malloc(n_key_data*sizeof(krb5_keyblock)); if (keys == NU...
288,286,156,212,644,400,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,192
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
void free_history_entry(krb5_context context, osa_pw_hist_ent *hist) { int i; for (i = 0; i < hist->n_key_data; i++) krb5_free_key_data_contents(context, &hist->key_data[i]); free(hist->key_data); }
54,452,265,882,822,260,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,193
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) { return kadm5_chpass_principal_3(server_handle, principal, FALSE, 0, NULL, password); }
63,652,481,527,733,460,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,194
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) { krb5_int32 now; kadm5_policy_ent_rec pol; osa_prin...
107,267,619,462,969,450,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,195
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_copy_principal(krb5_context context, krb5_const_principal inprinc, krb5_principal *outprinc) { register krb5_principal tempprinc; register int i, nelems; tempprinc = (krb5_principal)krb5_db_alloc(context, NULL, sizeof(krb5_principal_data)); if (tempprinc == 0) return ENOMEM; VALGRIN...
65,474,722,469,543,670,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,196
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_create_principal(void *server_handle, kadm5_principal_ent_t entry, long mask, char *password) { return kadm5_create_principal_3(server_handle, entry, mask, 0, NULL, password); }
212,662,112,202,327,430,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,197
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_create_principal_3(void *server_handle, kadm5_principal_ent_t entry, long mask, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) { krb5_db_entry *kdb; osa_princ_ent_rec adb; kadm5_policy_en...
310,216,220,629,832,660,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,198
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_ret_t kadm5_decrypt_key(void *server_handle, kadm5_principal_ent_t entry, krb5_int32 ktype, krb5_int32 stype, krb5_int32 kvno, krb5_keyblock *keyblock, krb5_keysalt *keysalt, int *kvnop) { k...
179,256,936,649,434,000,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,199
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_delete_principal(void *server_handle, krb5_principal principal) { unsigned int ret; kadm5_policy_ent_rec polent; krb5_db_entry *kdb; osa_princ_ent_rec adb; kadm5_server_handle_t handle = server_handle; CHECK_HANDLE(server_handle); krb5_cl...
113,216,267,715,935,800,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,200
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_free_principal(krb5_context context, krb5_principal val) { register krb5_int32 i; if (!val) return; if (val->data) { i = krb5_princ_size(context, val); while(--i >= 0) krb5_db_free(context, krb5_princ_component(context, val, i)->data); krb5_db_free(context...
166,521,146,005,056,500,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,201
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, long in_mask) { krb5_db_entry *kdb; osa_princ_ent_rec adb; krb5_error_code ret = 0; long mask; int i; ...
207,255,978,085,364,650,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,202
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_get_principal_keys(void *server_handle /* IN */, krb5_principal principal /* IN */, krb5_keyblock **keyblocks /* OUT */, int *n_keys /* OUT */) { krb5_db_entry *kdb; osa_princ_ent_rec adb; kadm5_ret_t ...
259,910,800,043,101,840,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,203
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_get_strings(void *server_handle, krb5_principal principal, krb5_string_attr **strings_out, int *count_out) { kadm5_server_handle_t handle = server_handle; kadm5_ret_t ret; krb5_db_entry *kdb = NULL; *strings_out = NULL; *count_out = 0; CHECK_HANDLE(server_handle); if...
243,373,784,351,591,940,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,204
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_launch_task (krb5_context context, const char *task_path, char * const task_argv[], const char *buffer) { kadm5_ret_t ret; int data_pipe[2]; ret = pipe (data_pipe); if (ret) ret = errno; if (!ret) { pid_t pid = fork (); if (pid ==...
187,860,418,752,926,600,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,205
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_modify_principal(void *server_handle, kadm5_principal_ent_t entry, long mask) { int ret, ret2, i; kadm5_policy_ent_rec npol, opol; int have_npol = 0, have_opol = 0; krb5_db_entry *kdb; krb5_tl_data *tl_data_...
255,276,484,532,036,870,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,206
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_purgekeys(void *server_handle, krb5_principal principal, int keepkvno) { kadm5_server_handle_t handle = server_handle; kadm5_ret_t ret; krb5_db_entry *kdb; osa_princ_ent_rec adb; krb5_key_data *old_keydata; int n_old_keydata; int i, j, k; CHECK_HAND...
38,724,746,883,680,490,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,207
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_randkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keyblocks, int *n_keys) { kr...
44,639,990,974,772,965,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,208
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_rename_principal(void *server_handle, krb5_principal source, krb5_principal target) { krb5_db_entry *kdb; osa_princ_ent_rec adb; krb5_error_code ret; kadm5_server_handle_t handle = server_handle; krb5_int16 stype, i; krb5_data *salt = NULL; CHECK_HANDLE(server_h...
305,775,194,077,278,900,000,000,000,000,000,000,000
svr_principal.c
270,585,709,681,308,150,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,209
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_set_string(void *server_handle, krb5_principal principal, const char *key, const char *value) { kadm5_server_handle_t handle = server_handle; kadm5_ret_t ret; krb5_db_entry *kdb; osa_princ_ent_rec adb; CHECK_HANDLE(server_handle); if (principal == NULL || key == NULL) ...
68,845,528,963,675,890,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,210
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_set_use_password_server (void) { use_password_server = 1; }
230,545,508,634,110,870,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,211
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_setkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock *keyblocks, int n_keys) { return kadm5_setkey_principal_3(server_handle, principal, FALSE, 0, NULL, ...
9,448,859,774,450,809,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,212
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_setkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock *keyblocks, int n_keys) { krb5_db_en...
64,777,596,466,119,110,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,213
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_setv4key_principal(void *server_handle, krb5_principal principal, krb5_keyblock *keyblock) { krb5_db_entry *kdb; osa_princ_ent_rec adb; krb5_int32 now; kadm5_policy_ent_rec pol; krb5_keysalt ...
94,472,577,876,810,270,000,000,000,000,000,000,000
svr_principal.c
265,907,974,596,756,470,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,214
krb5
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
0
kadm5_ret_t krb5_copy_key_data_contents(context, from, to) krb5_context context; krb5_key_data *from, *to; { int i, idx; *to = *from; idx = (from->key_data_ver == 1 ? 1 : 2); for (i = 0; i < idx; i++) { if ( from->key_data_length[i] ) { to->key_data_contents[i] = malloc(fr...
207,147,260,481,545,560,000,000,000,000,000,000,000
svr_principal.c
254,658,728,888,016,480,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2012-1013
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a pas...
https://nvd.nist.gov/vuln/detail/CVE-2012-1013
24,215
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE0(getpgrp) { return sys_getpgid(0); }
54,637,526,262,175,530,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,216
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE0(setsid) { struct task_struct *group_leader = current->group_leader; struct pid *sid = task_pid(group_leader); pid_t session = pid_vnr(sid); int err = -EPERM; write_lock_irq(&tasklist_lock); /* Fail if I am already a session leader */ if (group_leader->signal->leader) goto out; /* Fail if a p...
329,902,184,973,653,830,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,217
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(setgid, gid_t, gid) { struct user_namespace *ns = current_user_ns(); const struct cred *old; struct cred *new; int retval; kgid_t kgid; kgid = make_kgid(ns, gid); if (!gid_valid(kgid)) return -EINVAL; new = prepare_creds(); if (!new) return -ENOMEM; old = current_cred(); retval = -EPER...
149,453,344,197,488,800,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,218
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(setuid, uid_t, uid) { struct user_namespace *ns = current_user_ns(); const struct cred *old; struct cred *new; int retval; kuid_t kuid; kuid = make_kuid(ns, uid); if (!uid_valid(kuid)) return -EINVAL; new = prepare_creds(); if (!new) return -ENOMEM; old = current_cred(); retval = -EPER...
73,009,167,199,380,030,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,219
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(setfsuid, uid_t, uid) { const struct cred *old; struct cred *new; uid_t old_fsuid; kuid_t kuid; old = current_cred(); old_fsuid = from_kuid_munged(old->user_ns, old->fsuid); kuid = make_kuid(old->user_ns, uid); if (!uid_valid(kuid)) return old_fsuid; new = prepare_creds(); if (!new) ret...
211,037,779,440,413,660,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,220
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(setfsgid, gid_t, gid) { const struct cred *old; struct cred *new; gid_t old_fsgid; kgid_t kgid; old = current_cred(); old_fsgid = from_kgid_munged(old->user_ns, old->fsgid); kgid = make_kgid(old->user_ns, gid); if (!gid_valid(kgid)) return old_fsgid; new = prepare_creds(); if (!new) ret...
108,571,696,176,029,770,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,221
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(times, struct tms __user *, tbuf) { if (tbuf) { struct tms tmp; do_sys_times(&tmp); if (copy_to_user(tbuf, &tmp, sizeof(struct tms))) return -EFAULT; } force_successful_syscall_return(); return (long) jiffies_64_to_clock_t(get_jiffies_64()); }
274,843,324,272,078,730,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,222
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(getpgid, pid_t, pid) { struct task_struct *p; struct pid *grp; int retval; rcu_read_lock(); if (!pid) grp = task_pgrp(current); else { retval = -ESRCH; p = find_task_by_vpid(pid); if (!p) goto out; grp = task_pgrp(p); if (!grp) goto out; retval = security_task_getpgid(p); i...
156,259,015,797,964,040,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,223
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(getsid, pid_t, pid) { struct task_struct *p; struct pid *sid; int retval; rcu_read_lock(); if (!pid) sid = task_session(current); else { retval = -ESRCH; p = find_task_by_vpid(pid); if (!p) goto out; sid = task_session(p); if (!sid) goto out; retval = security_task_getsid(p);...
164,676,094,530,120,630,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,224
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(newuname, struct new_utsname __user *, name) { int errno = 0; down_read(&uts_sem); if (copy_to_user(name, utsname(), sizeof *name)) errno = -EFAULT; up_read(&uts_sem); if (!errno && override_release(name->release, sizeof(name->release))) errno = -EFAULT; if (!errno && override_architecture(n...
147,432,215,957,728,730,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,225
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(uname, struct old_utsname __user *, name) { int error = 0; if (!name) return -EFAULT; down_read(&uts_sem); if (copy_to_user(name, utsname(), sizeof(*name))) error = -EFAULT; up_read(&uts_sem); if (!error && override_release(name->release, sizeof(name->release))) error = -EFAULT; if (!err...
159,439,178,925,847,300,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,226
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(olduname, struct oldold_utsname __user *, name) { int error; if (!name) return -EFAULT; if (!access_ok(VERIFY_WRITE, name, sizeof(struct oldold_utsname))) return -EFAULT; down_read(&uts_sem); error = __copy_to_user(&name->sysname, &utsname()->sysname, __OLD_UTS_LEN); error |= __put...
285,970,518,852,297,700,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,227
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE1(umask, int, mask) { mask = xchg(&current->fs->umask, mask & S_IRWXUGO); return mask; }
82,917,129,590,445,120,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,228
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(setreuid, uid_t, ruid, uid_t, euid) { struct user_namespace *ns = current_user_ns(); const struct cred *old; struct cred *new; int retval; kuid_t kruid, keuid; kruid = make_kuid(ns, ruid); keuid = make_kuid(ns, euid); if ((ruid != (uid_t) -1) && !uid_valid(kruid)) return -EINVAL; if ((euid ...
117,846,837,590,806,480,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,229
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(setpgid, pid_t, pid, pid_t, pgid) { struct task_struct *p; struct task_struct *group_leader = current->group_leader; struct pid *pgrp; int err; if (!pid) pid = task_pid_vnr(group_leader); if (!pgid) pgid = pid; if (pgid < 0) return -EINVAL; rcu_read_lock(); /* From this point forward we...
90,616,032,696,533,300,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,230
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(gethostname, char __user *, name, int, len) { int i, errno; struct new_utsname *u; if (len < 0) return -EINVAL; down_read(&uts_sem); u = utsname(); i = 1 + strlen(u->nodename); if (i > len) i = len; errno = 0; if (copy_to_user(name, u->nodename, i)) errno = -EFAULT; up_read(&uts_sem); ...
195,732,898,906,589,220,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,231
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(setdomainname, char __user *, name, int, len) { int errno; char tmp[__NEW_UTS_LEN]; if (!ns_capable(current->nsproxy->uts_ns->user_ns, CAP_SYS_ADMIN)) return -EPERM; if (len < 0 || len > __NEW_UTS_LEN) return -EINVAL; down_write(&uts_sem); errno = -EFAULT; if (!copy_from_user(tmp, name, len...
88,938,904,043,438,250,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,232
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(getrlimit, unsigned int, resource, struct rlimit __user *, rlim) { struct rlimit value; int ret; ret = do_prlimit(current, resource, NULL, &value); if (!ret) ret = copy_to_user(rlim, &value, sizeof(*rlim)) ? -EFAULT : 0; return ret; }
217,049,987,065,464,230,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,233
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim) { struct rlimit new_rlim; if (copy_from_user(&new_rlim, rlim, sizeof(*rlim))) return -EFAULT; return do_prlimit(current, resource, &new_rlim, NULL); }
43,599,591,709,475,900,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,234
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE2(getrusage, int, who, struct rusage __user *, ru) { if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN && who != RUSAGE_THREAD) return -EINVAL; return getrusage(current, who, ru); }
57,622,139,388,468,030,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,235
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE3(setpriority, int, which, int, who, int, niceval) { struct task_struct *g, *p; struct user_struct *user; const struct cred *cred = current_cred(); int error = -EINVAL; struct pid *pgrp; kuid_t uid; if (which > PRIO_USER || which < PRIO_PROCESS) goto out; /* normalize: avoid signed division (r...
118,055,202,349,142,580,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,236
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE3(getresuid, uid_t __user *, ruidp, uid_t __user *, euidp, uid_t __user *, suidp) { const struct cred *cred = current_cred(); int retval; uid_t ruid, euid, suid; ruid = from_kuid_munged(cred->user_ns, cred->uid); euid = from_kuid_munged(cred->user_ns, cred->euid); suid = from_kuid_munged(cred->user...
137,304,087,249,625,070,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,237
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE3(setresgid, gid_t, rgid, gid_t, egid, gid_t, sgid) { struct user_namespace *ns = current_user_ns(); const struct cred *old; struct cred *new; int retval; kgid_t krgid, kegid, ksgid; krgid = make_kgid(ns, rgid); kegid = make_kgid(ns, egid); ksgid = make_kgid(ns, sgid); if ((rgid != (gid_t) -1) ...
328,440,511,571,388,900,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,238
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE3(getresgid, gid_t __user *, rgidp, gid_t __user *, egidp, gid_t __user *, sgidp) { const struct cred *cred = current_cred(); int retval; gid_t rgid, egid, sgid; rgid = from_kgid_munged(cred->user_ns, cred->gid); egid = from_kgid_munged(cred->user_ns, cred->egid); sgid = from_kgid_munged(cred->user...
176,571,410,091,558,900,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,239
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE3(getcpu, unsigned __user *, cpup, unsigned __user *, nodep, struct getcpu_cache __user *, unused) { int err = 0; int cpu = raw_smp_processor_id(); if (cpup) err |= put_user(cpu, cpup); if (nodep) err |= put_user(cpu_to_node(cpu), nodep); return err ? -EFAULT : 0; }
77,455,433,754,778,175,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,240
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE4(prlimit64, pid_t, pid, unsigned int, resource, const struct rlimit64 __user *, new_rlim, struct rlimit64 __user *, old_rlim) { struct rlimit64 old64, new64; struct rlimit old, new; struct task_struct *tsk; int ret; if (new_rlim) { if (copy_from_user(&new64, new_rlim, sizeof(new64))) retur...
40,352,818,104,466,730,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,241
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, unsigned long, arg4, unsigned long, arg5) { struct task_struct *me = current; unsigned char comm[sizeof(me->comm)]; long error; error = security_task_prctl(option, arg2, arg3, arg4, arg5); if (error != -ENOSYS) return error; error...
332,378,857,758,883,350,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,242
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int __orderly_poweroff(void) { int argc; char **argv; static char *envp[] = { "HOME=/", "PATH=/sbin:/bin:/usr/sbin:/usr/bin", NULL }; int ret; argv = argv_split(GFP_ATOMIC, poweroff_cmd, &argc); if (argv == NULL) { printk(KERN_WARNING "%s failed to allocate memory for \"%s\"\n", __func__...
239,675,544,154,694,500,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,243
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void accumulate_thread_rusage(struct task_struct *t, struct rusage *r) { r->ru_nvcsw += t->nvcsw; r->ru_nivcsw += t->nivcsw; r->ru_minflt += t->min_flt; r->ru_majflt += t->maj_flt; r->ru_inblock += task_io_get_inblock(t); r->ru_oublock += task_io_get_oublock(t); }
71,029,230,042,518,360,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,244
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void argv_cleanup(struct subprocess_info *info) { argv_free(info->argv); }
87,610,276,657,029,490,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,245
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int check_prlimit_permission(struct task_struct *task) { const struct cred *cred = current_cred(), *tcred; if (current == task) return 0; tcred = __task_cred(task); if (uid_eq(cred->uid, tcred->euid) && uid_eq(cred->uid, tcred->suid) && uid_eq(cred->uid, tcred->uid) && gid_eq(cred->gid, t...
24,521,527,941,324,005,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,246
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
void ctrl_alt_del(void) { static DECLARE_WORK(cad_work, deferred_cad); if (C_A_D) schedule_work(&cad_work); else kill_cad_pid(SIGINT, 1); }
49,912,537,323,977,490,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,247
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void deferred_cad(struct work_struct *dummy) { kernel_restart(NULL); }
121,522,515,745,834,570,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,248
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
int do_prlimit(struct task_struct *tsk, unsigned int resource, struct rlimit *new_rlim, struct rlimit *old_rlim) { struct rlimit *rlim; int retval = 0; if (resource >= RLIM_NLIMITS) return -EINVAL; if (new_rlim) { if (new_rlim->rlim_cur > new_rlim->rlim_max) return -EINVAL; if (resource == RLIMIT_NOFILE...
167,139,635,918,182,680,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,249
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
void emergency_restart(void) { kmsg_dump(KMSG_DUMP_EMERG); machine_emergency_restart(); }
172,888,107,600,185,860,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,250
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void k_getrusage(struct task_struct *p, int who, struct rusage *r) { struct task_struct *t; unsigned long flags; cputime_t tgutime, tgstime, utime, stime; unsigned long maxrss = 0; memset((char *) r, 0, sizeof *r); utime = stime = 0; if (who == RUSAGE_THREAD) { task_times(current, &utime, &stime); a...
14,869,869,729,376,568,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,251
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
void kernel_power_off(void) { kernel_shutdown_prepare(SYSTEM_POWER_OFF); if (pm_power_off_prepare) pm_power_off_prepare(); disable_nonboot_cpus(); syscore_shutdown(); printk(KERN_EMERG "Power down.\n"); kmsg_dump(KMSG_DUMP_POWEROFF); machine_power_off(); }
225,821,082,914,905,900,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,252
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
void kernel_restart(char *cmd) { kernel_restart_prepare(cmd); disable_nonboot_cpus(); if (!cmd) printk(KERN_EMERG "Restarting system.\n"); else printk(KERN_EMERG "Restarting system with command '%s'.\n", cmd); kmsg_dump(KMSG_DUMP_RESTART); machine_restart(cmd); }
269,218,735,579,204,100,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,253
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
void kernel_restart_prepare(char *cmd) { blocking_notifier_call_chain(&reboot_notifier_list, SYS_RESTART, cmd); system_state = SYSTEM_RESTART; usermodehelper_disable(); device_shutdown(); syscore_shutdown(); }
242,229,161,376,547,950,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,254
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void kernel_shutdown_prepare(enum system_states state) { blocking_notifier_call_chain(&reboot_notifier_list, (state == SYSTEM_HALT)?SYS_HALT:SYS_POWER_OFF, NULL); system_state = state; usermodehelper_disable(); device_shutdown(); }
109,003,537,055,123,600,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,255
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
int orderly_poweroff(bool force) { int ret = __orderly_poweroff(); if (ret && force) { printk(KERN_WARNING "Failed to start orderly shutdown: " "forcing the issue\n"); /* * I guess this should try to kick off some daemon to sync and * poweroff asap. Or not even bother syncing if we're doing an ...
63,935,393,854,715,970,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,256
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int prctl_get_tid_address(struct task_struct *me, int __user **tid_addr) { return put_user(me->clear_child_tid, tid_addr); }
322,073,420,458,993,330,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,257
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int prctl_get_tid_address(struct task_struct *me, int __user **tid_addr) { return -EINVAL; }
132,998,367,366,019,200,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,258
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int prctl_set_mm(int opt, unsigned long addr, unsigned long arg4, unsigned long arg5) { unsigned long rlim = rlimit(RLIMIT_DATA); struct mm_struct *mm = current->mm; struct vm_area_struct *vma; int error; if (arg5 || (arg4 && opt != PR_SET_MM_AUXV)) return -EINVAL; if (!capable(CAP_SYS_RESOURCE)) ...
60,843,206,254,355,500,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,259
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int prctl_set_mm(int opt, unsigned long addr, unsigned long arg4, unsigned long arg5) { return -EINVAL; }
11,941,728,175,176,370,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,260
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int prctl_set_mm_exe_file(struct mm_struct *mm, unsigned int fd) { struct fd exe; struct dentry *dentry; int err; exe = fdget(fd); if (!exe.file) return -EBADF; dentry = exe.file->f_path.dentry; /* * Because the original mm->exe_file points to executable file, make * sure that this one is executa...
53,751,252,529,883,820,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,261
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static inline bool rlim64_is_infinity(__u64 rlim64) { #if BITS_PER_LONG < 64 return rlim64 >= ULONG_MAX; #else return rlim64 == RLIM64_INFINITY; #endif }
316,835,324,453,316,970,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,262
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void rlim64_to_rlim(const struct rlimit64 *rlim64, struct rlimit *rlim) { if (rlim64_is_infinity(rlim64->rlim_cur)) rlim->rlim_cur = RLIM_INFINITY; else rlim->rlim_cur = (unsigned long)rlim64->rlim_cur; if (rlim64_is_infinity(rlim64->rlim_max)) rlim->rlim_max = RLIM_INFINITY; else rlim->rlim_max = (u...
13,331,424,374,458,818,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,263
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static void rlim_to_rlim64(const struct rlimit *rlim, struct rlimit64 *rlim64) { if (rlim->rlim_cur == RLIM_INFINITY) rlim64->rlim_cur = RLIM64_INFINITY; else rlim64->rlim_cur = rlim->rlim_cur; if (rlim->rlim_max == RLIM_INFINITY) rlim64->rlim_max = RLIM64_INFINITY; else rlim64->rlim_max = rlim->rlim_max; }...
277,344,683,053,685,200,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,264
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int set_one_prio(struct task_struct *p, int niceval, int error) { int no_nice; if (!set_one_prio_perm(p)) { error = -EPERM; goto out; } if (niceval < task_nice(p) && !can_nice(p, niceval)) { error = -EACCES; goto out; } no_nice = security_task_setnice(p, niceval); if (no_nice) { error = no_nice...
303,348,639,032,489,000,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,265
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static bool set_one_prio_perm(struct task_struct *p) { const struct cred *cred = current_cred(), *pcred = __task_cred(p); if (uid_eq(pcred->uid, cred->euid) || uid_eq(pcred->euid, cred->euid)) return true; if (ns_capable(pcred->user_ns, CAP_SYS_NICE)) return true; return false; }
33,496,947,514,161,460,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,266
linux
2702b1526c7278c4d65d78de209a465d4de2885e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
0
static int set_user(struct cred *new) { struct user_struct *new_user; new_user = alloc_uid(new->uid); if (!new_user) return -EAGAIN; /* * We don't fail in case of NPROC limit excess here because too many * poorly written programs don't check set*uid() return code, assuming * it never fails if called by ro...
39,530,695,063,808,845,000,000,000,000,000,000,000
sys.c
308,050,338,192,613,660,000,000,000,000,000,000,000
[ "CWE-16" ]
CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
https://nvd.nist.gov/vuln/detail/CVE-2012-0957
24,267
linux
61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
0
struct io_context *alloc_io_context(gfp_t gfp_flags, int node) { struct io_context *ret; ret = kmem_cache_alloc_node(iocontext_cachep, gfp_flags, node); if (ret) { atomic_long_set(&ret->refcount, 1); atomic_set(&ret->nr_tasks, 1); spin_lock_init(&ret->lock); ret->ioprio_changed = 0; ret->ioprio = 0; re...
140,562,196,767,187,040,000,000,000,000,000,000,000
blk-ioc.c
264,446,797,429,152,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
https://nvd.nist.gov/vuln/detail/CVE-2012-0879
24,268
linux
61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
0
static int __init blk_ioc_init(void) { iocontext_cachep = kmem_cache_create("blkdev_ioc", sizeof(struct io_context), 0, SLAB_PANIC, NULL); return 0; }
107,727,565,927,534,910,000,000,000,000,000,000,000
blk-ioc.c
264,446,797,429,152,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
https://nvd.nist.gov/vuln/detail/CVE-2012-0879
24,269
linux
61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
0
static void cfq_dtor(struct io_context *ioc) { if (!hlist_empty(&ioc->cic_list)) { struct cfq_io_context *cic; cic = list_entry(ioc->cic_list.first, struct cfq_io_context, cic_list); cic->dtor(ioc); } }
220,270,290,602,694,420,000,000,000,000,000,000,000
blk-ioc.c
264,446,797,429,152,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
https://nvd.nist.gov/vuln/detail/CVE-2012-0879
24,270
linux
61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
0
void copy_io_context(struct io_context **pdst, struct io_context **psrc) { struct io_context *src = *psrc; struct io_context *dst = *pdst; if (src) { BUG_ON(atomic_long_read(&src->refcount) == 0); atomic_long_inc(&src->refcount); put_io_context(dst); *pdst = src; } }
277,625,653,825,795,400,000,000,000,000,000,000,000
blk-ioc.c
264,446,797,429,152,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
https://nvd.nist.gov/vuln/detail/CVE-2012-0879
24,271
linux
61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
0
struct io_context *current_io_context(gfp_t gfp_flags, int node) { struct task_struct *tsk = current; struct io_context *ret; ret = tsk->io_context; if (likely(ret)) return ret; ret = alloc_io_context(gfp_flags, node); if (ret) { /* make sure set_task_ioprio() sees the settings above */ smp_wmb(); tsk->...
2,882,878,489,322,067,700,000,000,000,000,000,000
blk-ioc.c
264,446,797,429,152,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
https://nvd.nist.gov/vuln/detail/CVE-2012-0879
24,272
linux
61cc74fbb87af6aa551a06a370590c9bc07e29d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
0
struct io_context *get_io_context(gfp_t gfp_flags, int node) { struct io_context *ret = NULL; /* * Check for unlikely race with exiting task. ioc ref count is * zero when ioc is being detached. */ do { ret = current_io_context(gfp_flags, node); if (unlikely(!ret)) break; } while (!atomic_long_inc_not_...
45,827,592,830,402,330,000,000,000,000,000,000,000
blk-ioc.c
264,446,797,429,152,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
https://nvd.nist.gov/vuln/detail/CVE-2012-0879
24,273
suhosin
73b1968ee30f6d9d2dae497544b910e68e114bfa
https://github.com/stefanesser/suhosin
https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa
Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory)
0
int suhosin_header_handler(sapi_header_struct *sapi_header, sapi_header_op_enum op, sapi_headers_struct *sapi_headers TSRMLS_DC) #else int suhosin_header_handler(sapi_header_struct *sapi_header, sapi_headers_struct *sapi_headers TSRMLS_DC) #endif { int retval = SAPI_HEADER_ADD, i; char *tmp; #if PHP_VERSION_ID >= 50...
206,460,468,463,429,560,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-0807
Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in...
https://nvd.nist.gov/vuln/detail/CVE-2012-0807
24,274
suhosin
73b1968ee30f6d9d2dae497544b910e68e114bfa
https://github.com/stefanesser/suhosin
https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa
Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory)
0
void suhosin_hook_header_handler() { if (orig_header_handler == NULL) { orig_header_handler = sapi_module.header_handler; sapi_module.header_handler = suhosin_header_handler; } }
91,431,765,496,538,310,000,000,000,000,000,000,000
header.c
86,130,229,650,537,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-0807
Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in...
https://nvd.nist.gov/vuln/detail/CVE-2012-0807
24,275
suhosin
73b1968ee30f6d9d2dae497544b910e68e114bfa
https://github.com/stefanesser/suhosin
https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa
Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory)
0
void suhosin_unhook_header_handler() { sapi_module.header_handler = orig_header_handler; orig_header_handler = NULL; }
283,145,017,249,604,700,000,000,000,000,000,000,000
header.c
86,130,229,650,537,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-0807
Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in...
https://nvd.nist.gov/vuln/detail/CVE-2012-0807
24,276
linux
a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
igmp: Avoid zero delay when receiving odd mixture of IGMP queries Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP behavior on v3 query during v2-compatibility mode') added yet another case for query parsing, which can result in max_delay = 0. Substitute a value of 1, as in the usual v3 case. Rep...
0
__acquires(rcu) { rcu_read_lock(); return *pos ? igmp_mc_get_idx(seq, *pos - 1) : SEQ_START_TOKEN; }
13,542,956,060,418,180,000,000,000,000,000,000,000
igmp.c
42,079,939,440,198,700,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-0207
The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-0207
24,277
linux
a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
igmp: Avoid zero delay when receiving odd mixture of IGMP queries Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP behavior on v3 query during v2-compatibility mode') added yet another case for query parsing, which can result in max_delay = 0. Substitute a value of 1, as in the usual v3 case. Rep...
0
__acquires(rcu) { rcu_read_lock(); return *pos ? igmp_mcf_get_idx(seq, *pos - 1) : SEQ_START_TOKEN; }
125,612,289,547,333,700,000,000,000,000,000,000,000
igmp.c
42,079,939,440,198,700,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-0207
The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-0207