idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
24,278 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | __releases(rcu)
{
struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
if (likely(state->im != NULL)) {
spin_unlock_bh(&state->im->lock);
state->im = NULL;
}
state->idev = NULL;
state->dev = NULL;
rcu_read_unlock();
}
| 273,324,438,242,755,500,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,279 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct sk_buff *add_grec(struct sk_buff *skb, struct ip_mc_list *pmc,
int type, int gdeleted, int sdeleted)
{
struct net_device *dev = pmc->interface->dev;
struct igmpv3_report *pih;
struct igmpv3_grec *pgr = NULL;
struct ip_sf_list *psf, *psf_next, *psf_prev, **psf_list;
int scount, stotal, first, isquery... | 255,673,391,950,202,350,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,280 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct sk_buff *add_grhead(struct sk_buff *skb, struct ip_mc_list *pmc,
int type, struct igmpv3_grec **ppgr)
{
struct net_device *dev = pmc->interface->dev;
struct igmpv3_report *pih;
struct igmpv3_grec *pgr;
if (!skb)
skb = igmpv3_newpack(dev, dev->mtu);
if (!skb)
return NULL;
pgr = (struct igmpv3_g... | 200,761,254,984,341,500,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,281 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int grec_size(struct ip_mc_list *pmc, int type, int gdel, int sdel)
{
return sizeof(struct igmpv3_grec) + 4*igmp_scount(pmc, type, gdel, sdel);
}
| 262,231,204,065,973,400,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,282 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_gq_start_timer(struct in_device *in_dev)
{
int tv = net_random() % in_dev->mr_maxdelay;
in_dev->mr_gq_running = 1;
if (!mod_timer(&in_dev->mr_gq_timer, jiffies+tv+2))
in_dev_hold(in_dev);
}
| 94,774,307,990,286,890,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,283 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_gq_timer_expire(unsigned long data)
{
struct in_device *in_dev = (struct in_device *)data;
in_dev->mr_gq_running = 0;
igmpv3_send_report(in_dev, NULL);
__in_dev_put(in_dev);
}
| 171,650,684,363,403,140,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,284 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_group_added(struct ip_mc_list *im)
{
struct in_device *in_dev = im->interface;
if (im->loaded == 0) {
im->loaded = 1;
ip_mc_filter_add(in_dev, im->multiaddr);
}
#ifdef CONFIG_IP_MULTICAST
if (im->multiaddr == IGMP_ALL_HOSTS)
return;
if (in_dev->dead)
return;
if (IGMP_V1_SEEN(in_dev) ||... | 28,011,605,342,319,313,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,285 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_group_dropped(struct ip_mc_list *im)
{
struct in_device *in_dev = im->interface;
#ifdef CONFIG_IP_MULTICAST
int reporter;
#endif
if (im->loaded) {
im->loaded = 0;
ip_mc_filter_del(in_dev, im->multiaddr);
}
#ifdef CONFIG_IP_MULTICAST
if (im->multiaddr == IGMP_ALL_HOSTS)
return;
reporter =... | 129,235,416,279,365,670,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,286 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_heard_report(struct in_device *in_dev, __be32 group)
{
struct ip_mc_list *im;
/* Timers are only set for non-local groups */
if (group == IGMP_ALL_HOSTS)
return;
rcu_read_lock();
for_each_pmc_rcu(in_dev, im) {
if (im->multiaddr == group) {
igmp_stop_timer(im);
break;
}
}
rcu_read_... | 24,566,246,749,599,344,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,287 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_ifc_event(struct in_device *in_dev)
{
if (IGMP_V1_SEEN(in_dev) || IGMP_V2_SEEN(in_dev))
return;
in_dev->mr_ifc_count = in_dev->mr_qrv ? in_dev->mr_qrv :
IGMP_Unsolicited_Report_Count;
igmp_ifc_start_timer(in_dev, 1);
}
| 59,071,249,604,334,110,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,288 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_ifc_start_timer(struct in_device *in_dev, int delay)
{
int tv = net_random() % delay;
if (!mod_timer(&in_dev->mr_ifc_timer, jiffies+tv+2))
in_dev_hold(in_dev);
}
| 320,068,365,690,786,500,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,289 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_ifc_timer_expire(unsigned long data)
{
struct in_device *in_dev = (struct in_device *)data;
igmpv3_send_cr(in_dev);
if (in_dev->mr_ifc_count) {
in_dev->mr_ifc_count--;
igmp_ifc_start_timer(in_dev, IGMP_Unsolicited_Report_Interval);
}
__in_dev_put(in_dev);
}
| 71,905,494,716,901,245,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,290 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmp_marksources(struct ip_mc_list *pmc, int nsrcs, __be32 *srcs)
{
struct ip_sf_list *psf;
int i, scount;
if (pmc->sfmode == MCAST_EXCLUDE)
return igmp_xmarksources(pmc, nsrcs, srcs);
/* mark INCLUDE-mode sources */
scount = 0;
for (psf=pmc->sources; psf; psf=psf->sf_next) {
if (scount == nsrcs)... | 329,238,196,088,312,100,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,291 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static inline struct ip_mc_list *igmp_mc_get_first(struct seq_file *seq)
{
struct net *net = seq_file_net(seq);
struct ip_mc_list *im = NULL;
struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
state->in_dev = NULL;
for_each_netdev_rcu(net, state->dev) {
struct in_device *in_dev;
in_dev = __in_dev_g... | 59,822,107,223,265,700,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,292 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct ip_mc_list *igmp_mc_get_idx(struct seq_file *seq, loff_t pos)
{
struct ip_mc_list *im = igmp_mc_get_first(seq);
if (im)
while (pos && (im = igmp_mc_get_next(seq, im)) != NULL)
--pos;
return pos ? NULL : im;
}
| 282,948,224,410,351,300,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,293 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct ip_mc_list *igmp_mc_get_next(struct seq_file *seq, struct ip_mc_list *im)
{
struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
im = rcu_dereference(im->next_rcu);
while (!im) {
state->dev = next_net_device_rcu(state->dev);
if (!state->dev) {
state->in_dev = NULL;
break;
}
state... | 260,218,767,100,472,700,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,294 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int __init igmp_mc_proc_init(void)
{
return register_pernet_subsys(&igmp_net_ops);
}
| 147,295,523,398,914,880,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,295 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void *igmp_mc_seq_next(struct seq_file *seq, void *v, loff_t *pos)
{
struct ip_mc_list *im;
if (v == SEQ_START_TOKEN)
im = igmp_mc_get_first(seq);
else
im = igmp_mc_get_next(seq, v);
++*pos;
return im;
}
| 96,368,357,615,198,750,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,296 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmp_mc_seq_open(struct inode *inode, struct file *file)
{
return seq_open_net(inode, file, &igmp_mc_seq_ops,
sizeof(struct igmp_mc_iter_state));
}
| 186,976,898,682,850,000,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,297 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmp_mc_seq_show(struct seq_file *seq, void *v)
{
if (v == SEQ_START_TOKEN)
seq_puts(seq,
"Idx\tDevice : Count Querier\tGroup Users Timer\tReporter\n");
else {
struct ip_mc_list *im = (struct ip_mc_list *)v;
struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
char *querier;
#if... | 78,545,194,508,176,920,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,298 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static inline struct ip_sf_list *igmp_mcf_get_first(struct seq_file *seq)
{
struct net *net = seq_file_net(seq);
struct ip_sf_list *psf = NULL;
struct ip_mc_list *im = NULL;
struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
state->idev = NULL;
state->im = NULL;
for_each_netdev_rcu(net, state->dev) ... | 125,616,803,576,094,990,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,299 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct ip_sf_list *igmp_mcf_get_idx(struct seq_file *seq, loff_t pos)
{
struct ip_sf_list *psf = igmp_mcf_get_first(seq);
if (psf)
while (pos && (psf = igmp_mcf_get_next(seq, psf)) != NULL)
--pos;
return pos ? NULL : psf;
}
| 253,880,082,760,429,880,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,300 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct ip_sf_list *igmp_mcf_get_next(struct seq_file *seq, struct ip_sf_list *psf)
{
struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
psf = psf->sf_next;
while (!psf) {
spin_unlock_bh(&state->im->lock);
state->im = state->im->next;
while (!state->im) {
state->dev = next_net_device_rcu(... | 76,990,134,601,864,280,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,301 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void *igmp_mcf_seq_next(struct seq_file *seq, void *v, loff_t *pos)
{
struct ip_sf_list *psf;
if (v == SEQ_START_TOKEN)
psf = igmp_mcf_get_first(seq);
else
psf = igmp_mcf_get_next(seq, v);
++*pos;
return psf;
}
| 336,540,577,424,688,700,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,302 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmp_mcf_seq_open(struct inode *inode, struct file *file)
{
return seq_open_net(inode, file, &igmp_mcf_seq_ops,
sizeof(struct igmp_mcf_iter_state));
}
| 151,006,626,566,808,340,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,303 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmp_mcf_seq_show(struct seq_file *seq, void *v)
{
struct ip_sf_list *psf = (struct ip_sf_list *)v;
struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
if (v == SEQ_START_TOKEN) {
seq_printf(seq,
"%3s %6s "
"%10s %10s %6s %6s\n", "Idx",
"Device", "MCA",
"SRC", "INC", ... | 314,067,310,883,855,300,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,304 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_mod_timer(struct ip_mc_list *im, int max_delay)
{
spin_lock_bh(&im->lock);
im->unsolicit_count = 0;
if (del_timer(&im->timer)) {
if ((long)(im->timer.expires-jiffies) < max_delay) {
add_timer(&im->timer);
im->tm_running = 1;
spin_unlock_bh(&im->lock);
return;
}
atomic_dec(&im->refc... | 68,433,630,581,323,480,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,305 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int __net_init igmp_net_init(struct net *net)
{
struct proc_dir_entry *pde;
pde = proc_net_fops_create(net, "igmp", S_IRUGO, &igmp_mc_seq_fops);
if (!pde)
goto out_igmp;
pde = proc_net_fops_create(net, "mcfilter", S_IRUGO, &igmp_mcf_seq_fops);
if (!pde)
goto out_mcfilter;
return 0;
out_mcfilter:
pro... | 86,596,533,466,595,800,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,306 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmp_send_report(struct in_device *in_dev, struct ip_mc_list *pmc,
int type)
{
struct sk_buff *skb;
struct iphdr *iph;
struct igmphdr *ih;
struct rtable *rt;
struct net_device *dev = in_dev->dev;
struct net *net = dev_net(dev);
__be32 group = pmc ? pmc->multiaddr : 0;
struct flowi4 fl4;
__be32 dst;... | 74,729,068,660,786,075,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,307 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_start_timer(struct ip_mc_list *im, int max_delay)
{
int tv = net_random() % max_delay;
im->tm_running = 1;
if (!mod_timer(&im->timer, jiffies+tv+2))
atomic_inc(&im->refcnt);
}
| 248,118,784,588,333,250,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,308 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_stop_timer(struct ip_mc_list *im)
{
spin_lock_bh(&im->lock);
if (del_timer(&im->timer))
atomic_dec(&im->refcnt);
im->tm_running = 0;
im->reporter = 0;
im->unsolicit_count = 0;
spin_unlock_bh(&im->lock);
}
| 117,586,048,366,956,230,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,309 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmp_timer_expire(unsigned long data)
{
struct ip_mc_list *im=(struct ip_mc_list *)data;
struct in_device *in_dev = im->interface;
spin_lock(&im->lock);
im->tm_running = 0;
if (im->unsolicit_count) {
im->unsolicit_count--;
igmp_start_timer(im, IGMP_Unsolicited_Report_Interval);
}
im->reporter =... | 102,180,128,926,158,300,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,310 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmpv3_add_delrec(struct in_device *in_dev, struct ip_mc_list *im)
{
struct ip_mc_list *pmc;
/* this is an "ip_mc_list" for convenience; only the fields below
* are actually used. In particular, the refcnt and users are not
* used for management of the delete list. Using the same structure
* for de... | 308,363,805,504,308,350,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,311 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmpv3_clear_delrec(struct in_device *in_dev)
{
struct ip_mc_list *pmc, *nextpmc;
spin_lock_bh(&in_dev->mc_tomb_lock);
pmc = in_dev->mc_tomb;
in_dev->mc_tomb = NULL;
spin_unlock_bh(&in_dev->mc_tomb_lock);
for (; pmc; pmc = nextpmc) {
nextpmc = pmc->next;
ip_mc_clear_src(pmc);
in_dev_put(pmc->i... | 331,900,711,609,986,560,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,312 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmpv3_clear_zeros(struct ip_sf_list **ppsf)
{
struct ip_sf_list *psf_prev, *psf_next, *psf;
psf_prev = NULL;
for (psf=*ppsf; psf; psf = psf_next) {
psf_next = psf->sf_next;
if (psf->sf_crcount == 0) {
if (psf_prev)
psf_prev->sf_next = psf->sf_next;
else
*ppsf = psf->sf_next;
kfree(... | 319,915,187,613,735,800,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,313 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmpv3_del_delrec(struct in_device *in_dev, __be32 multiaddr)
{
struct ip_mc_list *pmc, *pmc_prev;
struct ip_sf_list *psf, *psf_next;
spin_lock_bh(&in_dev->mc_tomb_lock);
pmc_prev = NULL;
for (pmc=in_dev->mc_tomb; pmc; pmc=pmc->next) {
if (pmc->multiaddr == multiaddr)
break;
pmc_prev = pmc;
}
... | 75,830,436,124,062,480,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,314 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct sk_buff *igmpv3_newpack(struct net_device *dev, int size)
{
struct sk_buff *skb;
struct rtable *rt;
struct iphdr *pip;
struct igmpv3_report *pig;
struct net *net = dev_net(dev);
struct flowi4 fl4;
int hlen = LL_RESERVED_SPACE(dev);
int tlen = dev->needed_tailroom;
while (1) {
skb = alloc_skb(s... | 38,289,177,205,716,416,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,315 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void igmpv3_send_cr(struct in_device *in_dev)
{
struct ip_mc_list *pmc, *pmc_prev, *pmc_next;
struct sk_buff *skb = NULL;
int type, dtype;
rcu_read_lock();
spin_lock_bh(&in_dev->mc_tomb_lock);
/* deleted MCA's */
pmc_prev = NULL;
for (pmc=in_dev->mc_tomb; pmc; pmc=pmc_next) {
pmc_next = pmc->next;
... | 143,968,607,779,394,800,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,316 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmpv3_send_report(struct in_device *in_dev, struct ip_mc_list *pmc)
{
struct sk_buff *skb = NULL;
int type;
if (!pmc) {
rcu_read_lock();
for_each_pmc_rcu(in_dev, pmc) {
if (pmc->multiaddr == IGMP_ALL_HOSTS)
continue;
spin_lock_bh(&pmc->lock);
if (pmc->sfcount[MCAST_EXCLUDE])
type = ... | 176,317,554,531,761,500,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,317 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int igmpv3_sendpack(struct sk_buff *skb)
{
struct igmphdr *pig = igmp_hdr(skb);
const int igmplen = skb->tail - skb->transport_header;
pig->csum = ip_compute_csum(igmp_hdr(skb), igmplen);
return ip_local_out(skb);
}
| 287,403,922,510,180,830,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,318 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u16 proto)
{
struct ip_mc_list *im;
struct ip_sf_list *psf;
int rv = 0;
for_each_pmc_rcu(in_dev, im) {
if (im->multiaddr == mc_addr)
break;
}
if (im && proto == IPPROTO_IGMP) {
rv = 1;
} else if (im) {
if (src_addr) {
for... | 166,349,889,204,805,800,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,319 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void ip_ma_put(struct ip_mc_list *im)
{
if (atomic_dec_and_test(&im->refcnt)) {
in_dev_put(im->interface);
kfree_rcu(im, rcu);
}
}
| 99,251,045,192,764,630,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,320 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int ip_mc_add1_src(struct ip_mc_list *pmc, int sfmode,
__be32 *psfsrc)
{
struct ip_sf_list *psf, *psf_prev;
psf_prev = NULL;
for (psf=pmc->sources; psf; psf=psf->sf_next) {
if (psf->sf_inaddr == *psfsrc)
break;
psf_prev = psf;
}
if (!psf) {
psf = kzalloc(sizeof(*psf), GFP_ATOMIC);
if (!psf)
... | 92,690,405,137,878,420,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,321 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int ip_mc_add_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
int sfcount, __be32 *psfsrc, int delta)
{
struct ip_mc_list *pmc;
int isexclude;
int i, err;
if (!in_dev)
return -ENODEV;
rcu_read_lock();
for_each_pmc_rcu(in_dev, pmc) {
if (*pmca == pmc->multiaddr)
break;
}
if (!pmc) {
... | 184,292,594,085,823,500,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,322 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void ip_mc_clear_src(struct ip_mc_list *pmc)
{
struct ip_sf_list *psf, *nextpsf;
for (psf=pmc->tomb; psf; psf=nextpsf) {
nextpsf = psf->sf_next;
kfree(psf);
}
pmc->tomb = NULL;
for (psf=pmc->sources; psf; psf=nextpsf) {
nextpsf = psf->sf_next;
kfree(psf);
}
pmc->sources = NULL;
pmc->sfmode = MCA... | 155,383,165,352,275,020,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,323 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_dec_group(struct in_device *in_dev, __be32 addr)
{
struct ip_mc_list *i;
struct ip_mc_list __rcu **ip;
ASSERT_RTNL();
for (ip = &in_dev->mc_list;
(i = rtnl_dereference(*ip)) != NULL;
ip = &i->next_rcu) {
if (i->multiaddr == addr) {
if (--i->users == 0) {
*ip = i->next_rcu;
in_d... | 108,112,516,653,206,830,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,324 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int ip_mc_del1_src(struct ip_mc_list *pmc, int sfmode,
__be32 *psfsrc)
{
struct ip_sf_list *psf, *psf_prev;
int rv = 0;
psf_prev = NULL;
for (psf=pmc->sources; psf; psf=psf->sf_next) {
if (psf->sf_inaddr == *psfsrc)
break;
psf_prev = psf;
}
if (!psf || psf->sf_count[sfmode] == 0) {
/* source fil... | 275,108,394,063,361,400,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,325 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int ip_mc_del_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
int sfcount, __be32 *psfsrc, int delta)
{
struct ip_mc_list *pmc;
int changerec = 0;
int i, err;
if (!in_dev)
return -ENODEV;
rcu_read_lock();
for_each_pmc_rcu(in_dev, pmc) {
if (*pmca == pmc->multiaddr)
break;
}
if (!pmc) ... | 211,519,475,747,951,320,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,326 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_destroy_dev(struct in_device *in_dev)
{
struct ip_mc_list *i;
ASSERT_RTNL();
/* Deactivate timers */
ip_mc_down(in_dev);
while ((i = rtnl_dereference(in_dev->mc_list)) != NULL) {
in_dev->mc_list = i->next_rcu;
in_dev->mc_count--;
/* We've dropped the groups in ip_mc_down already */
ip_mc_cle... | 153,714,899,867,806,220,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,327 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_down(struct in_device *in_dev)
{
struct ip_mc_list *pmc;
ASSERT_RTNL();
for_each_pmc_rtnl(in_dev, pmc)
igmp_group_dropped(pmc);
#ifdef CONFIG_IP_MULTICAST
in_dev->mr_ifc_count = 0;
if (del_timer(&in_dev->mr_ifc_timer))
__in_dev_put(in_dev);
in_dev->mr_gq_running = 0;
if (del_timer(&in_dev->mr_g... | 263,071,351,632,383,940,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,328 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_drop_socket(struct sock *sk)
{
struct inet_sock *inet = inet_sk(sk);
struct ip_mc_socklist *iml;
struct net *net = sock_net(sk);
if (inet->mc_list == NULL)
return;
rtnl_lock();
while ((iml = rtnl_dereference(inet->mc_list)) != NULL) {
struct in_device *in_dev;
inet->mc_list = iml->next_rcu;
... | 881,892,462,723,035,800,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,329 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void ip_mc_filter_add(struct in_device *in_dev, __be32 addr)
{
char buf[MAX_ADDR_LEN];
struct net_device *dev = in_dev->dev;
/* Checking for IFF_MULTICAST here is WRONG-WRONG-WRONG.
We will get multicast token leakage, when IFF_MULTICAST
is changed. This check should be done in ndo_set_rx_mode
ro... | 254,979,022,225,092,830,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,330 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void ip_mc_filter_del(struct in_device *in_dev, __be32 addr)
{
char buf[MAX_ADDR_LEN];
struct net_device *dev = in_dev->dev;
if (arp_mc_map(addr, buf, dev, 0) == 0)
dev_mc_del(dev, buf);
}
| 140,955,854,498,925,350,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,331 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static struct in_device *ip_mc_find_dev(struct net *net, struct ip_mreqn *imr)
{
struct net_device *dev = NULL;
struct in_device *idev = NULL;
if (imr->imr_ifindex) {
idev = inetdev_by_index(net, imr->imr_ifindex);
return idev;
}
if (imr->imr_address.s_addr) {
dev = __ip_dev_find(net, imr->imr_address.s_add... | 248,147,864,121,743,600,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,332 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int ip_mc_gsfget(struct sock *sk, struct group_filter *gsf,
struct group_filter __user *optval, int __user *optlen)
{
int err, i, count, copycount;
struct sockaddr_in *psin;
__be32 addr;
struct ip_mc_socklist *pmc;
struct inet_sock *inet = inet_sk(sk);
struct ip_sf_socklist *psl;
psin = (struct sockaddr_in *)&... | 319,522,985,047,801,760,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,333 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_inc_group(struct in_device *in_dev, __be32 addr)
{
struct ip_mc_list *im;
ASSERT_RTNL();
for_each_pmc_rtnl(in_dev, im) {
if (im->multiaddr == addr) {
im->users++;
ip_mc_add_src(in_dev, &addr, MCAST_EXCLUDE, 0, NULL, 0);
goto out;
}
}
im = kzalloc(sizeof(*im), GFP_KERNEL);
if (!im)
got... | 241,771,224,575,084,560,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,334 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_init_dev(struct in_device *in_dev)
{
ASSERT_RTNL();
in_dev->mc_tomb = NULL;
#ifdef CONFIG_IP_MULTICAST
in_dev->mr_gq_running = 0;
setup_timer(&in_dev->mr_gq_timer, igmp_gq_timer_expire,
(unsigned long)in_dev);
in_dev->mr_ifc_count = 0;
in_dev->mc_count = 0;
setup_timer(&in_dev->mr_ifc_timer, i... | 326,959,769,496,980,460,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,335 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int ip_mc_join_group(struct sock *sk , struct ip_mreqn *imr)
{
int err;
__be32 addr = imr->imr_multiaddr.s_addr;
struct ip_mc_socklist *iml = NULL, *i;
struct in_device *in_dev;
struct inet_sock *inet = inet_sk(sk);
struct net *net = sock_net(sk);
int ifindex;
int count = 0;
if (!ipv4_is_multicast(addr))
re... | 159,737,165,640,374,040,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,336 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int ip_mc_leave_group(struct sock *sk, struct ip_mreqn *imr)
{
struct inet_sock *inet = inet_sk(sk);
struct ip_mc_socklist *iml;
struct ip_mc_socklist __rcu **imlp;
struct in_device *in_dev;
struct net *net = sock_net(sk);
__be32 group = imr->imr_multiaddr.s_addr;
u32 ifindex;
int ret = -EADDRNOTAVAIL;
rtnl_l... | 182,223,520,191,017,060,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,337 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int ip_mc_leave_src(struct sock *sk, struct ip_mc_socklist *iml,
struct in_device *in_dev)
{
struct ip_sf_socklist *psf = rtnl_dereference(iml->sflist);
int err;
if (psf == NULL) {
/* any-source empty exclude case */
return ip_mc_del_src(in_dev, &iml->multi.imr_multiaddr.s_addr,
iml->sfmode, 0, ... | 172,439,657,603,037,040,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,338 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_rejoin_groups(struct in_device *in_dev)
{
#ifdef CONFIG_IP_MULTICAST
struct ip_mc_list *im;
int type;
for_each_pmc_rcu(in_dev, im) {
if (im->multiaddr == IGMP_ALL_HOSTS)
continue;
/* a failover is happening and switches
* must be notified immediately
*/
if (IGMP_V1_SEEN(in_dev))
type =... | 130,189,282,271,661,210,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,339 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int ip_mc_sf_allow(struct sock *sk, __be32 loc_addr, __be32 rmt_addr, int dif)
{
struct inet_sock *inet = inet_sk(sk);
struct ip_mc_socklist *pmc;
struct ip_sf_socklist *psl;
int i;
int ret;
ret = 1;
if (!ipv4_is_multicast(loc_addr))
goto out;
rcu_read_lock();
for_each_pmc_rcu(inet, pmc) {
if (pmc->multi... | 47,861,180,150,332,370,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,340 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | int ip_mc_source(int add, int omode, struct sock *sk, struct
ip_mreq_source *mreqs, int ifindex)
{
int err;
struct ip_mreqn imr;
__be32 addr = mreqs->imr_multiaddr;
struct ip_mc_socklist *pmc;
struct in_device *in_dev = NULL;
struct inet_sock *inet = inet_sk(sk);
struct ip_sf_socklist *psl;
struct net *net = s... | 316,580,139,402,641,260,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,341 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_unmap(struct in_device *in_dev)
{
struct ip_mc_list *pmc;
ASSERT_RTNL();
for_each_pmc_rtnl(in_dev, pmc)
igmp_group_dropped(pmc);
}
| 90,329,650,463,777,200,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,342 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | void ip_mc_up(struct in_device *in_dev)
{
struct ip_mc_list *pmc;
ASSERT_RTNL();
ip_mc_inc_group(in_dev, IGMP_ALL_HOSTS);
for_each_pmc_rtnl(in_dev, pmc)
igmp_group_added(pmc);
}
| 299,196,865,535,283,950,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,343 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int is_in(struct ip_mc_list *pmc, struct ip_sf_list *psf, int type,
int gdeleted, int sdeleted)
{
switch (type) {
case IGMPV3_MODE_IS_INCLUDE:
case IGMPV3_MODE_IS_EXCLUDE:
if (gdeleted || sdeleted)
return 0;
if (!(pmc->gsquery && !psf->sf_gsresp)) {
if (pmc->sfmode == MCAST_INCLUDE)
return 1;
... | 286,961,818,454,032,330,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,344 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static void sf_markstate(struct ip_mc_list *pmc)
{
struct ip_sf_list *psf;
int mca_xcount = pmc->sfcount[MCAST_EXCLUDE];
for (psf=pmc->sources; psf; psf=psf->sf_next)
if (pmc->sfcount[MCAST_EXCLUDE]) {
psf->sf_oldin = mca_xcount ==
psf->sf_count[MCAST_EXCLUDE] &&
!psf->sf_count[MCAST_INCLUDE];
} else... | 311,740,690,298,335,000,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,345 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 0 | static int sf_setstate(struct ip_mc_list *pmc)
{
struct ip_sf_list *psf, *dpsf;
int mca_xcount = pmc->sfcount[MCAST_EXCLUDE];
int qrv = pmc->interface->mr_qrv;
int new_in, rv;
rv = 0;
for (psf=pmc->sources; psf; psf=psf->sf_next) {
if (pmc->sfcount[MCAST_EXCLUDE]) {
new_in = mca_xcount == psf->sf_count[MCAS... | 54,383,051,773,692,990,000,000,000,000,000,000,000 | igmp.c | 42,079,939,440,198,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
24,346 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | SYSCALL_DEFINE1(io_destroy, aio_context_t, ctx)
{
struct kioctx *ioctx = lookup_ioctx(ctx);
if (likely(NULL != ioctx)) {
io_destroy(ioctx);
return 0;
}
pr_debug("EINVAL: io_destroy: invalid context id\n");
return -EINVAL;
}
| 251,846,824,068,983,440,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,347 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | SYSCALL_DEFINE2(io_setup, unsigned, nr_events, aio_context_t __user *, ctxp)
{
struct kioctx *ioctx = NULL;
unsigned long ctx;
long ret;
ret = get_user(ctx, ctxp);
if (unlikely(ret))
goto out;
ret = -EINVAL;
if (unlikely(ctx || nr_events == 0)) {
pr_debug("EINVAL: io_setup: ctx %lu nr_events %u\n",
... | 297,663,341,580,937,500,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,348 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | SYSCALL_DEFINE3(io_submit, aio_context_t, ctx_id, long, nr,
struct iocb __user * __user *, iocbpp)
{
return do_io_submit(ctx_id, nr, iocbpp, 0);
}
| 213,990,237,556,289,670,000,000,000,000,000,000,000 | aio.c | 30,486,927,269,978,305,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,349 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | SYSCALL_DEFINE3(io_cancel, aio_context_t, ctx_id, struct iocb __user *, iocb,
struct io_event __user *, result)
{
int (*cancel)(struct kiocb *iocb, struct io_event *res);
struct kioctx *ctx;
struct kiocb *kiocb;
u32 key;
int ret;
ret = get_user(key, &iocb->aio_key);
if (unlikely(ret))
return -EFAULT;
ctx ... | 116,542,718,679,155,880,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,350 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | SYSCALL_DEFINE5(io_getevents, aio_context_t, ctx_id,
long, min_nr,
long, nr,
struct io_event __user *, events,
struct timespec __user *, timeout)
{
struct kioctx *ioctx = lookup_ioctx(ctx_id);
long ret = -EINVAL;
if (likely(ioctx)) {
if (likely(min_nr <= nr && min_nr >= 0))
ret = read_events(ioctx, min... | 45,988,278,538,085,060,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,351 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static struct kiocb *__aio_get_req(struct kioctx *ctx)
{
struct kiocb *req = NULL;
req = kmem_cache_alloc(kiocb_cachep, GFP_KERNEL);
if (unlikely(!req))
return NULL;
req->ki_flags = 0;
req->ki_users = 2;
req->ki_key = 0;
req->ki_ctx = ctx;
req->ki_cancel = NULL;
req->ki_retry = NULL;
req->ki_dtor = NULL;
... | 331,688,276,607,850,750,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,352 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int __aio_put_req(struct kioctx *ctx, struct kiocb *req)
{
dprintk(KERN_DEBUG "aio_put(%p): f_count=%ld\n",
req, atomic_long_read(&req->ki_filp->f_count));
assert_spin_locked(&ctx->ctx_lock);
req->ki_users--;
BUG_ON(req->ki_users < 0);
if (likely(req->ki_users))
return 0;
list_del(&req->ki_list); /*... | 100,241,048,546,733,290,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,353 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int __aio_run_iocbs(struct kioctx *ctx)
{
struct kiocb *iocb;
struct list_head run_list;
assert_spin_locked(&ctx->ctx_lock);
list_replace_init(&ctx->run_list, &run_list);
while (!list_empty(&run_list)) {
iocb = list_entry(run_list.next, struct kiocb,
ki_run_list);
list_del(&iocb->ki_run_list);
/*... | 58,469,769,539,665,370,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,354 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void __put_ioctx(struct kioctx *ctx)
{
BUG_ON(ctx->reqs_active);
cancel_delayed_work(&ctx->wq);
cancel_work_sync(&ctx->wq.work);
aio_free_ring(ctx);
mmdrop(ctx->mm);
ctx->mm = NULL;
pr_debug("__put_ioctx: freeing %p\n", ctx);
call_rcu(&ctx->rcu_head, ctx_rcu_free);
}
| 175,068,020,686,892,250,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,355 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static inline int __queue_kicked_iocb(struct kiocb *iocb)
{
struct kioctx *ctx = iocb->ki_ctx;
assert_spin_locked(&ctx->ctx_lock);
if (list_empty(&iocb->ki_run_list)) {
list_add_tail(&iocb->ki_run_list,
&ctx->run_list);
return 1;
}
return 0;
}
| 151,703,862,259,465,900,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,356 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void aio_advance_iovec(struct kiocb *iocb, ssize_t ret)
{
struct iovec *iov = &iocb->ki_iovec[iocb->ki_cur_seg];
BUG_ON(ret <= 0);
while (iocb->ki_cur_seg < iocb->ki_nr_segs && ret > 0) {
ssize_t this = min((ssize_t)iov->iov_len, ret);
iov->iov_base += this;
iov->iov_len -= this;
iocb->ki_left -= th... | 257,065,089,151,506,800,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,357 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | int aio_complete(struct kiocb *iocb, long res, long res2)
{
struct kioctx *ctx = iocb->ki_ctx;
struct aio_ring_info *info;
struct aio_ring *ring;
struct io_event *event;
unsigned long flags;
unsigned long tail;
int ret;
/*
* Special case handling for sync iocbs:
* - events go directly into the iocb for f... | 36,860,045,744,475,600,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,358 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static ssize_t aio_fdsync(struct kiocb *iocb)
{
struct file *file = iocb->ki_filp;
ssize_t ret = -EINVAL;
if (file->f_op->aio_fsync)
ret = file->f_op->aio_fsync(iocb, 1);
return ret;
}
| 214,137,669,771,197,700,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,359 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void aio_fput_routine(struct work_struct *data)
{
spin_lock_irq(&fput_lock);
while (likely(!list_empty(&fput_head))) {
struct kiocb *req = list_kiocb(fput_head.next);
struct kioctx *ctx = req->ki_ctx;
list_del(&req->ki_list);
spin_unlock_irq(&fput_lock);
/* Complete the fput(s) */
if (req->ki_fil... | 315,674,317,650,254,020,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,360 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void aio_free_ring(struct kioctx *ctx)
{
struct aio_ring_info *info = &ctx->ring_info;
long i;
for (i=0; i<info->nr_pages; i++)
put_page(info->ring_pages[i]);
if (info->mmap_size) {
down_write(&ctx->mm->mmap_sem);
do_munmap(ctx->mm, info->mmap_base, info->mmap_size);
up_write(&ctx->mm->mmap_sem);
... | 246,806,684,092,843,840,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,361 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static ssize_t aio_fsync(struct kiocb *iocb)
{
struct file *file = iocb->ki_filp;
ssize_t ret = -EINVAL;
if (file->f_op->aio_fsync)
ret = file->f_op->aio_fsync(iocb, 0);
return ret;
}
| 158,700,947,423,996,030,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,362 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static inline struct kiocb *aio_get_req(struct kioctx *ctx,
struct kiocb_batch *batch)
{
struct kiocb *req;
if (list_empty(&batch->head))
if (kiocb_batch_refill(ctx, batch) == 0)
return NULL;
req = list_first_entry(&batch->head, struct kiocb, ki_batch);
list_del(&req->ki_batch);
return req;
}
| 338,718,698,429,641,000,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,363 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void aio_kick_handler(struct work_struct *work)
{
struct kioctx *ctx = container_of(work, struct kioctx, wq.work);
mm_segment_t oldfs = get_fs();
struct mm_struct *mm;
int requeue;
set_fs(USER_DS);
use_mm(ctx->mm);
spin_lock_irq(&ctx->ctx_lock);
requeue =__aio_run_iocbs(ctx);
mm = ctx->mm;
spin_unlock... | 230,168,298,938,409,130,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,364 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | int aio_put_req(struct kiocb *req)
{
struct kioctx *ctx = req->ki_ctx;
int ret;
spin_lock_irq(&ctx->ctx_lock);
ret = __aio_put_req(ctx, req);
spin_unlock_irq(&ctx->ctx_lock);
return ret;
}
| 239,733,905,203,850,430,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,365 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void aio_queue_work(struct kioctx * ctx)
{
unsigned long timeout;
/*
* if someone is waiting, get the work started right
* away, otherwise, use a longer delay
*/
smp_mb();
if (waitqueue_active(&ctx->wait))
timeout = 1;
else
timeout = HZ/10;
queue_delayed_work(aio_wq, &ctx->wq, timeout);
}
| 160,786,756,645,130,330,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,366 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int aio_read_evt(struct kioctx *ioctx, struct io_event *ent)
{
struct aio_ring_info *info = &ioctx->ring_info;
struct aio_ring *ring;
unsigned long head;
int ret = 0;
ring = kmap_atomic(info->ring_pages[0], KM_USER0);
dprintk("in aio_read_evt h%lu t%lu m%lu\n",
(unsigned long)ring->head, (unsigned long... | 56,819,481,307,099,130,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,367 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static inline void aio_run_all_iocbs(struct kioctx *ctx)
{
spin_lock_irq(&ctx->ctx_lock);
while (__aio_run_iocbs(ctx))
;
spin_unlock_irq(&ctx->ctx_lock);
}
| 317,604,141,641,021,300,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,368 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static ssize_t aio_run_iocb(struct kiocb *iocb)
{
struct kioctx *ctx = iocb->ki_ctx;
ssize_t (*retry)(struct kiocb *);
ssize_t ret;
if (!(retry = iocb->ki_retry)) {
printk("aio_run_iocb: iocb->ki_retry = NULL\n");
return 0;
}
/*
* We don't want the next retry iteration for this
* operation to start unti... | 76,135,378,472,935,950,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,369 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static ssize_t aio_rw_vect_retry(struct kiocb *iocb)
{
struct file *file = iocb->ki_filp;
struct address_space *mapping = file->f_mapping;
struct inode *inode = mapping->host;
ssize_t (*rw_op)(struct kiocb *, const struct iovec *,
unsigned long, loff_t);
ssize_t ret = 0;
unsigned short opcode;
if ((iocb->ki... | 156,877,811,210,959,150,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,370 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int __init aio_setup(void)
{
kiocb_cachep = KMEM_CACHE(kiocb, SLAB_HWCACHE_ALIGN|SLAB_PANIC);
kioctx_cachep = KMEM_CACHE(kioctx,SLAB_HWCACHE_ALIGN|SLAB_PANIC);
aio_wq = alloc_workqueue("aio", 0, 1); /* used to limit concurrency */
BUG_ON(!aio_wq);
pr_debug("aio_setup: sizeof(struct page) = %d\n", (int)siz... | 282,417,510,755,862,120,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,371 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int aio_setup_ring(struct kioctx *ctx)
{
struct aio_ring *ring;
struct aio_ring_info *info = &ctx->ring_info;
unsigned nr_events = ctx->max_reqs;
unsigned long size;
int nr_pages;
/* Compensate for the ring buffer's head/tail overlap entry */
nr_events += 2; /* 1 is required, 2 for good luck */
size = ... | 37,106,637,512,470,270,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,372 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void ctx_rcu_free(struct rcu_head *head)
{
struct kioctx *ctx = container_of(head, struct kioctx, rcu_head);
unsigned nr_events = ctx->max_reqs;
kmem_cache_free(kioctx_cachep, ctx);
if (nr_events) {
spin_lock(&aio_nr_lock);
BUG_ON(aio_nr - nr_events > aio_nr);
aio_nr -= nr_events;
spin_unlock(&aio_... | 283,357,576,830,751,720,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,373 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static inline void init_timeout(struct aio_timeout *to)
{
setup_timer_on_stack(&to->timer, timeout_func, (unsigned long) to);
to->timed_out = 0;
to->p = current;
}
| 178,568,546,350,303,630,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,374 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void io_destroy(struct kioctx *ioctx)
{
struct mm_struct *mm = current->mm;
int was_dead;
/* delete the entry from the list is someone else hasn't already */
spin_lock(&mm->ioctx_lock);
was_dead = ioctx->dead;
ioctx->dead = 1;
hlist_del_rcu(&ioctx->list);
spin_unlock(&mm->ioctx_lock);
dprintk("aio_rel... | 275,751,545,168,182,100,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,375 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int io_submit_one(struct kioctx *ctx, struct iocb __user *user_iocb,
struct iocb *iocb, struct kiocb_batch *batch,
bool compat)
{
struct kiocb *req;
struct file *file;
ssize_t ret;
/* enforce forwards compatibility on users */
if (unlikely(iocb->aio_reserved1 || iocb->aio_reserved2)) {
pr_debug("... | 102,071,229,654,033,170,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,376 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static struct kioctx *ioctx_alloc(unsigned nr_events)
{
struct mm_struct *mm;
struct kioctx *ctx;
int did_sync = 0;
/* Prevent overflows */
if ((nr_events > (0x10000000U / sizeof(struct io_event))) ||
(nr_events > (0x10000000U / sizeof(struct kiocb)))) {
pr_debug("ENOMEM: nr_events too high\n");
return E... | 30,617,851,606,716,790,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,377 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | void kick_iocb(struct kiocb *iocb)
{
/* sync iocbs are easy: they can only ever be executing from a
* single context. */
if (is_sync_kiocb(iocb)) {
kiocbSetKicked(iocb);
wake_up_process(iocb->ki_obj.tsk);
return;
}
try_queue_kicked_iocb(iocb);
}
| 261,219,021,621,113,100,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.