idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
24,378 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static struct kioctx *lookup_ioctx(unsigned long ctx_id)
{
struct mm_struct *mm = current->mm;
struct kioctx *ctx, *ret = NULL;
struct hlist_node *n;
rcu_read_lock();
hlist_for_each_entry_rcu(ctx, n, &mm->ioctx_list, list) {
/*
* RCU protects us against accessing freed memory but
* we have to be careful ... | 43,386,319,629,748,410,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,379 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static struct kiocb *lookup_kiocb(struct kioctx *ctx, struct iocb __user *iocb,
u32 key)
{
struct list_head *pos;
assert_spin_locked(&ctx->ctx_lock);
/* TODO: use a hash or array, this sucks. */
list_for_each(pos, &ctx->active_reqs) {
struct kiocb *kiocb = list_kiocb(pos);
if (kiocb->ki_obj.user == iocb... | 211,081,525,140,549,440,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,380 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static int read_events(struct kioctx *ctx,
long min_nr, long nr,
struct io_event __user *event,
struct timespec __user *timeout)
{
long start_jiffies = jiffies;
struct task_struct *tsk = current;
DECLARE_WAITQUEUE(wait, tsk);
int ret;
int i = 0;
struct io_event ent;
struct aio_timeout to;
int ... | 34,335,356,747,161,390,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,381 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static inline void really_put_req(struct kioctx *ctx, struct kiocb *req)
{
assert_spin_locked(&ctx->ctx_lock);
if (req->ki_eventfd != NULL)
eventfd_ctx_put(req->ki_eventfd);
if (req->ki_dtor)
req->ki_dtor(req);
if (req->ki_iovec != &req->ki_inline_vec)
kfree(req->ki_iovec);
kmem_cache_free(kiocb_cachep, req... | 298,733,657,661,943,440,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,382 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static inline int try_get_ioctx(struct kioctx *kioctx)
{
return atomic_inc_not_zero(&kioctx->users);
}
| 106,815,533,728,703,270,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,383 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void try_queue_kicked_iocb(struct kiocb *iocb)
{
struct kioctx *ctx = iocb->ki_ctx;
unsigned long flags;
int run = 0;
spin_lock_irqsave(&ctx->ctx_lock, flags);
/* set this inside the lock so that we can't race with aio_run_iocb()
* testing it and putting the iocb on the run list under the lock */
if (!... | 148,297,116,240,550,210,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,384 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | static void wait_for_all_aios(struct kioctx *ctx)
{
struct task_struct *tsk = current;
DECLARE_WAITQUEUE(wait, tsk);
spin_lock_irq(&ctx->ctx_lock);
if (!ctx->reqs_active)
goto out;
add_wait_queue(&ctx->wait, &wait);
set_task_state(tsk, TASK_UNINTERRUPTIBLE);
while (ctx->reqs_active) {
spin_unlock_irq(&ctx-... | 99,575,976,824,019,600,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,385 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 0 | ssize_t wait_on_sync_kiocb(struct kiocb *iocb)
{
while (iocb->ki_users) {
set_current_state(TASK_UNINTERRUPTIBLE);
if (!iocb->ki_users)
break;
io_schedule();
}
__set_current_state(TASK_RUNNING);
return iocb->ki_user_data;
}
| 135,631,634,469,541,200,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
24,510 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_connector_attach_property(struct drm_connector *connector,
struct drm_property *property, uint64_t init_val)
{
int i;
for (i = 0; i < DRM_CONNECTOR_MAX_PROPERTY; i++) {
if (connector->property_ids[i] == 0) {
connector->property_ids[i] = property->base.id;
connector->property_values[i] = ini... | 53,303,393,481,044,010,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,511 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_connector_cleanup(struct drm_connector *connector)
{
struct drm_device *dev = connector->dev;
struct drm_display_mode *mode, *t;
list_for_each_entry_safe(mode, t, &connector->probed_modes, head)
drm_mode_remove(connector, mode);
list_for_each_entry_safe(mode, t, &connector->modes, head)
drm_mode_remo... | 193,723,113,599,804,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,512 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_connector_init(struct drm_device *dev,
struct drm_connector *connector,
const struct drm_connector_funcs *funcs,
int connector_type)
{
mutex_lock(&dev->mode_config.mutex);
connector->dev = dev;
connector->funcs = funcs;
drm_mode_object_get(dev, &connector->base, DRM_MODE_OBJECT_CONNEC... | 267,010,047,958,932,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,513 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_connector_property_get_value(struct drm_connector *connector,
struct drm_property *property, uint64_t *val)
{
int i;
for (i = 0; i < DRM_CONNECTOR_MAX_PROPERTY; i++) {
if (connector->property_ids[i] == property->base.id) {
*val = connector->property_values[i];
break;
}
}
if (i == DRM_CONNE... | 286,104,767,317,756,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,514 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_connector_property_set_value(struct drm_connector *connector,
struct drm_property *property, uint64_t value)
{
int i;
for (i = 0; i < DRM_CONNECTOR_MAX_PROPERTY; i++) {
if (connector->property_ids[i] == property->base.id) {
connector->property_values[i] = value;
break;
}
}
if (i == DRM_CON... | 157,251,239,535,118,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,515 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_crtc_cleanup(struct drm_crtc *crtc)
{
struct drm_device *dev = crtc->dev;
if (crtc->gamma_store) {
kfree(crtc->gamma_store);
crtc->gamma_store = NULL;
}
drm_mode_object_put(dev, &crtc->base);
list_del(&crtc->head);
dev->mode_config.num_crtc--;
}
| 25,214,318,551,190,187,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,516 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_crtc_convert_to_umode(struct drm_mode_modeinfo *out,
struct drm_display_mode *in)
{
out->clock = in->clock;
out->hdisplay = in->hdisplay;
out->hsync_start = in->hsync_start;
out->hsync_end = in->hsync_end;
out->htotal = in->htotal;
out->hskew = in->hskew;
out->vdisplay = in->vdisplay;
out->vs... | 56,300,050,269,051,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,517 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_crtc_convert_umode(struct drm_display_mode *out,
struct drm_mode_modeinfo *in)
{
out->clock = in->clock;
out->hdisplay = in->hdisplay;
out->hsync_start = in->hsync_start;
out->hsync_end = in->hsync_end;
out->htotal = in->htotal;
out->hskew = in->hskew;
out->vdisplay = in->vdisplay;
out->vsync_st... | 244,388,706,776,732,640,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,518 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_crtc_init(struct drm_device *dev, struct drm_crtc *crtc,
const struct drm_crtc_funcs *funcs)
{
crtc->dev = dev;
crtc->funcs = funcs;
mutex_lock(&dev->mode_config.mutex);
drm_mode_object_get(dev, &crtc->base, DRM_MODE_OBJECT_CRTC);
list_add_tail(&crtc->head, &dev->mode_config.crtc_list);
dev->mode_... | 71,565,063,918,510,690,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,519 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_encoder_cleanup(struct drm_encoder *encoder)
{
struct drm_device *dev = encoder->dev;
mutex_lock(&dev->mode_config.mutex);
drm_mode_object_put(dev, &encoder->base);
list_del(&encoder->head);
dev->mode_config.num_encoder--;
mutex_unlock(&dev->mode_config.mutex);
}
| 56,837,714,151,943,730,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,520 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_encoder_init(struct drm_device *dev,
struct drm_encoder *encoder,
const struct drm_encoder_funcs *funcs,
int encoder_type)
{
mutex_lock(&dev->mode_config.mutex);
encoder->dev = dev;
drm_mode_object_get(dev, &encoder->base, DRM_MODE_OBJECT_ENCODER);
encoder->encoder_type = encoder_... | 61,195,735,455,842,220,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,521 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_fb_release(struct drm_file *priv)
{
struct drm_device *dev = priv->minor->dev;
struct drm_framebuffer *fb, *tfb;
mutex_lock(&dev->mode_config.mutex);
list_for_each_entry_safe(fb, tfb, &priv->fbs, filp_head) {
list_del(&fb->filp_head);
fb->funcs->destroy(fb);
}
mutex_unlock(&dev->mode_config.mutex);
... | 47,750,528,289,179,820,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,522 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_framebuffer_cleanup(struct drm_framebuffer *fb)
{
struct drm_device *dev = fb->dev;
struct drm_crtc *crtc;
struct drm_mode_set set;
int ret;
/* remove from any CRTC */
list_for_each_entry(crtc, &dev->mode_config.crtc_list, head) {
if (crtc->fb == fb) {
/* should turn off the crtc */
memset(&set,... | 13,960,374,498,779,470,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,523 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_framebuffer_init(struct drm_device *dev, struct drm_framebuffer *fb,
const struct drm_framebuffer_funcs *funcs)
{
int ret;
ret = drm_mode_object_get(dev, &fb->base, DRM_MODE_OBJECT_FB);
if (ret) {
return ret;
}
fb->dev = dev;
fb->funcs = funcs;
dev->mode_config.num_fb++;
list_add(&fb->head, &dev... | 140,908,843,211,300,650,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,524 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | char *drm_get_connector_name(struct drm_connector *connector)
{
static char buf[32];
snprintf(buf, 32, "%s-%d",
drm_connector_enum_list[connector->connector_type].name,
connector->connector_type_id);
return buf;
}
| 305,417,048,405,390,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,525 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | char *drm_get_encoder_name(struct drm_encoder *encoder)
{
static char buf[32];
snprintf(buf, 32, "%s-%d",
drm_encoder_enum_list[encoder->encoder_type].name,
encoder->base.id);
return buf;
}
| 60,686,064,719,239,750,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,526 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_addfb(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_fb_cmd *r = data;
struct drm_mode_config *config = &dev->mode_config;
struct drm_framebuffer *fb;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return -EINVAL;
if ((config->min_width > r-... | 176,749,032,854,315,460,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,527 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | static int drm_mode_attachmode(struct drm_device *dev,
struct drm_connector *connector,
struct drm_display_mode *mode)
{
int ret = 0;
list_add_tail(&mode->head, &connector->user_modes);
return ret;
}
| 263,266,340,516,552,060,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,528 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_attachmode_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_mode_cmd *mode_cmd = data;
struct drm_connector *connector;
struct drm_display_mode *mode;
struct drm_mode_object *obj;
struct drm_mode_modeinfo *umode = &mode_cmd->mode;
int ret = 0;
if (!dr... | 191,997,543,229,155,680,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,529 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_mode_config_init(struct drm_device *dev)
{
mutex_init(&dev->mode_config.mutex);
mutex_init(&dev->mode_config.idr_mutex);
INIT_LIST_HEAD(&dev->mode_config.fb_list);
INIT_LIST_HEAD(&dev->mode_config.crtc_list);
INIT_LIST_HEAD(&dev->mode_config.connector_list);
INIT_LIST_HEAD(&dev->mode_config.encoder_list)... | 227,021,826,107,683,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,530 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_mode_config_reset(struct drm_device *dev)
{
struct drm_crtc *crtc;
struct drm_encoder *encoder;
struct drm_connector *connector;
list_for_each_entry(crtc, &dev->mode_config.crtc_list, head)
if (crtc->funcs->reset)
crtc->funcs->reset(crtc);
list_for_each_entry(encoder, &dev->mode_config.encoder_list... | 62,348,482,515,515,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,531 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_connector_attach_encoder(struct drm_connector *connector,
struct drm_encoder *encoder)
{
int i;
for (i = 0; i < DRM_CONNECTOR_MAX_ENCODER; i++) {
if (connector->encoder_ids[i] == 0) {
connector->encoder_ids[i] = encoder->base.id;
return 0;
}
}
return -ENOMEM;
}
| 3,327,599,453,176,575,600,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,532 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_mode_connector_detach_encoder(struct drm_connector *connector,
struct drm_encoder *encoder)
{
int i;
for (i = 0; i < DRM_CONNECTOR_MAX_ENCODER; i++) {
if (connector->encoder_ids[i] == encoder->base.id) {
connector->encoder_ids[i] = 0;
if (connector->encoder == encoder)
connector->encoder ... | 307,303,739,104,164,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,533 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_connector_property_set_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_connector_set_property *out_resp = data;
struct drm_mode_object *obj;
struct drm_property *property;
struct drm_connector *connector;
int ret = -EINVAL;
int i;
if (!drm_core_che... | 162,201,440,391,071,960,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,534 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_connector_update_edid_property(struct drm_connector *connector,
struct edid *edid)
{
struct drm_device *dev = connector->dev;
int ret = 0, size;
if (connector->edid_blob_ptr)
drm_property_destroy_blob(dev, connector->edid_blob_ptr);
/* Delete edid, when there is none. */
if (!edid) {
co... | 273,177,416,331,673,660,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,535 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_create_dirty_info_property(struct drm_device *dev)
{
struct drm_property *dirty_info;
int i;
if (dev->mode_config.dirty_info_property)
return 0;
dirty_info =
drm_property_create(dev, DRM_MODE_PROP_ENUM |
DRM_MODE_PROP_IMMUTABLE,
"dirty",
ARRAY_SIZE(drm_dirty_info_enum_list... | 325,610,325,156,302,870,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,536 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_create_dithering_property(struct drm_device *dev)
{
struct drm_property *dithering_mode;
int i;
if (dev->mode_config.dithering_mode_property)
return 0;
dithering_mode =
drm_property_create(dev, DRM_MODE_PROP_ENUM, "dithering",
ARRAY_SIZE(drm_dithering_mode_enum_list));
for (i = 0; i < AR... | 34,929,667,112,170,075,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,537 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_create_dumb_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_create_dumb *args = data;
if (!dev->driver->dumb_create)
return -ENOSYS;
return dev->driver->dumb_create(file_priv, dev, args);
}
| 328,344,642,726,818,580,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,538 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_create_dvi_i_properties(struct drm_device *dev)
{
struct drm_property *dvi_i_selector;
struct drm_property *dvi_i_subconnector;
int i;
if (dev->mode_config.dvi_i_select_subconnector_property)
return 0;
dvi_i_selector =
drm_property_create(dev, DRM_MODE_PROP_ENUM,
"select subconnector",
... | 179,120,184,071,952,780,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,539 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_create_scaling_mode_property(struct drm_device *dev)
{
struct drm_property *scaling_mode;
int i;
if (dev->mode_config.scaling_mode_property)
return 0;
scaling_mode =
drm_property_create(dev, DRM_MODE_PROP_ENUM, "scaling mode",
ARRAY_SIZE(drm_scaling_mode_enum_list));
for (i = 0; i < ARRA... | 38,330,449,708,094,703,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,540 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | static int drm_mode_create_standard_connector_properties(struct drm_device *dev)
{
struct drm_property *edid;
struct drm_property *dpms;
int i;
/*
* Standard properties (apply to all connectors)
*/
edid = drm_property_create(dev, DRM_MODE_PROP_BLOB |
DRM_MODE_PROP_IMMUTABLE,
"EDID", 0);
dev->mo... | 58,615,870,154,394,890,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,541 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_create_tv_properties(struct drm_device *dev, int num_modes,
char *modes[])
{
struct drm_property *tv_selector;
struct drm_property *tv_subconnector;
int i;
if (dev->mode_config.tv_select_subconnector_property)
return 0;
/*
* Basic connector properties
*/
tv_selector = drm_property_creat... | 147,839,542,089,561,760,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,542 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | bool drm_mode_crtc_set_gamma_size(struct drm_crtc *crtc,
int gamma_size)
{
crtc->gamma_size = gamma_size;
crtc->gamma_store = kzalloc(gamma_size * sizeof(uint16_t) * 3, GFP_KERNEL);
if (!crtc->gamma_store) {
crtc->gamma_size = 0;
return false;
}
return true;
}
| 335,080,238,921,491,630,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,543 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_cursor_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_cursor *req = data;
struct drm_mode_object *obj;
struct drm_crtc *crtc;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return -EINVAL;
if (!req->flags) {
DRM_ERROR("no operation set... | 214,681,502,064,431,240,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,544 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_mode_destroy(struct drm_device *dev, struct drm_display_mode *mode)
{
drm_mode_object_put(dev, &mode->base);
kfree(mode);
}
| 290,564,382,752,673,500,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,545 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_destroy_dumb_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_destroy_dumb *args = data;
if (!dev->driver->dumb_destroy)
return -ENOSYS;
return dev->driver->dumb_destroy(file_priv, dev, args->handle);
}
| 266,876,299,366,559,870,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,546 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | static int drm_mode_detachmode(struct drm_device *dev,
struct drm_connector *connector,
struct drm_display_mode *mode)
{
int found = 0;
int ret = 0;
struct drm_display_mode *match_mode, *t;
list_for_each_entry_safe(match_mode, t, &connector->user_modes, head) {
if (drm_mode_equal(match_mode, ... | 244,513,181,231,285,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,547 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_detachmode_crtc(struct drm_device *dev, struct drm_display_mode *mode)
{
struct drm_connector *connector;
list_for_each_entry(connector, &dev->mode_config.connector_list, head) {
drm_mode_detachmode(dev, connector, mode);
}
return 0;
}
| 171,751,704,096,820,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,548 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_detachmode_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_object *obj;
struct drm_mode_mode_cmd *mode_cmd = data;
struct drm_connector *connector;
struct drm_display_mode mode;
struct drm_mode_modeinfo *umode = &mode_cmd->mode;
int ret = 0;
if (!drm... | 275,057,539,467,004,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,549 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_gamma_get_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_crtc_lut *crtc_lut = data;
struct drm_mode_object *obj;
struct drm_crtc *crtc;
void *r_base, *g_base, *b_base;
int size;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return ... | 205,048,992,211,958,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,550 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_gamma_set_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_crtc_lut *crtc_lut = data;
struct drm_mode_object *obj;
struct drm_crtc *crtc;
void *r_base, *g_base, *b_base;
int size;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return ... | 29,226,823,464,938,330,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,551 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_getcrtc(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_crtc *crtc_resp = data;
struct drm_crtc *crtc;
struct drm_mode_object *obj;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return -EINVAL;
mutex_lock(&dev->mode_config.mutex);
obj = ... | 339,356,732,859,613,440,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,552 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_getencoder(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct drm_mode_get_encoder *enc_resp = data;
struct drm_mode_object *obj;
struct drm_encoder *encoder;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return -EINVAL;
mutex_lock(&dev->mode_config.mutex... | 80,544,035,167,890,330,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,553 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_getfb(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_fb_cmd *r = data;
struct drm_mode_object *obj;
struct drm_framebuffer *fb;
int ret = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return -EINVAL;
mutex_lock(&dev->mode_config.mutex);
obj = drm_mo... | 212,107,852,240,825,920,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,554 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_getresources(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct drm_mode_card_res *card_res = data;
struct list_head *lh;
struct drm_framebuffer *fb;
struct drm_connector *connector;
struct drm_crtc *crtc;
struct drm_encoder *encoder;
int ret = 0;
int connector_count = 0;... | 199,199,877,757,860,650,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,555 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_group_init(struct drm_device *dev, struct drm_mode_group *group)
{
uint32_t total_objects = 0;
total_objects += dev->mode_config.num_crtc;
total_objects += dev->mode_config.num_connector;
total_objects += dev->mode_config.num_encoder;
group->id_list = kzalloc(total_objects * sizeof(uint32_t), GFP_KE... | 288,225,491,028,173,670,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,556 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_group_init_legacy_group(struct drm_device *dev,
struct drm_mode_group *group)
{
struct drm_crtc *crtc;
struct drm_encoder *encoder;
struct drm_connector *connector;
int ret;
if ((ret = drm_mode_group_init(dev, group)))
return ret;
list_for_each_entry(crtc, &dev->mode_config.crtc_list, he... | 102,711,515,791,693,930,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,557 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_mmap_dumb_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_map_dumb *args = data;
/* call driver ioctl to get mmap offset */
if (!dev->driver->dumb_map_offset)
return -ENOSYS;
return dev->driver->dumb_map_offset(file_priv, dev, args->handle, &args->off... | 335,635,778,243,171,220,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,558 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | struct drm_mode_object *drm_mode_object_find(struct drm_device *dev,
uint32_t id, uint32_t type)
{
struct drm_mode_object *obj = NULL;
mutex_lock(&dev->mode_config.idr_mutex);
obj = idr_find(&dev->mode_config.crtc_idr, id);
if (!obj || (obj->type != type) || (obj->id != id))
obj = NULL;
mutex_unlock(&dev->mod... | 269,282,569,671,506,080,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,559 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | static int drm_mode_object_get(struct drm_device *dev,
struct drm_mode_object *obj, uint32_t obj_type)
{
int new_id = 0;
int ret;
again:
if (idr_pre_get(&dev->mode_config.crtc_idr, GFP_KERNEL) == 0) {
DRM_ERROR("Ran out memory getting a mode number\n");
return -EINVAL;
}
mutex_lock(&dev->mode_confi... | 177,044,586,094,385,830,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,560 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_mode_remove(struct drm_connector *connector,
struct drm_display_mode *mode)
{
list_del(&mode->head);
kfree(mode);
}
| 232,347,566,916,091,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,561 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_rmfb(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_mode_object *obj;
struct drm_framebuffer *fb = NULL;
struct drm_framebuffer *fbl = NULL;
uint32_t *id = data;
int ret = 0;
int found = 0;
if (!drm_core_check_feature(dev, DRIVER_MODESET))
return -EINVAL;
mute... | 64,906,945,826,180,470,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,562 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_mode_setcrtc(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct drm_mode_config *config = &dev->mode_config;
struct drm_mode_crtc *crtc_req = data;
struct drm_mode_object *obj;
struct drm_crtc *crtc, *crtcfb;
struct drm_connector **connector_set = NULL, *connector;
struct drm_... | 60,844,215,312,155,275,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,563 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | int drm_property_add_enum(struct drm_property *property, int index,
uint64_t value, const char *name)
{
struct drm_property_enum *prop_enum;
if (!(property->flags & DRM_MODE_PROP_ENUM))
return -EINVAL;
if (!list_empty(&property->enum_blob_list)) {
list_for_each_entry(prop_enum, &property->enum_blob_list, ... | 137,845,558,647,021,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,564 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | struct drm_property *drm_property_create(struct drm_device *dev, int flags,
const char *name, int num_values)
{
struct drm_property *property = NULL;
property = kzalloc(sizeof(struct drm_property), GFP_KERNEL);
if (!property)
return NULL;
if (num_values) {
property->values = kzalloc(sizeof(uint64_t)*num... | 191,984,862,989,877,660,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,565 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | static struct drm_property_blob *drm_property_create_blob(struct drm_device *dev, int length,
void *data)
{
struct drm_property_blob *blob;
if (!length || !data)
return NULL;
blob = kzalloc(sizeof(struct drm_property_blob)+length, GFP_KERNEL);
if (!blob)
return NULL;
blob->data = (void *)((char *)b... | 135,106,409,739,923,030,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,566 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | void drm_property_destroy(struct drm_device *dev, struct drm_property *property)
{
struct drm_property_enum *prop_enum, *pt;
list_for_each_entry_safe(prop_enum, pt, &property->enum_blob_list, head) {
list_del(&prop_enum->head);
kfree(prop_enum);
}
if (property->num_values)
kfree(property->values);
drm_mode... | 267,920,284,260,735,500,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,567 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 0 | static void drm_property_destroy_blob(struct drm_device *dev,
struct drm_property_blob *blob)
{
drm_mode_object_put(dev, &blob->base);
list_del(&blob->head);
kfree(blob);
}
| 301,929,999,746,120,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
24,568 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | posix_acl_access_exists(struct inode *inode)
{
return xfs_acl_exists(inode, SGI_ACL_FILE);
}
| 1,538,813,589,392,893,700,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,569 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | posix_acl_default_exists(struct inode *inode)
{
if (!S_ISDIR(inode->i_mode))
return 0;
return xfs_acl_exists(inode, SGI_ACL_DEFAULT);
}
| 218,488,401,794,599,900,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,570 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_acl_exists(struct inode *inode, unsigned char *name)
{
int len = sizeof(struct xfs_acl);
return (xfs_attr_get(XFS_I(inode), name, NULL, &len,
ATTR_ROOT|ATTR_KERNOVAL) == 0);
}
| 63,643,639,242,800,110,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,571 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_acl_to_disk(struct xfs_acl *aclp, const struct posix_acl *acl)
{
const struct posix_acl_entry *acl_e;
struct xfs_acl_entry *ace;
int i;
aclp->acl_cnt = cpu_to_be32(acl->a_count);
for (i = 0; i < acl->a_count; i++) {
ace = &aclp->acl_entry[i];
acl_e = &acl->a_entries[i];
ace->ae_tag = cpu_to_be32(acl_e-... | 240,174,914,492,253,800,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,572 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_get_acl(struct inode *inode, int type)
{
struct xfs_inode *ip = XFS_I(inode);
struct posix_acl *acl;
struct xfs_acl *xfs_acl;
int len = sizeof(struct xfs_acl);
unsigned char *ea_name;
int error;
acl = get_cached_acl(inode, type);
if (acl != ACL_NOT_CACHED)
return acl;
trace_xfs_get_acl(ip);
switch (t... | 320,621,386,261,205,140,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,573 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_inherit_acl(struct inode *inode, struct posix_acl *acl)
{
umode_t mode = inode->i_mode;
int error = 0, inherit = 0;
if (S_ISDIR(inode->i_mode)) {
error = xfs_set_acl(inode, ACL_TYPE_DEFAULT, acl);
if (error)
goto out;
}
error = posix_acl_create(&acl, GFP_KERNEL, &mode);
if (error < 0)
return error;... | 250,316,823,218,260,080,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,574 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_set_acl(struct inode *inode, int type, struct posix_acl *acl)
{
struct xfs_inode *ip = XFS_I(inode);
unsigned char *ea_name;
int error;
if (S_ISLNK(inode->i_mode))
return -EOPNOTSUPP;
switch (type) {
case ACL_TYPE_ACCESS:
ea_name = SGI_ACL_FILE;
break;
case ACL_TYPE_DEFAULT:
if (!S_ISDIR(inode->i_m... | 328,275,609,558,196,130,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,575 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_set_mode(struct inode *inode, umode_t mode)
{
int error = 0;
if (mode != inode->i_mode) {
struct iattr iattr;
iattr.ia_valid = ATTR_MODE | ATTR_CTIME;
iattr.ia_mode = mode;
iattr.ia_ctime = current_fs_time(inode->i_sb);
error = -xfs_setattr_nonsize(XFS_I(inode), &iattr, XFS_ATTR_NOACL);
}
return e... | 155,963,150,757,121,410,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,576 | linux | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_xattr_acl_get(struct dentry *dentry, const char *name,
void *value, size_t size, int type)
{
struct posix_acl *acl;
int error;
acl = xfs_get_acl(dentry->d_inode, type);
if (IS_ERR(acl))
return PTR_ERR(acl);
if (acl == NULL)
return -ENODATA;
error = posix_acl_to_xattr(acl, value, size);
posix_acl_rele... | 144,628,906,901,178,930,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
24,849 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | void rose_clear_queues(struct sock *sk)
{
skb_queue_purge(&sk->sk_write_queue);
skb_queue_purge(&rose_sk(sk)->ack_queue);
}
| 296,198,560,995,380,180,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,850 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | static int rose_create_facilities(unsigned char *buffer, struct rose_sock *rose)
{
unsigned char *p = buffer + 1;
char *callsign;
char buf[11];
int len, nb;
/* National Facilities */
if (rose->rand != 0 || rose->source_ndigis == 1 || rose->dest_ndigis == 1) {
*p++ = 0x00;
*p++ = FAC_NATIONAL;
if (rose->ra... | 291,796,174,686,610,500,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,851 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | int rose_decode(struct sk_buff *skb, int *ns, int *nr, int *q, int *d, int *m)
{
unsigned char *frame;
frame = skb->data;
*ns = *nr = *q = *d = *m = 0;
switch (frame[2]) {
case ROSE_CALL_REQUEST:
case ROSE_CALL_ACCEPTED:
case ROSE_CLEAR_REQUEST:
case ROSE_CLEAR_CONFIRMATION:
case ROSE_RESET_REQUEST:
case R... | 317,179,684,802,397,880,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,852 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | void rose_disconnect(struct sock *sk, int reason, int cause, int diagnostic)
{
struct rose_sock *rose = rose_sk(sk);
rose_stop_timer(sk);
rose_stop_idletimer(sk);
rose_clear_queues(sk);
rose->lci = 0;
rose->state = ROSE_STATE_0;
if (cause != -1)
rose->cause = cause;
if (diagnostic != -1)
rose->diagno... | 109,078,306,543,154,280,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,853 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | void rose_frames_acked(struct sock *sk, unsigned short nr)
{
struct sk_buff *skb;
struct rose_sock *rose = rose_sk(sk);
/*
* Remove all the ack-ed frames from the ack queue.
*/
if (rose->va != nr) {
while (skb_peek(&rose->ack_queue) != NULL && rose->va != nr) {
skb = skb_dequeue(&rose->ack_queue);
kfre... | 199,334,974,847,375,770,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,854 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | void rose_requeue_frames(struct sock *sk)
{
struct sk_buff *skb, *skb_prev = NULL;
/*
* Requeue all the un-ack-ed frames on the output queue to be picked
* up by rose_kick. This arrangement handles the possibility of an
* empty output queue.
*/
while ((skb = skb_dequeue(&rose_sk(sk)->ack_queue)) != NULL) {
... | 307,102,706,706,022,960,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,855 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | int rose_validate_nr(struct sock *sk, unsigned short nr)
{
struct rose_sock *rose = rose_sk(sk);
unsigned short vc = rose->va;
while (vc != rose->vs) {
if (nr == vc) return 1;
vc = (vc + 1) % ROSE_MODULUS;
}
return nr == rose->vs;
}
| 165,647,608,211,926,740,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
24,856 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 0 | void rose_write_internal(struct sock *sk, int frametype)
{
struct rose_sock *rose = rose_sk(sk);
struct sk_buff *skb;
unsigned char *dptr;
unsigned char lci1, lci2;
char buffer[100];
int len, faclen = 0;
len = AX25_BPQ_HEADER_LEN + AX25_MAX_HEADER_LEN + ROSE_MIN_LEN + 1;
switch (frametype) {
case ROSE_CALL... | 260,093,434,041,714,200,000,000,000,000,000,000,000 | rose_subr.c | 266,690,705,642,630,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
25,231 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int can_go_on_limited_pmc(struct perf_event *event, u64 ev,
unsigned int flags)
{
int n;
u64 alt[MAX_EVENT_ALTERNATIVES];
if (event->attr.exclude_user
|| event->attr.exclude_kernel
|| event->attr.exclude_hv
|| event->attr.sample_period)
return 0;
if (ppmu->limited_pmc_event(ev))
ret... | 206,440,215,391,581,030,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,232 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int check_excludes(struct perf_event **ctrs, unsigned int cflags[],
int n_prev, int n_new)
{
int eu = 0, ek = 0, eh = 0;
int i, n, first;
struct perf_event *event;
n = n_prev + n_new;
if (n <= 1)
return 0;
first = 1;
for (i = 0; i < n; ++i) {
if (cflags[i] & PPMU_LIMITED_PMC_OK) {
cflags[i] ... | 98,881,216,484,065,100,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,233 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int collect_events(struct perf_event *group, int max_count,
struct perf_event *ctrs[], u64 *events,
unsigned int *flags)
{
int n = 0;
struct perf_event *event;
if (!is_software_event(group)) {
if (n >= max_count)
return -1;
ctrs[n] = group;
flags[n] = group->hw.event_base;
events[n++] = ... | 3,601,126,545,964,573,700,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,234 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void freeze_limited_counters(struct cpu_hw_events *cpuhw,
unsigned long pmc5, unsigned long pmc6)
{
struct perf_event *event;
u64 val, prev, delta;
int i;
for (i = 0; i < cpuhw->n_limited; ++i) {
event = cpuhw->limited_counter[i];
if (!event->hw.idx)
continue;
val = (event->hw.idx == 5) ? p... | 327,266,889,578,383,140,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,235 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int hw_perf_cache_event(u64 config, u64 *eventp)
{
unsigned long type, op, result;
int ev;
if (!ppmu->cache_events)
return -EINVAL;
/* unpack config */
type = config & 0xff;
op = (config >> 8) & 0xff;
result = (config >> 16) & 0xff;
if (type >= PERF_COUNT_HW_CACHE_MAX ||
op >= PERF_COUNT_HW_CAC... | 39,041,006,032,190,790,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,236 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int is_limited_pmc(int pmcnum)
{
return (ppmu->flags & PPMU_LIMITED_PMC5_6)
&& (pmcnum == 5 || pmcnum == 6);
}
| 28,384,729,335,552,164,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,237 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static u64 normal_pmc_alternative(u64 ev, unsigned long flags)
{
u64 alt[MAX_EVENT_ALTERNATIVES];
int n;
flags &= ~(PPMU_LIMITED_PMC_OK | PPMU_LIMITED_PMC_REQD);
n = ppmu->get_alternatives(ev, flags, alt);
if (!n)
return 0;
return alt[0];
}
| 317,667,266,658,855,860,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,238 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | void perf_event_print_debug(void)
{
}
| 117,108,324,710,781,600,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,239 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline void perf_get_data_addr(struct pt_regs *regs, u64 *addrp) { }
| 77,678,159,539,985,580,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,240 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline void perf_get_data_addr(struct pt_regs *regs, u64 *addrp)
{
unsigned long mmcra = regs->dsisr;
unsigned long sdsync = (ppmu->flags & PPMU_ALT_SIPR) ?
POWER6_MMCRA_SDSYNC : MMCRA_SDSYNC;
if (!(mmcra & MMCRA_SAMPLE_ENABLE) || (mmcra & sdsync))
*addrp = mfspr(SPRN_SDAR);
}
| 335,285,494,442,134,560,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,241 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline u32 perf_get_misc_flags(struct pt_regs *regs)
{
unsigned long mmcra = regs->dsisr;
unsigned long sihv = MMCRA_SIHV;
unsigned long sipr = MMCRA_SIPR;
if (TRAP(regs) != 0xf00)
return 0; /* not a PMU interrupt */
if (ppmu->flags & PPMU_ALT_SIPR) {
sihv = POWER6_MMCRA_SIHV;
sipr = POWER6_MMCRA_SI... | 196,195,344,618,499,700,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,242 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | unsigned long perf_instruction_pointer(struct pt_regs *regs)
{
unsigned long ip;
if (TRAP(regs) != 0xf00)
return regs->nip; /* not a PMU interrupt */
ip = mfspr(SPRN_SIAR) + perf_ip_adjust(regs);
return ip;
}
| 53,671,323,991,026,880,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,243 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline int perf_intr_is_nmi(struct pt_regs *regs)
{
return 0;
}
| 70,910,130,826,296,210,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,244 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline int perf_intr_is_nmi(struct pt_regs *regs)
{
return !regs->softe;
}
| 186,861,314,881,797,150,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,245 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline unsigned long perf_ip_adjust(struct pt_regs *regs)
{
return 0;
}
| 86,297,166,719,438,900,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,246 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline unsigned long perf_ip_adjust(struct pt_regs *regs)
{
unsigned long mmcra = regs->dsisr;
if ((mmcra & MMCRA_SAMPLE_ENABLE) && !(ppmu->flags & PPMU_ALT_SIPR)) {
unsigned long slot = (mmcra & MMCRA_SLOT) >> MMCRA_SLOT_SHIFT;
if (slot > 1)
return 4 * (slot - 1);
}
return 0;
}
| 334,699,009,846,189,920,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,247 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | unsigned long perf_misc_flags(struct pt_regs *regs)
{
u32 flags = perf_get_misc_flags(regs);
if (flags)
return flags;
return user_mode(regs) ? PERF_RECORD_MISC_USER :
PERF_RECORD_MISC_KERNEL;
}
| 269,389,756,437,544,550,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.