idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
24,378
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static struct kioctx *lookup_ioctx(unsigned long ctx_id) { struct mm_struct *mm = current->mm; struct kioctx *ctx, *ret = NULL; struct hlist_node *n; rcu_read_lock(); hlist_for_each_entry_rcu(ctx, n, &mm->ioctx_list, list) { /* * RCU protects us against accessing freed memory but * we have to be careful ...
43,386,319,629,748,410,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,379
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static struct kiocb *lookup_kiocb(struct kioctx *ctx, struct iocb __user *iocb, u32 key) { struct list_head *pos; assert_spin_locked(&ctx->ctx_lock); /* TODO: use a hash or array, this sucks. */ list_for_each(pos, &ctx->active_reqs) { struct kiocb *kiocb = list_kiocb(pos); if (kiocb->ki_obj.user == iocb...
211,081,525,140,549,440,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,380
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static int read_events(struct kioctx *ctx, long min_nr, long nr, struct io_event __user *event, struct timespec __user *timeout) { long start_jiffies = jiffies; struct task_struct *tsk = current; DECLARE_WAITQUEUE(wait, tsk); int ret; int i = 0; struct io_event ent; struct aio_timeout to; int ...
34,335,356,747,161,390,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,381
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static inline void really_put_req(struct kioctx *ctx, struct kiocb *req) { assert_spin_locked(&ctx->ctx_lock); if (req->ki_eventfd != NULL) eventfd_ctx_put(req->ki_eventfd); if (req->ki_dtor) req->ki_dtor(req); if (req->ki_iovec != &req->ki_inline_vec) kfree(req->ki_iovec); kmem_cache_free(kiocb_cachep, req...
298,733,657,661,943,440,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,382
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static inline int try_get_ioctx(struct kioctx *kioctx) { return atomic_inc_not_zero(&kioctx->users); }
106,815,533,728,703,270,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,383
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static void try_queue_kicked_iocb(struct kiocb *iocb) { struct kioctx *ctx = iocb->ki_ctx; unsigned long flags; int run = 0; spin_lock_irqsave(&ctx->ctx_lock, flags); /* set this inside the lock so that we can't race with aio_run_iocb() * testing it and putting the iocb on the run list under the lock */ if (!...
148,297,116,240,550,210,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,384
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
static void wait_for_all_aios(struct kioctx *ctx) { struct task_struct *tsk = current; DECLARE_WAITQUEUE(wait, tsk); spin_lock_irq(&ctx->ctx_lock); if (!ctx->reqs_active) goto out; add_wait_queue(&ctx->wait, &wait); set_task_state(tsk, TASK_UNINTERRUPTIBLE); while (ctx->reqs_active) { spin_unlock_irq(&ctx-...
99,575,976,824,019,600,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,385
linux
802f43594d6e4d2ac61086d239153c17873a0428
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428
None
0
ssize_t wait_on_sync_kiocb(struct kiocb *iocb) { while (iocb->ki_users) { set_current_state(TASK_UNINTERRUPTIBLE); if (!iocb->ki_users) break; io_schedule(); } __set_current_state(TASK_RUNNING); return iocb->ki_user_data; }
135,631,634,469,541,200,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-0058
The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
https://nvd.nist.gov/vuln/detail/CVE-2012-0058
24,510
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_connector_attach_property(struct drm_connector *connector, struct drm_property *property, uint64_t init_val) { int i; for (i = 0; i < DRM_CONNECTOR_MAX_PROPERTY; i++) { if (connector->property_ids[i] == 0) { connector->property_ids[i] = property->base.id; connector->property_values[i] = ini...
53,303,393,481,044,010,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,511
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_connector_cleanup(struct drm_connector *connector) { struct drm_device *dev = connector->dev; struct drm_display_mode *mode, *t; list_for_each_entry_safe(mode, t, &connector->probed_modes, head) drm_mode_remove(connector, mode); list_for_each_entry_safe(mode, t, &connector->modes, head) drm_mode_remo...
193,723,113,599,804,700,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,512
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_connector_init(struct drm_device *dev, struct drm_connector *connector, const struct drm_connector_funcs *funcs, int connector_type) { mutex_lock(&dev->mode_config.mutex); connector->dev = dev; connector->funcs = funcs; drm_mode_object_get(dev, &connector->base, DRM_MODE_OBJECT_CONNEC...
267,010,047,958,932,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,513
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_connector_property_get_value(struct drm_connector *connector, struct drm_property *property, uint64_t *val) { int i; for (i = 0; i < DRM_CONNECTOR_MAX_PROPERTY; i++) { if (connector->property_ids[i] == property->base.id) { *val = connector->property_values[i]; break; } } if (i == DRM_CONNE...
286,104,767,317,756,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,514
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_connector_property_set_value(struct drm_connector *connector, struct drm_property *property, uint64_t value) { int i; for (i = 0; i < DRM_CONNECTOR_MAX_PROPERTY; i++) { if (connector->property_ids[i] == property->base.id) { connector->property_values[i] = value; break; } } if (i == DRM_CON...
157,251,239,535,118,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,515
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_crtc_cleanup(struct drm_crtc *crtc) { struct drm_device *dev = crtc->dev; if (crtc->gamma_store) { kfree(crtc->gamma_store); crtc->gamma_store = NULL; } drm_mode_object_put(dev, &crtc->base); list_del(&crtc->head); dev->mode_config.num_crtc--; }
25,214,318,551,190,187,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,516
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_crtc_convert_to_umode(struct drm_mode_modeinfo *out, struct drm_display_mode *in) { out->clock = in->clock; out->hdisplay = in->hdisplay; out->hsync_start = in->hsync_start; out->hsync_end = in->hsync_end; out->htotal = in->htotal; out->hskew = in->hskew; out->vdisplay = in->vdisplay; out->vs...
56,300,050,269,051,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,517
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_crtc_convert_umode(struct drm_display_mode *out, struct drm_mode_modeinfo *in) { out->clock = in->clock; out->hdisplay = in->hdisplay; out->hsync_start = in->hsync_start; out->hsync_end = in->hsync_end; out->htotal = in->htotal; out->hskew = in->hskew; out->vdisplay = in->vdisplay; out->vsync_st...
244,388,706,776,732,640,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,518
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_crtc_init(struct drm_device *dev, struct drm_crtc *crtc, const struct drm_crtc_funcs *funcs) { crtc->dev = dev; crtc->funcs = funcs; mutex_lock(&dev->mode_config.mutex); drm_mode_object_get(dev, &crtc->base, DRM_MODE_OBJECT_CRTC); list_add_tail(&crtc->head, &dev->mode_config.crtc_list); dev->mode_...
71,565,063,918,510,690,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,519
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_encoder_cleanup(struct drm_encoder *encoder) { struct drm_device *dev = encoder->dev; mutex_lock(&dev->mode_config.mutex); drm_mode_object_put(dev, &encoder->base); list_del(&encoder->head); dev->mode_config.num_encoder--; mutex_unlock(&dev->mode_config.mutex); }
56,837,714,151,943,730,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,520
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_encoder_init(struct drm_device *dev, struct drm_encoder *encoder, const struct drm_encoder_funcs *funcs, int encoder_type) { mutex_lock(&dev->mode_config.mutex); encoder->dev = dev; drm_mode_object_get(dev, &encoder->base, DRM_MODE_OBJECT_ENCODER); encoder->encoder_type = encoder_...
61,195,735,455,842,220,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,521
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_fb_release(struct drm_file *priv) { struct drm_device *dev = priv->minor->dev; struct drm_framebuffer *fb, *tfb; mutex_lock(&dev->mode_config.mutex); list_for_each_entry_safe(fb, tfb, &priv->fbs, filp_head) { list_del(&fb->filp_head); fb->funcs->destroy(fb); } mutex_unlock(&dev->mode_config.mutex); ...
47,750,528,289,179,820,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,522
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_framebuffer_cleanup(struct drm_framebuffer *fb) { struct drm_device *dev = fb->dev; struct drm_crtc *crtc; struct drm_mode_set set; int ret; /* remove from any CRTC */ list_for_each_entry(crtc, &dev->mode_config.crtc_list, head) { if (crtc->fb == fb) { /* should turn off the crtc */ memset(&set,...
13,960,374,498,779,470,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,523
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_framebuffer_init(struct drm_device *dev, struct drm_framebuffer *fb, const struct drm_framebuffer_funcs *funcs) { int ret; ret = drm_mode_object_get(dev, &fb->base, DRM_MODE_OBJECT_FB); if (ret) { return ret; } fb->dev = dev; fb->funcs = funcs; dev->mode_config.num_fb++; list_add(&fb->head, &dev...
140,908,843,211,300,650,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,524
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
char *drm_get_connector_name(struct drm_connector *connector) { static char buf[32]; snprintf(buf, 32, "%s-%d", drm_connector_enum_list[connector->connector_type].name, connector->connector_type_id); return buf; }
305,417,048,405,390,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,525
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
char *drm_get_encoder_name(struct drm_encoder *encoder) { static char buf[32]; snprintf(buf, 32, "%s-%d", drm_encoder_enum_list[encoder->encoder_type].name, encoder->base.id); return buf; }
60,686,064,719,239,750,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,526
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_addfb(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_fb_cmd *r = data; struct drm_mode_config *config = &dev->mode_config; struct drm_framebuffer *fb; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return -EINVAL; if ((config->min_width > r-...
176,749,032,854,315,460,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,527
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
static int drm_mode_attachmode(struct drm_device *dev, struct drm_connector *connector, struct drm_display_mode *mode) { int ret = 0; list_add_tail(&mode->head, &connector->user_modes); return ret; }
263,266,340,516,552,060,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,528
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_attachmode_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_mode_cmd *mode_cmd = data; struct drm_connector *connector; struct drm_display_mode *mode; struct drm_mode_object *obj; struct drm_mode_modeinfo *umode = &mode_cmd->mode; int ret = 0; if (!dr...
191,997,543,229,155,680,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,529
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_mode_config_init(struct drm_device *dev) { mutex_init(&dev->mode_config.mutex); mutex_init(&dev->mode_config.idr_mutex); INIT_LIST_HEAD(&dev->mode_config.fb_list); INIT_LIST_HEAD(&dev->mode_config.crtc_list); INIT_LIST_HEAD(&dev->mode_config.connector_list); INIT_LIST_HEAD(&dev->mode_config.encoder_list)...
227,021,826,107,683,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,530
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_mode_config_reset(struct drm_device *dev) { struct drm_crtc *crtc; struct drm_encoder *encoder; struct drm_connector *connector; list_for_each_entry(crtc, &dev->mode_config.crtc_list, head) if (crtc->funcs->reset) crtc->funcs->reset(crtc); list_for_each_entry(encoder, &dev->mode_config.encoder_list...
62,348,482,515,515,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,531
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_connector_attach_encoder(struct drm_connector *connector, struct drm_encoder *encoder) { int i; for (i = 0; i < DRM_CONNECTOR_MAX_ENCODER; i++) { if (connector->encoder_ids[i] == 0) { connector->encoder_ids[i] = encoder->base.id; return 0; } } return -ENOMEM; }
3,327,599,453,176,575,600,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,532
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_mode_connector_detach_encoder(struct drm_connector *connector, struct drm_encoder *encoder) { int i; for (i = 0; i < DRM_CONNECTOR_MAX_ENCODER; i++) { if (connector->encoder_ids[i] == encoder->base.id) { connector->encoder_ids[i] = 0; if (connector->encoder == encoder) connector->encoder ...
307,303,739,104,164,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,533
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_connector_property_set_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_connector_set_property *out_resp = data; struct drm_mode_object *obj; struct drm_property *property; struct drm_connector *connector; int ret = -EINVAL; int i; if (!drm_core_che...
162,201,440,391,071,960,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,534
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_connector_update_edid_property(struct drm_connector *connector, struct edid *edid) { struct drm_device *dev = connector->dev; int ret = 0, size; if (connector->edid_blob_ptr) drm_property_destroy_blob(dev, connector->edid_blob_ptr); /* Delete edid, when there is none. */ if (!edid) { co...
273,177,416,331,673,660,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,535
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_create_dirty_info_property(struct drm_device *dev) { struct drm_property *dirty_info; int i; if (dev->mode_config.dirty_info_property) return 0; dirty_info = drm_property_create(dev, DRM_MODE_PROP_ENUM | DRM_MODE_PROP_IMMUTABLE, "dirty", ARRAY_SIZE(drm_dirty_info_enum_list...
325,610,325,156,302,870,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,536
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_create_dithering_property(struct drm_device *dev) { struct drm_property *dithering_mode; int i; if (dev->mode_config.dithering_mode_property) return 0; dithering_mode = drm_property_create(dev, DRM_MODE_PROP_ENUM, "dithering", ARRAY_SIZE(drm_dithering_mode_enum_list)); for (i = 0; i < AR...
34,929,667,112,170,075,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,537
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_create_dumb_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_create_dumb *args = data; if (!dev->driver->dumb_create) return -ENOSYS; return dev->driver->dumb_create(file_priv, dev, args); }
328,344,642,726,818,580,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,538
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_create_dvi_i_properties(struct drm_device *dev) { struct drm_property *dvi_i_selector; struct drm_property *dvi_i_subconnector; int i; if (dev->mode_config.dvi_i_select_subconnector_property) return 0; dvi_i_selector = drm_property_create(dev, DRM_MODE_PROP_ENUM, "select subconnector", ...
179,120,184,071,952,780,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,539
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_create_scaling_mode_property(struct drm_device *dev) { struct drm_property *scaling_mode; int i; if (dev->mode_config.scaling_mode_property) return 0; scaling_mode = drm_property_create(dev, DRM_MODE_PROP_ENUM, "scaling mode", ARRAY_SIZE(drm_scaling_mode_enum_list)); for (i = 0; i < ARRA...
38,330,449,708,094,703,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,540
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
static int drm_mode_create_standard_connector_properties(struct drm_device *dev) { struct drm_property *edid; struct drm_property *dpms; int i; /* * Standard properties (apply to all connectors) */ edid = drm_property_create(dev, DRM_MODE_PROP_BLOB | DRM_MODE_PROP_IMMUTABLE, "EDID", 0); dev->mo...
58,615,870,154,394,890,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,541
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_create_tv_properties(struct drm_device *dev, int num_modes, char *modes[]) { struct drm_property *tv_selector; struct drm_property *tv_subconnector; int i; if (dev->mode_config.tv_select_subconnector_property) return 0; /* * Basic connector properties */ tv_selector = drm_property_creat...
147,839,542,089,561,760,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,542
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
bool drm_mode_crtc_set_gamma_size(struct drm_crtc *crtc, int gamma_size) { crtc->gamma_size = gamma_size; crtc->gamma_store = kzalloc(gamma_size * sizeof(uint16_t) * 3, GFP_KERNEL); if (!crtc->gamma_store) { crtc->gamma_size = 0; return false; } return true; }
335,080,238,921,491,630,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,543
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_cursor_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_cursor *req = data; struct drm_mode_object *obj; struct drm_crtc *crtc; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return -EINVAL; if (!req->flags) { DRM_ERROR("no operation set...
214,681,502,064,431,240,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,544
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_mode_destroy(struct drm_device *dev, struct drm_display_mode *mode) { drm_mode_object_put(dev, &mode->base); kfree(mode); }
290,564,382,752,673,500,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,545
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_destroy_dumb_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_destroy_dumb *args = data; if (!dev->driver->dumb_destroy) return -ENOSYS; return dev->driver->dumb_destroy(file_priv, dev, args->handle); }
266,876,299,366,559,870,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,546
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
static int drm_mode_detachmode(struct drm_device *dev, struct drm_connector *connector, struct drm_display_mode *mode) { int found = 0; int ret = 0; struct drm_display_mode *match_mode, *t; list_for_each_entry_safe(match_mode, t, &connector->user_modes, head) { if (drm_mode_equal(match_mode, ...
244,513,181,231,285,360,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,547
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_detachmode_crtc(struct drm_device *dev, struct drm_display_mode *mode) { struct drm_connector *connector; list_for_each_entry(connector, &dev->mode_config.connector_list, head) { drm_mode_detachmode(dev, connector, mode); } return 0; }
171,751,704,096,820,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,548
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_detachmode_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_object *obj; struct drm_mode_mode_cmd *mode_cmd = data; struct drm_connector *connector; struct drm_display_mode mode; struct drm_mode_modeinfo *umode = &mode_cmd->mode; int ret = 0; if (!drm...
275,057,539,467,004,360,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,549
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_gamma_get_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_crtc_lut *crtc_lut = data; struct drm_mode_object *obj; struct drm_crtc *crtc; void *r_base, *g_base, *b_base; int size; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return ...
205,048,992,211,958,700,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,550
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_gamma_set_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_crtc_lut *crtc_lut = data; struct drm_mode_object *obj; struct drm_crtc *crtc; void *r_base, *g_base, *b_base; int size; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return ...
29,226,823,464,938,330,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,551
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_getcrtc(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_crtc *crtc_resp = data; struct drm_crtc *crtc; struct drm_mode_object *obj; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return -EINVAL; mutex_lock(&dev->mode_config.mutex); obj = ...
339,356,732,859,613,440,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,552
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_getencoder(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_get_encoder *enc_resp = data; struct drm_mode_object *obj; struct drm_encoder *encoder; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return -EINVAL; mutex_lock(&dev->mode_config.mutex...
80,544,035,167,890,330,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,553
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_getfb(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_fb_cmd *r = data; struct drm_mode_object *obj; struct drm_framebuffer *fb; int ret = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return -EINVAL; mutex_lock(&dev->mode_config.mutex); obj = drm_mo...
212,107,852,240,825,920,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,554
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_getresources(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_card_res *card_res = data; struct list_head *lh; struct drm_framebuffer *fb; struct drm_connector *connector; struct drm_crtc *crtc; struct drm_encoder *encoder; int ret = 0; int connector_count = 0;...
199,199,877,757,860,650,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,555
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_group_init(struct drm_device *dev, struct drm_mode_group *group) { uint32_t total_objects = 0; total_objects += dev->mode_config.num_crtc; total_objects += dev->mode_config.num_connector; total_objects += dev->mode_config.num_encoder; group->id_list = kzalloc(total_objects * sizeof(uint32_t), GFP_KE...
288,225,491,028,173,670,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,556
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_group_init_legacy_group(struct drm_device *dev, struct drm_mode_group *group) { struct drm_crtc *crtc; struct drm_encoder *encoder; struct drm_connector *connector; int ret; if ((ret = drm_mode_group_init(dev, group))) return ret; list_for_each_entry(crtc, &dev->mode_config.crtc_list, he...
102,711,515,791,693,930,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,557
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_mmap_dumb_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_map_dumb *args = data; /* call driver ioctl to get mmap offset */ if (!dev->driver->dumb_map_offset) return -ENOSYS; return dev->driver->dumb_map_offset(file_priv, dev, args->handle, &args->off...
335,635,778,243,171,220,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,558
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
struct drm_mode_object *drm_mode_object_find(struct drm_device *dev, uint32_t id, uint32_t type) { struct drm_mode_object *obj = NULL; mutex_lock(&dev->mode_config.idr_mutex); obj = idr_find(&dev->mode_config.crtc_idr, id); if (!obj || (obj->type != type) || (obj->id != id)) obj = NULL; mutex_unlock(&dev->mod...
269,282,569,671,506,080,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,559
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
static int drm_mode_object_get(struct drm_device *dev, struct drm_mode_object *obj, uint32_t obj_type) { int new_id = 0; int ret; again: if (idr_pre_get(&dev->mode_config.crtc_idr, GFP_KERNEL) == 0) { DRM_ERROR("Ran out memory getting a mode number\n"); return -EINVAL; } mutex_lock(&dev->mode_confi...
177,044,586,094,385,830,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,560
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_mode_remove(struct drm_connector *connector, struct drm_display_mode *mode) { list_del(&mode->head); kfree(mode); }
232,347,566,916,091,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,561
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_rmfb(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_object *obj; struct drm_framebuffer *fb = NULL; struct drm_framebuffer *fbl = NULL; uint32_t *id = data; int ret = 0; int found = 0; if (!drm_core_check_feature(dev, DRIVER_MODESET)) return -EINVAL; mute...
64,906,945,826,180,470,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,562
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_mode_setcrtc(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct drm_mode_config *config = &dev->mode_config; struct drm_mode_crtc *crtc_req = data; struct drm_mode_object *obj; struct drm_crtc *crtc, *crtcfb; struct drm_connector **connector_set = NULL, *connector; struct drm_...
60,844,215,312,155,275,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,563
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
int drm_property_add_enum(struct drm_property *property, int index, uint64_t value, const char *name) { struct drm_property_enum *prop_enum; if (!(property->flags & DRM_MODE_PROP_ENUM)) return -EINVAL; if (!list_empty(&property->enum_blob_list)) { list_for_each_entry(prop_enum, &property->enum_blob_list, ...
137,845,558,647,021,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,564
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
struct drm_property *drm_property_create(struct drm_device *dev, int flags, const char *name, int num_values) { struct drm_property *property = NULL; property = kzalloc(sizeof(struct drm_property), GFP_KERNEL); if (!property) return NULL; if (num_values) { property->values = kzalloc(sizeof(uint64_t)*num...
191,984,862,989,877,660,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,565
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
static struct drm_property_blob *drm_property_create_blob(struct drm_device *dev, int length, void *data) { struct drm_property_blob *blob; if (!length || !data) return NULL; blob = kzalloc(sizeof(struct drm_property_blob)+length, GFP_KERNEL); if (!blob) return NULL; blob->data = (void *)((char *)b...
135,106,409,739,923,030,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,566
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
void drm_property_destroy(struct drm_device *dev, struct drm_property *property) { struct drm_property_enum *prop_enum, *pt; list_for_each_entry_safe(prop_enum, pt, &property->enum_blob_list, head) { list_del(&prop_enum->head); kfree(prop_enum); } if (property->num_values) kfree(property->values); drm_mode...
267,920,284,260,735,500,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,567
linux
a5cd335165e31db9dbab636fd29895d41da55dd2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
0
static void drm_property_destroy_blob(struct drm_device *dev, struct drm_property_blob *blob) { drm_mode_object_put(dev, &blob->base); list_del(&blob->head); kfree(blob); }
301,929,999,746,120,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-0044
Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-0044
24,568
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
posix_acl_access_exists(struct inode *inode) { return xfs_acl_exists(inode, SGI_ACL_FILE); }
1,538,813,589,392,893,700,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,569
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
posix_acl_default_exists(struct inode *inode) { if (!S_ISDIR(inode->i_mode)) return 0; return xfs_acl_exists(inode, SGI_ACL_DEFAULT); }
218,488,401,794,599,900,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,570
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_acl_exists(struct inode *inode, unsigned char *name) { int len = sizeof(struct xfs_acl); return (xfs_attr_get(XFS_I(inode), name, NULL, &len, ATTR_ROOT|ATTR_KERNOVAL) == 0); }
63,643,639,242,800,110,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,571
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_acl_to_disk(struct xfs_acl *aclp, const struct posix_acl *acl) { const struct posix_acl_entry *acl_e; struct xfs_acl_entry *ace; int i; aclp->acl_cnt = cpu_to_be32(acl->a_count); for (i = 0; i < acl->a_count; i++) { ace = &aclp->acl_entry[i]; acl_e = &acl->a_entries[i]; ace->ae_tag = cpu_to_be32(acl_e-...
240,174,914,492,253,800,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,572
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_get_acl(struct inode *inode, int type) { struct xfs_inode *ip = XFS_I(inode); struct posix_acl *acl; struct xfs_acl *xfs_acl; int len = sizeof(struct xfs_acl); unsigned char *ea_name; int error; acl = get_cached_acl(inode, type); if (acl != ACL_NOT_CACHED) return acl; trace_xfs_get_acl(ip); switch (t...
320,621,386,261,205,140,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,573
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_inherit_acl(struct inode *inode, struct posix_acl *acl) { umode_t mode = inode->i_mode; int error = 0, inherit = 0; if (S_ISDIR(inode->i_mode)) { error = xfs_set_acl(inode, ACL_TYPE_DEFAULT, acl); if (error) goto out; } error = posix_acl_create(&acl, GFP_KERNEL, &mode); if (error < 0) return error;...
250,316,823,218,260,080,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,574
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_set_acl(struct inode *inode, int type, struct posix_acl *acl) { struct xfs_inode *ip = XFS_I(inode); unsigned char *ea_name; int error; if (S_ISLNK(inode->i_mode)) return -EOPNOTSUPP; switch (type) { case ACL_TYPE_ACCESS: ea_name = SGI_ACL_FILE; break; case ACL_TYPE_DEFAULT: if (!S_ISDIR(inode->i_m...
328,275,609,558,196,130,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,575
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_set_mode(struct inode *inode, umode_t mode) { int error = 0; if (mode != inode->i_mode) { struct iattr iattr; iattr.ia_valid = ATTR_MODE | ATTR_CTIME; iattr.ia_mode = mode; iattr.ia_ctime = current_fs_time(inode->i_sb); error = -xfs_setattr_nonsize(XFS_I(inode), &iattr, XFS_ATTR_NOACL); } return e...
155,963,150,757,121,410,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,576
linux
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
0
xfs_xattr_acl_get(struct dentry *dentry, const char *name, void *value, size_t size, int type) { struct posix_acl *acl; int error; acl = xfs_get_acl(dentry->d_inode, type); if (IS_ERR(acl)) return PTR_ERR(acl); if (acl == NULL) return -ENODATA; error = posix_acl_to_xattr(acl, value, size); posix_acl_rele...
144,628,906,901,178,930,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
24,849
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
void rose_clear_queues(struct sock *sk) { skb_queue_purge(&sk->sk_write_queue); skb_queue_purge(&rose_sk(sk)->ack_queue); }
296,198,560,995,380,180,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,850
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
static int rose_create_facilities(unsigned char *buffer, struct rose_sock *rose) { unsigned char *p = buffer + 1; char *callsign; char buf[11]; int len, nb; /* National Facilities */ if (rose->rand != 0 || rose->source_ndigis == 1 || rose->dest_ndigis == 1) { *p++ = 0x00; *p++ = FAC_NATIONAL; if (rose->ra...
291,796,174,686,610,500,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,851
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
int rose_decode(struct sk_buff *skb, int *ns, int *nr, int *q, int *d, int *m) { unsigned char *frame; frame = skb->data; *ns = *nr = *q = *d = *m = 0; switch (frame[2]) { case ROSE_CALL_REQUEST: case ROSE_CALL_ACCEPTED: case ROSE_CLEAR_REQUEST: case ROSE_CLEAR_CONFIRMATION: case ROSE_RESET_REQUEST: case R...
317,179,684,802,397,880,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,852
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
void rose_disconnect(struct sock *sk, int reason, int cause, int diagnostic) { struct rose_sock *rose = rose_sk(sk); rose_stop_timer(sk); rose_stop_idletimer(sk); rose_clear_queues(sk); rose->lci = 0; rose->state = ROSE_STATE_0; if (cause != -1) rose->cause = cause; if (diagnostic != -1) rose->diagno...
109,078,306,543,154,280,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,853
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
void rose_frames_acked(struct sock *sk, unsigned short nr) { struct sk_buff *skb; struct rose_sock *rose = rose_sk(sk); /* * Remove all the ack-ed frames from the ack queue. */ if (rose->va != nr) { while (skb_peek(&rose->ack_queue) != NULL && rose->va != nr) { skb = skb_dequeue(&rose->ack_queue); kfre...
199,334,974,847,375,770,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,854
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
void rose_requeue_frames(struct sock *sk) { struct sk_buff *skb, *skb_prev = NULL; /* * Requeue all the un-ack-ed frames on the output queue to be picked * up by rose_kick. This arrangement handles the possibility of an * empty output queue. */ while ((skb = skb_dequeue(&rose_sk(sk)->ack_queue)) != NULL) { ...
307,102,706,706,022,960,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,855
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
int rose_validate_nr(struct sock *sk, unsigned short nr) { struct rose_sock *rose = rose_sk(sk); unsigned short vc = rose->va; while (vc != rose->vs) { if (nr == vc) return 1; vc = (vc + 1) % ROSE_MODULUS; } return nr == rose->vs; }
165,647,608,211,926,740,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
24,856
linux
be20250c13f88375345ad99950190685eda51eb8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
0
void rose_write_internal(struct sock *sk, int frametype) { struct rose_sock *rose = rose_sk(sk); struct sk_buff *skb; unsigned char *dptr; unsigned char lci1, lci2; char buffer[100]; int len, faclen = 0; len = AX25_BPQ_HEADER_LEN + AX25_MAX_HEADER_LEN + ROSE_MIN_LEN + 1; switch (frametype) { case ROSE_CALL...
260,093,434,041,714,200,000,000,000,000,000,000,000
rose_subr.c
266,690,705,642,630,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4913
The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ...
https://nvd.nist.gov/vuln/detail/CVE-2011-4913
25,231
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static int can_go_on_limited_pmc(struct perf_event *event, u64 ev, unsigned int flags) { int n; u64 alt[MAX_EVENT_ALTERNATIVES]; if (event->attr.exclude_user || event->attr.exclude_kernel || event->attr.exclude_hv || event->attr.sample_period) return 0; if (ppmu->limited_pmc_event(ev)) ret...
206,440,215,391,581,030,000,000,000,000,000,000,000
core-book3s.c
10,648,462,065,209,884,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,232
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static int check_excludes(struct perf_event **ctrs, unsigned int cflags[], int n_prev, int n_new) { int eu = 0, ek = 0, eh = 0; int i, n, first; struct perf_event *event; n = n_prev + n_new; if (n <= 1) return 0; first = 1; for (i = 0; i < n; ++i) { if (cflags[i] & PPMU_LIMITED_PMC_OK) { cflags[i] ...
98,881,216,484,065,100,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,233
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static int collect_events(struct perf_event *group, int max_count, struct perf_event *ctrs[], u64 *events, unsigned int *flags) { int n = 0; struct perf_event *event; if (!is_software_event(group)) { if (n >= max_count) return -1; ctrs[n] = group; flags[n] = group->hw.event_base; events[n++] = ...
3,601,126,545,964,573,700,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,234
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static void freeze_limited_counters(struct cpu_hw_events *cpuhw, unsigned long pmc5, unsigned long pmc6) { struct perf_event *event; u64 val, prev, delta; int i; for (i = 0; i < cpuhw->n_limited; ++i) { event = cpuhw->limited_counter[i]; if (!event->hw.idx) continue; val = (event->hw.idx == 5) ? p...
327,266,889,578,383,140,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,235
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static int hw_perf_cache_event(u64 config, u64 *eventp) { unsigned long type, op, result; int ev; if (!ppmu->cache_events) return -EINVAL; /* unpack config */ type = config & 0xff; op = (config >> 8) & 0xff; result = (config >> 16) & 0xff; if (type >= PERF_COUNT_HW_CACHE_MAX || op >= PERF_COUNT_HW_CAC...
39,041,006,032,190,790,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,236
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static int is_limited_pmc(int pmcnum) { return (ppmu->flags & PPMU_LIMITED_PMC5_6) && (pmcnum == 5 || pmcnum == 6); }
28,384,729,335,552,164,000,000,000,000,000,000,000
core-book3s.c
10,648,462,065,209,884,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,237
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static u64 normal_pmc_alternative(u64 ev, unsigned long flags) { u64 alt[MAX_EVENT_ALTERNATIVES]; int n; flags &= ~(PPMU_LIMITED_PMC_OK | PPMU_LIMITED_PMC_REQD); n = ppmu->get_alternatives(ev, flags, alt); if (!n) return 0; return alt[0]; }
317,667,266,658,855,860,000,000,000,000,000,000,000
core-book3s.c
10,648,462,065,209,884,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,238
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
void perf_event_print_debug(void) { }
117,108,324,710,781,600,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,239
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline void perf_get_data_addr(struct pt_regs *regs, u64 *addrp) { }
77,678,159,539,985,580,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,240
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline void perf_get_data_addr(struct pt_regs *regs, u64 *addrp) { unsigned long mmcra = regs->dsisr; unsigned long sdsync = (ppmu->flags & PPMU_ALT_SIPR) ? POWER6_MMCRA_SDSYNC : MMCRA_SDSYNC; if (!(mmcra & MMCRA_SAMPLE_ENABLE) || (mmcra & sdsync)) *addrp = mfspr(SPRN_SDAR); }
335,285,494,442,134,560,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,241
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline u32 perf_get_misc_flags(struct pt_regs *regs) { unsigned long mmcra = regs->dsisr; unsigned long sihv = MMCRA_SIHV; unsigned long sipr = MMCRA_SIPR; if (TRAP(regs) != 0xf00) return 0; /* not a PMU interrupt */ if (ppmu->flags & PPMU_ALT_SIPR) { sihv = POWER6_MMCRA_SIHV; sipr = POWER6_MMCRA_SI...
196,195,344,618,499,700,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,242
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
unsigned long perf_instruction_pointer(struct pt_regs *regs) { unsigned long ip; if (TRAP(regs) != 0xf00) return regs->nip; /* not a PMU interrupt */ ip = mfspr(SPRN_SIAR) + perf_ip_adjust(regs); return ip; }
53,671,323,991,026,880,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,243
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline int perf_intr_is_nmi(struct pt_regs *regs) { return 0; }
70,910,130,826,296,210,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,244
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline int perf_intr_is_nmi(struct pt_regs *regs) { return !regs->softe; }
186,861,314,881,797,150,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,245
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline unsigned long perf_ip_adjust(struct pt_regs *regs) { return 0; }
86,297,166,719,438,900,000,000,000,000,000,000,000
core-book3s.c
10,648,462,065,209,884,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,246
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
static inline unsigned long perf_ip_adjust(struct pt_regs *regs) { unsigned long mmcra = regs->dsisr; if ((mmcra & MMCRA_SAMPLE_ENABLE) && !(ppmu->flags & PPMU_ALT_SIPR)) { unsigned long slot = (mmcra & MMCRA_SLOT) >> MMCRA_SLOT_SHIFT; if (slot > 1) return 4 * (slot - 1); } return 0; }
334,699,009,846,189,920,000,000,000,000,000,000,000
perf_event.c
332,657,767,673,694,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611
25,247
linux
0837e3242c73566fc1c0196b4ec61779c25ffc93
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0
unsigned long perf_misc_flags(struct pt_regs *regs) { u32 flags = perf_get_misc_flags(regs); if (flags) return flags; return user_mode(regs) ? PERF_RECORD_MISC_USER : PERF_RECORD_MISC_KERNEL; }
269,389,756,437,544,550,000,000,000,000,000,000,000
core-book3s.c
10,648,462,065,209,884,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4611
Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
https://nvd.nist.gov/vuln/detail/CVE-2011-4611