idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
25,248 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline void perf_read_regs(struct pt_regs *regs) { }
| 335,743,397,371,929,870,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,249 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static inline void perf_read_regs(struct pt_regs *regs)
{
regs->dsisr = mfspr(SPRN_MMCRA);
}
| 57,155,750,297,204,520,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,250 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int power_check_constraints(struct cpu_hw_events *cpuhw,
u64 event_id[], unsigned int cflags[],
int n_ev)
{
unsigned long mask, value, nv;
unsigned long smasks[MAX_HWEVENTS], svalues[MAX_HWEVENTS];
int n_alt[MAX_HWEVENTS], choice[MAX_HWEVENTS];
int i, j;
unsigned long addf = ppmu->add_fields;
... | 115,189,913,148,668,980,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,251 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int power_pmu_add(struct perf_event *event, int ef_flags)
{
struct cpu_hw_events *cpuhw;
unsigned long flags;
int n0;
int ret = -EAGAIN;
local_irq_save(flags);
perf_pmu_disable(event->pmu);
/*
* Add the event to the list (if there is room)
* and check whether the total set is still feasible.
*/
c... | 109,914,700,508,694,690,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,252 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | void power_pmu_cancel_txn(struct pmu *pmu)
{
struct cpu_hw_events *cpuhw = &__get_cpu_var(cpu_hw_events);
cpuhw->group_flag &= ~PERF_EVENT_TXN;
perf_pmu_enable(pmu);
}
| 256,341,681,195,674,760,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,253 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | int power_pmu_commit_txn(struct pmu *pmu)
{
struct cpu_hw_events *cpuhw;
long i, n;
if (!ppmu)
return -EAGAIN;
cpuhw = &__get_cpu_var(cpu_hw_events);
n = cpuhw->n_events;
if (check_excludes(cpuhw->event, cpuhw->flags, 0, n))
return -EAGAIN;
i = power_check_constraints(cpuhw, cpuhw->events, cpuhw->flags, n);... | 135,390,472,618,499,750,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,254 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void power_pmu_del(struct perf_event *event, int ef_flags)
{
struct cpu_hw_events *cpuhw;
long i;
unsigned long flags;
local_irq_save(flags);
perf_pmu_disable(event->pmu);
power_pmu_read(event);
cpuhw = &__get_cpu_var(cpu_hw_events);
for (i = 0; i < cpuhw->n_events; ++i) {
if (event == cpuhw->event[... | 89,238,789,938,291,040,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,255 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void power_pmu_disable(struct pmu *pmu)
{
struct cpu_hw_events *cpuhw;
unsigned long flags;
if (!ppmu)
return;
local_irq_save(flags);
cpuhw = &__get_cpu_var(cpu_hw_events);
if (!cpuhw->disabled) {
cpuhw->disabled = 1;
cpuhw->n_added = 0;
/*
* Check if we ever enabled the PMU on this cpu.
*... | 217,889,890,758,527,000,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,256 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void power_pmu_enable(struct pmu *pmu)
{
struct perf_event *event;
struct cpu_hw_events *cpuhw;
unsigned long flags;
long i;
unsigned long val;
s64 left;
unsigned int hwc_index[MAX_HWEVENTS];
int n_lim;
int idx;
if (!ppmu)
return;
local_irq_save(flags);
cpuhw = &__get_cpu_var(cpu_hw_events);
if (... | 231,091,836,587,396,730,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,257 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static int power_pmu_event_init(struct perf_event *event)
{
u64 ev;
unsigned long flags;
struct perf_event *ctrs[MAX_HWEVENTS];
u64 events[MAX_HWEVENTS];
unsigned int cflags[MAX_HWEVENTS];
int n;
int err;
struct cpu_hw_events *cpuhw;
if (!ppmu)
return -ENOENT;
switch (event->attr.type) {
case PERF_TYPE_H... | 52,279,929,967,590,460,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,258 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | power_pmu_notifier(struct notifier_block *self, unsigned long action, void *hcpu)
{
unsigned int cpu = (long)hcpu;
switch (action & ~CPU_TASKS_FROZEN) {
case CPU_UP_PREPARE:
power_pmu_setup(cpu);
break;
default:
break;
}
return NOTIFY_OK;
}
| 195,782,162,228,633,330,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,259 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void power_pmu_read(struct perf_event *event)
{
s64 val, delta, prev;
if (event->hw.state & PERF_HES_STOPPED)
return;
if (!event->hw.idx)
return;
/*
* Performance monitor interrupts come even when interrupts
* are soft-disabled, as long as interrupts are hard-enabled.
* Therefore we treat them li... | 245,505,800,337,441,860,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,260 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void power_pmu_start(struct perf_event *event, int ef_flags)
{
unsigned long flags;
s64 left;
if (!event->hw.idx || !event->hw.sample_period)
return;
if (!(event->hw.state & PERF_HES_STOPPED))
return;
if (ef_flags & PERF_EF_RELOAD)
WARN_ON_ONCE(!(event->hw.state & PERF_HES_UPTODATE));
local_irq_s... | 151,526,638,499,707,290,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,261 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | void power_pmu_start_txn(struct pmu *pmu)
{
struct cpu_hw_events *cpuhw = &__get_cpu_var(cpu_hw_events);
perf_pmu_disable(pmu);
cpuhw->group_flag |= PERF_EVENT_TXN;
cpuhw->n_txn_start = cpuhw->n_events;
}
| 9,287,347,848,598,128,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,262 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static unsigned long read_pmc(int idx)
{
unsigned long val;
switch (idx) {
case 1:
val = mfspr(SPRN_PMC1);
break;
case 2:
val = mfspr(SPRN_PMC2);
break;
case 3:
val = mfspr(SPRN_PMC3);
break;
case 4:
val = mfspr(SPRN_PMC4);
break;
case 5:
val = mfspr(SPRN_PMC5);
break;
case 6:
val = mfspr... | 33,360,105,062,815,150,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,263 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void record_and_restart(struct perf_event *event, unsigned long val,
struct pt_regs *regs, int nmi)
{
u64 period = event->hw.sample_period;
s64 prev, delta, left;
int record = 0;
if (event->hw.state & PERF_HES_STOPPED) {
write_pmc(event->hw.idx, 0);
return;
}
/* we don't have to worry about... | 243,800,055,078,899,200,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,264 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | int register_power_pmu(struct power_pmu *pmu)
{
if (ppmu)
return -EBUSY; /* something's already registered */
ppmu = pmu;
pr_info("%s performance monitor hardware support registered\n",
pmu->name);
#ifdef MSR_HV
/*
* Use FCHV to ignore kernel events if MSR.HV is set.
*/
if (mfmsr() & MSR_HV)
freeze_ev... | 181,195,001,630,318,000,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,265 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void thaw_limited_counters(struct cpu_hw_events *cpuhw,
unsigned long pmc5, unsigned long pmc6)
{
struct perf_event *event;
u64 val;
int i;
for (i = 0; i < cpuhw->n_limited; ++i) {
event = cpuhw->limited_counter[i];
event->hw.idx = cpuhw->limited_hwidx[i];
val = (event->hw.idx == 5) ? pmc5 : pmc... | 76,665,905,528,907,630,000,000,000,000,000,000,000 | perf_event.c | 332,657,767,673,694,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,266 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void write_mmcr0(struct cpu_hw_events *cpuhw, unsigned long mmcr0)
{
unsigned long pmc5, pmc6;
if (!cpuhw->n_limited) {
mtspr(SPRN_MMCR0, mmcr0);
return;
}
/*
* Write MMCR0, then read PMC5 and PMC6 immediately.
* To ensure we don't get a performance monitor interrupt
* between writing MMCR0 and f... | 43,758,313,158,280,940,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,267 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0 | static void write_pmc(int idx, unsigned long val)
{
switch (idx) {
case 1:
mtspr(SPRN_PMC1, val);
break;
case 2:
mtspr(SPRN_PMC2, val);
break;
case 3:
mtspr(SPRN_PMC3, val);
break;
case 4:
mtspr(SPRN_PMC4, val);
break;
case 5:
mtspr(SPRN_PMC5, val);
break;
case 6:
mtspr(SPRN_PMC6, val);
b... | 262,722,406,450,913,800,000,000,000,000,000,000,000 | core-book3s.c | 10,648,462,065,209,884,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
25,268 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE2(listen, int, fd, int, backlog)
{
struct socket *sock;
int err, fput_needed;
int somaxconn;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock) {
somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
if ((unsigned)backlog > somaxconn)
backlog = somaxconn;
err = security_socket_... | 19,665,638,696,245,358,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,269 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
{
struct socket *sock;
struct sockaddr_storage address;
int err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock) {
err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address);
if (err >= 0) ... | 314,670,205,834,939,960,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,270 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
int, addrlen)
{
struct socket *sock;
struct sockaddr_storage address;
int err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = move_addr_to_kernel(uservaddr, addrlen, (struct sockaddr *)&address... | 78,324,766,871,626,270,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,271 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
int __user *, usockaddr_len)
{
struct socket *sock;
struct sockaddr_storage address;
int len, err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = security_socket_getsockname(sock);
if (er... | 330,528,875,258,659,360,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,272 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
int __user *, usockaddr_len)
{
struct socket *sock;
struct sockaddr_storage address;
int len, err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock != NULL) {
err = security_socket_getpeername(sock);
if (err)... | 322,004,549,281,072,800,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,273 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned, flags)
{
int fput_needed, err;
struct msghdr msg_sys;
struct socket *sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = __sys_sendmsg(sock, msg, &msg_sys, flags, NULL);
fput_light(sock->file, fput_needed);
ou... | 96,577,629,633,575,460,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,274 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
int __user *, upeer_addrlen, int, flags)
{
struct socket *sock, *newsock;
struct file *newfile;
int err, len, newfd, fput_needed;
struct sockaddr_storage address;
if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
return -EINVAL;
if (SOCK... | 96,075,878,047,086,240,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,275 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
unsigned, flags)
{
return sys_sendto(fd, buff, len, flags, NULL, 0);
}
| 123,793,153,208,134,460,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,276 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
unsigned, flags, struct sockaddr __user *, addr,
int, addr_len)
{
struct socket *sock;
struct sockaddr_storage address;
int err;
struct msghdr msg;
struct iovec iov;
int fput_needed;
if (len > INT_MAX)
len = INT_MAX;
sock = sockfd_lookup_... | 301,738,332,915,721,600,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,277 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
unsigned, flags, struct sockaddr __user *, addr,
int __user *, addr_len)
{
struct socket *sock;
struct iovec iov;
struct msghdr msg;
struct sockaddr_storage address;
int err, err2;
int fput_needed;
if (size > INT_MAX)
size = INT_MAX;
s... | 86,405,673,338,017,290,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,278 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | int __sock_create(struct net *net, int family, int type, int protocol,
struct socket **res, int kern)
{
int err;
struct socket *sock;
const struct net_proto_family *pf;
/*
* Check protocol is in range
*/
if (family < 0 || family >= NPROTO)
return -EAFNOSUPPORT;
if (type < 0 || type >= SOCK_MAX)
... | 287,019,119,377,664,160,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,279 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int __sys_recvmsg(struct socket *sock, struct msghdr __user *msg,
struct msghdr *msg_sys, unsigned flags, int nosec)
{
struct compat_msghdr __user *msg_compat =
(struct compat_msghdr __user *)msg;
struct iovec iovstack[UIO_FASTIOV];
struct iovec *iov = iovstack;
unsigned long cmsg_ptr;
int err, iov... | 32,697,105,661,015,326,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,280 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int bond_ioctl(struct net *net, unsigned int cmd,
struct compat_ifreq __user *ifr32)
{
struct ifreq kifr;
struct ifreq __user *uifr;
mm_segment_t old_fs;
int err;
u32 data;
void __user *datap;
switch (cmd) {
case SIOCBONDENSLAVE:
case SIOCBONDRELEASE:
case SIOCBONDSETHWADDR:
case SIOCBONDCHANGEAC... | 262,046,373,240,901,700,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,281 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static long compat_sock_ioctl(struct file *file, unsigned cmd,
unsigned long arg)
{
struct socket *sock = file->private_data;
int ret = -ENOIOCTLCMD;
struct sock *sk;
struct net *net;
sk = sock->sk;
net = sock_net(sk);
if (sock->ops->compat_ioctl)
ret = sock->ops->compat_ioctl(sock, cmd, arg);
if ... | 3,335,279,499,457,966,500,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,282 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
unsigned int cmd, unsigned long arg)
{
void __user *argp = compat_ptr(arg);
struct sock *sk = sock->sk;
struct net *net = sock_net(sk);
if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
return siocdevprivate_ioctl(net, cmd, a... | 195,601,089,784,021,520,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,283 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int do_siocgstamp(struct net *net, struct socket *sock,
unsigned int cmd, struct compat_timeval __user *up)
{
mm_segment_t old_fs = get_fs();
struct timeval ktv;
int err;
set_fs(KERNEL_DS);
err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
set_fs(old_fs);
if (!err) {
err = put_user(ktv.tv_s... | 96,907,089,973,632,790,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,284 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int do_siocgstampns(struct net *net, struct socket *sock,
unsigned int cmd, struct compat_timespec __user *up)
{
mm_segment_t old_fs = get_fs();
struct timespec kts;
int err;
set_fs(KERNEL_DS);
err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
set_fs(old_fs);
if (!err) {
err = put_user(kts.... | 300,200,910,534,051,160,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,285 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
{
struct compat_ethtool_rxnfc __user *compat_rxnfc;
bool convert_in = false, convert_out = false;
size_t buf_size = ALIGN(sizeof(struct ifreq), 8);
struct ethtool_rxnfc __user *rxnfc;
struct ifreq __user *ifr;
u32 rule_cnt = 0, actual_ru... | 96,105,003,524,975,380,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,286 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr *kaddr)
{
if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
return -EINVAL;
if (ulen == 0)
return 0;
if (copy_from_user(kaddr, uaddr, ulen))
return -EFAULT;
return audit_sockaddr(ulen, kaddr);
}
| 188,258,499,591,520,730,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,287 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int move_addr_to_user(struct sockaddr *kaddr, int klen,
void __user *uaddr, int __user *ulen)
{
int err;
int len;
err = get_user(len, ulen);
if (err)
return err;
if (len > klen)
len = klen;
if (len < 0 || len > sizeof(struct sockaddr_storage))
return -EINVAL;
if (len) {
if (audit_sockaddr... | 174,986,563,105,166,200,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,288 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static struct socket *sock_alloc(void)
{
struct inode *inode;
struct socket *sock;
inode = new_inode_pseudo(sock_mnt->mnt_sb);
if (!inode)
return NULL;
sock = SOCKET_I(inode);
kmemcheck_annotate_bitfield(sock, type);
inode->i_ino = get_next_ino();
inode->i_mode = S_IFSOCK | S_IRWXUGO;
inode->i_uid = curre... | 336,730,854,936,972,300,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,289 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static struct socket *sock_from_file(struct file *file, int *err)
{
if (file->f_op == &socket_file_ops)
return file->private_data; /* set in sock_map_fd */
*err = -ENOTSOCK;
return NULL;
}
| 30,497,599,327,323,380,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,290 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static int __init sock_init(void)
{
int err;
/*
* Initialize sock SLAB cache.
*/
sk_init();
/*
* Initialize skbuff SLAB cache
*/
skb_init();
/*
* Initialize the protocols module.
*/
init_inodecache();
err = register_filesystem(&sock_fs_type);
if (err)
goto out_fs;
sock_mnt =... | 24,334,966,418,102,655,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,291 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | void sock_release(struct socket *sock)
{
if (sock->ops) {
struct module *owner = sock->ops->owner;
sock->ops->release(sock);
sock->ops = NULL;
module_put(owner);
}
if (rcu_dereference_protected(sock->wq, 1)->fasync_list)
printk(KERN_ERR "sock_release: fasync list not empty!\n");
percpu_sub(sockets_in_u... | 218,895,428,321,822,430,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,292 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | static ssize_t sock_sendpage(struct file *file, struct page *page,
int offset, size_t size, loff_t *ppos, int more)
{
struct socket *sock;
int flags;
sock = file->private_data;
flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
if (more)
flags |= MSG_MORE;
return kernel_sendpage(sock, page, of... | 332,667,796,820,227,160,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,293 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | int sock_tx_timestamp(struct sock *sk, __u8 *tx_flags)
{
*tx_flags = 0;
if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE))
*tx_flags |= SKBTX_HW_TSTAMP;
if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE))
*tx_flags |= SKBTX_SW_TSTAMP;
return 0;
}
| 109,447,416,304,192,960,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,294 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 0 | asmlinkage long sys_recv(int fd, void __user *ubuf, size_t size,
unsigned flags)
{
return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
}
| 35,362,637,925,177,016,000,000,000,000,000,000,000 | socket.c | 73,985,084,319,012,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
25,295 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | void __udp6_lib_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
u8 type, u8 code, int offset, __be32 info,
struct udp_table *udptable)
{
struct ipv6_pinfo *np;
struct ipv6hdr *hdr = (struct ipv6hdr*)skb->data;
struct in6_addr *saddr = &hdr->saddr;
struct in6_addr *daddr = &hdr->daddr;
struct udphd... | 125,483,709,872,678,070,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,296 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static struct sock *__udp6_lib_lookup(struct net *net,
const struct in6_addr *saddr, __be16 sport,
const struct in6_addr *daddr, __be16 dport,
int dif, struct udp_table *udptable)
{
struct sock *sk, *result;
struct hlist_nulls_node *node;
unsigned short hnum = ntohs(dport);
unsigned in... | 110,441,590,061,151,500,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,297 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static int __udp6_lib_mcast_deliver(struct net *net, struct sk_buff *skb,
struct in6_addr *saddr, struct in6_addr *daddr,
struct udp_table *udptable)
{
struct sock *sk, *stack[256 / sizeof(struct sock *)];
const struct udphdr *uh = udp_hdr(skb);
struct udp_hslot *hslot = udp_hashslot(udptable, net, ntohs(uh->des... | 255,932,927,831,129,470,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,298 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int compat_udpv6_getsockopt(struct sock *sk, int level, int optname,
char __user *optval, int __user *optlen)
{
if (level == SOL_UDP || level == SOL_UDPLITE)
return udp_lib_getsockopt(sk, level, optname, optval, optlen);
return compat_ipv6_getsockopt(sk, level, optname, optval, optlen);
}
| 316,762,116,373,844,340,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,299 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int compat_udpv6_setsockopt(struct sock *sk, int level, int optname,
char __user *optval, unsigned int optlen)
{
if (level == SOL_UDP || level == SOL_UDPLITE)
return udp_lib_setsockopt(sk, level, optname, optval, optlen,
udp_v6_push_pending_frames);
return compat_ipv6_setsockopt(sk, level, optname, ... | 155,010,790,861,159,280,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,300 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static inline int compute_score(struct sock *sk, struct net *net,
unsigned short hnum,
const struct in6_addr *saddr, __be16 sport,
const struct in6_addr *daddr, __be16 dport,
int dif)
{
int score = -1;
if (net_eq(sock_net(sk), net) && udp_sk(sk)->udp_port_hash == hnum &&
sk->sk_family == PF_INET6)... | 45,511,979,268,552,310,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,301 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static inline int compute_score2(struct sock *sk, struct net *net,
const struct in6_addr *saddr, __be16 sport,
const struct in6_addr *daddr, unsigned short hnum,
int dif)
{
int score = -1;
if (net_eq(sock_net(sk), net) && udp_sk(sk)->udp_port_hash == hnum &&
sk->sk_family == PF_INET6) {
struct ipv6_... | 35,897,247,871,999,833,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,302 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static void flush_stack(struct sock **stack, unsigned int count,
struct sk_buff *skb, unsigned int final)
{
unsigned int i;
struct sock *sk;
struct sk_buff *skb1;
for (i = 0; i < count; i++) {
skb1 = (i == final) ? skb : skb_clone(skb, GFP_ATOMIC);
sk = stack[i];
if (skb1) {
if (sk_rcvqueues_full(sk, ... | 178,200,166,770,977,070,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,303 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static inline int udp6_csum_init(struct sk_buff *skb, struct udphdr *uh,
int proto)
{
int err;
UDP_SKB_CB(skb)->partial_cov = 0;
UDP_SKB_CB(skb)->cscov = skb->len;
if (proto == IPPROTO_UDPLITE) {
err = udplite_checksum_init(skb, uh);
if (err)
return err;
}
if (uh->check == 0) {
/* RFC 2460 sectio... | 21,470,493,099,396,794,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,304 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static void udp6_hwcsum_outgoing(struct sock *sk, struct sk_buff *skb,
const struct in6_addr *saddr,
const struct in6_addr *daddr, int len)
{
unsigned int offset;
struct udphdr *uh = udp_hdr(skb);
__wsum csum = 0;
if (skb_queue_len(&sk->sk_write_queue) == 1) {
/* Only one fragment on the socket. */
... | 45,868,239,829,927,340,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,305 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | struct sock *udp6_lib_lookup(struct net *net, const struct in6_addr *saddr, __be16 sport,
const struct in6_addr *daddr, __be16 dport, int dif)
{
return __udp6_lib_lookup(net, saddr, sport, daddr, dport, dif, &udp_table);
}
| 15,545,161,322,737,018,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,306 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static struct sock *udp6_lib_lookup2(struct net *net,
const struct in6_addr *saddr, __be16 sport,
const struct in6_addr *daddr, unsigned int hnum, int dif,
struct udp_hslot *hslot2, unsigned int slot2)
{
struct sock *sk, *result;
struct hlist_nulls_node *node;
int score, badness;
begin:
result = NULL;
badne... | 159,884,273,117,478,800,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,307 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static unsigned int udp6_portaddr_hash(struct net *net,
const struct in6_addr *addr6,
unsigned int port)
{
unsigned int hash, mix = net_hash_mix(net);
if (ipv6_addr_any(addr6))
hash = jhash_1word(0, mix);
else if (ipv6_addr_v4mapped(addr6))
hash = jhash_1word((__force u32)addr6->s6_addr32[... | 82,908,442,999,501,340,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,308 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int __net_init udp6_proc_init(struct net *net)
{
return udp_proc_register(net, &udp6_seq_afinfo);
}
| 207,957,058,687,299,980,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,309 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udp6_seq_show(struct seq_file *seq, void *v)
{
if (v == SEQ_START_TOKEN)
seq_printf(seq,
" sl "
"local_address "
"remote_address "
"st tx_queue rx_queue tr tm->when retrnsmt"
" uid timeout inode ref pointer drops\n");
else
udp6_... | 119,053,403,463,534,410,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,310 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static void udp6_sock_seq_show(struct seq_file *seq, struct sock *sp, int bucket)
{
struct inet_sock *inet = inet_sk(sp);
struct ipv6_pinfo *np = inet6_sk(sp);
struct in6_addr *dest, *src;
__u16 destp, srcp;
dest = &np->daddr;
src = &np->rcv_saddr;
destp = ntohs(inet->inet_dport);
srcp = ntohs(inet->inet_s... | 333,756,022,651,176,820,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,311 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static int udp6_ufo_send_check(struct sk_buff *skb)
{
struct ipv6hdr *ipv6h;
struct udphdr *uh;
if (!pskb_may_pull(skb, sizeof(*uh)))
return -EINVAL;
ipv6h = ipv6_hdr(skb);
uh = udp_hdr(skb);
uh->check = ~csum_ipv6_magic(&ipv6h->saddr, &ipv6h->daddr, skb->len,
IPPROTO_UDP, 0);
skb->csum_start = skb... | 93,132,932,956,280,680,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,312 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udp_v6_get_port(struct sock *sk, unsigned short snum)
{
unsigned int hash2_nulladdr =
udp6_portaddr_hash(sock_net(sk), &in6addr_any, snum);
unsigned int hash2_partial =
udp6_portaddr_hash(sock_net(sk), &inet6_sk(sk)->rcv_saddr, 0);
/* precompute partial secondary hash */
udp_sk(sk)->udp_portaddr_hash = ha... | 161,992,456,047,420,160,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,313 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static struct sock *udp_v6_mcast_next(struct net *net, struct sock *sk,
__be16 loc_port, struct in6_addr *loc_addr,
__be16 rmt_port, struct in6_addr *rmt_addr,
int dif)
{
struct hlist_nulls_node *node;
struct sock *s = sk;
unsigned short num = ntohs(loc_port);
sk_nulls_for_each_from(s... | 122,358,543,221,332,060,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,314 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static void udp_v6_rehash(struct sock *sk)
{
u16 new_hash = udp6_portaddr_hash(sock_net(sk),
&inet6_sk(sk)->rcv_saddr,
inet_sk(sk)->inet_num);
udp_lib_rehash(sk, new_hash);
}
| 161,119,958,853,766,860,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,315 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | void udpv6_destroy_sock(struct sock *sk)
{
lock_sock(sk);
udp_v6_flush_pending_frames(sk);
release_sock(sk);
inet6_destroy_sock(sk);
}
| 172,335,360,996,255,400,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,316 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | void udpv6_exit(void)
{
inet6_unregister_protosw(&udpv6_protosw);
inet6_del_protocol(&udpv6_protocol, IPPROTO_UDP);
}
| 189,331,708,336,462,530,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,317 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udpv6_getsockopt(struct sock *sk, int level, int optname,
char __user *optval, int __user *optlen)
{
if (level == SOL_UDP || level == SOL_UDPLITE)
return udp_lib_getsockopt(sk, level, optname, optval, optlen);
return ipv6_getsockopt(sk, level, optname, optval, optlen);
}
| 336,836,358,278,408,760,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,318 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int __init udpv6_init(void)
{
int ret;
ret = inet6_add_protocol(&udpv6_protocol, IPPROTO_UDP);
if (ret)
goto out;
ret = inet6_register_protosw(&udpv6_protosw);
if (ret)
goto out_udpv6_protocol;
out:
return ret;
out_udpv6_protocol:
inet6_del_protocol(&udpv6_protocol, IPPROTO_UDP);
goto out;
}
| 44,667,556,892,922,290,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,319 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udpv6_queue_rcv_skb(struct sock * sk, struct sk_buff *skb)
{
struct udp_sock *up = udp_sk(sk);
int rc;
int is_udplite = IS_UDPLITE(sk);
if (!ipv6_addr_any(&inet6_sk(sk)->daddr))
sock_rps_save_rxhash(sk, skb->rxhash);
if (!xfrm6_policy_check(sk, XFRM_POLICY_IN, skb))
goto drop;
/*
* UDP-Lite specific ... | 91,258,458,929,221,850,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,320 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | static __inline__ int udpv6_rcv(struct sk_buff *skb)
{
return __udp6_lib_rcv(skb, &udp_table, IPPROTO_UDP);
}
| 258,289,969,954,185,900,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,321 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udpv6_recvmsg(struct kiocb *iocb, struct sock *sk,
struct msghdr *msg, size_t len,
int noblock, int flags, int *addr_len)
{
struct ipv6_pinfo *np = inet6_sk(sk);
struct inet_sock *inet = inet_sk(sk);
struct sk_buff *skb;
unsigned int ulen;
int peeked;
int err;
int is_udplite = IS_UDPLITE(sk);
int is... | 8,455,229,705,460,032,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,322 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udpv6_sendmsg(struct kiocb *iocb, struct sock *sk,
struct msghdr *msg, size_t len)
{
struct ipv6_txoptions opt_space;
struct udp_sock *up = udp_sk(sk);
struct inet_sock *inet = inet_sk(sk);
struct ipv6_pinfo *np = inet6_sk(sk);
struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) msg->msg_name;
struct in6_... | 312,050,181,355,474,500,000,000,000,000,000,000,000 | udp.c | 46,858,807,665,352,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,323 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 0 | int udpv6_setsockopt(struct sock *sk, int level, int optname,
char __user *optval, unsigned int optlen)
{
if (level == SOL_UDP || level == SOL_UDPLITE)
return udp_lib_setsockopt(sk, level, optname, optval, optlen,
udp_v6_push_pending_frames);
return ipv6_setsockopt(sk, level, optname, optval, optlen... | 13,925,343,439,191,558,000,000,000,000,000,000,000 | udp.c | 245,096,869,505,899,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
25,324 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static void __put_nfs_open_context(struct nfs_open_context *ctx, int wait)
{
struct inode *inode;
if (ctx == NULL)
return;
inode = ctx->path.dentry->d_inode;
if (!atomic_dec_and_lock(&ctx->count, &inode->i_lock))
return;
list_del(&ctx->list);
spin_unlock(&inode->i_lock);
if (ctx->state != NULL) {
if (wai... | 96,655,077,497,391,530,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,325 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static void __exit exit_nfs_fs(void)
{
nfs_destroy_directcache();
nfs_destroy_writepagecache();
nfs_destroy_readpagecache();
nfs_destroy_inodecache();
nfs_destroy_nfspagecache();
#ifdef CONFIG_PROC_FS
rpc_proc_unregister("nfs");
#endif
unregister_nfs_fs();
nfs_fs_proc_exit();
nfsiod_stop();
}
| 123,555,552,082,542,570,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,326 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | struct nfs_open_context *get_nfs_open_context(struct nfs_open_context *ctx)
{
if (ctx != NULL)
atomic_inc(&ctx->count);
return ctx;
}
| 325,127,976,038,914,400,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,327 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static int __init init_nfs_fs(void)
{
int err;
err = nfsiod_start();
if (err)
goto out6;
err = nfs_fs_proc_init();
if (err)
goto out5;
err = nfs_init_nfspagecache();
if (err)
goto out4;
err = nfs_init_inodecache();
if (err)
goto out3;
err = nfs_init_readpagecache();
if (err)
goto out2;
err =... | 20,848,273,724,778,700,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,328 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static void init_once(void *foo)
{
struct nfs_inode *nfsi = (struct nfs_inode *) foo;
inode_init_once(&nfsi->vfs_inode);
INIT_LIST_HEAD(&nfsi->open_files);
INIT_LIST_HEAD(&nfsi->access_cache_entry_lru);
INIT_LIST_HEAD(&nfsi->access_cache_inode_lru);
INIT_RADIX_TREE(&nfsi->nfs_page_tree, GFP_ATOMIC);
nfsi->ncomm... | 236,188,670,112,515,020,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,329 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | void nfs4_clear_inode(struct inode *inode)
{
/* If we are holding a delegation, return it! */
nfs_inode_return_delegation_noreclaim(inode);
/* First call standard NFS clear_inode() code */
nfs_clear_inode(inode);
}
| 213,541,771,023,983,930,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,330 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static inline void nfs4_init_once(struct nfs_inode *nfsi)
{
#ifdef CONFIG_NFS_V4
INIT_LIST_HEAD(&nfsi->open_states);
nfsi->delegation = NULL;
nfsi->delegation_state = 0;
init_rwsem(&nfsi->rwsem);
#endif
}
| 157,550,679,118,452,770,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,331 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | struct inode *nfs_alloc_inode(struct super_block *sb)
{
struct nfs_inode *nfsi;
nfsi = (struct nfs_inode *)kmem_cache_alloc(nfs_inode_cachep, GFP_KERNEL);
if (!nfsi)
return NULL;
nfsi->flags = 0UL;
nfsi->cache_validity = 0UL;
#ifdef CONFIG_NFS_V3_ACL
nfsi->acl_access = ERR_PTR(-EAGAIN);
nfsi->acl_default = ERR... | 175,273,341,383,279,260,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,332 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static int nfs_check_inode_attributes(struct inode *inode, struct nfs_fattr *fattr)
{
struct nfs_inode *nfsi = NFS_I(inode);
loff_t cur_size, new_isize;
unsigned long invalid = 0;
/* Has the inode gone and changed behind our back? */
if (nfsi->fileid != fattr->fileid
|| (inode->i_mode & S_IFMT) != (fattr->mod... | 183,600,129,254,061,170,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,333 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | void nfs_clear_inode(struct inode *inode)
{
/*
* The following should never happen...
*/
BUG_ON(nfs_have_writebacks(inode));
BUG_ON(!list_empty(&NFS_I(inode)->open_files));
nfs_zap_acl_cache(inode);
nfs_access_zap_cache(inode);
}
| 203,508,552,772,967,450,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,334 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | u64 nfs_compat_user_ino64(u64 fileid)
{
int ino;
if (enable_ino64)
return fileid;
ino = fileid;
if (sizeof(ino) < sizeof(fileid))
ino ^= fileid >> (sizeof(fileid)-sizeof(ino)) * 8;
return ino;
}
| 294,368,237,702,802,780,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,335 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static int nfs_ctime_need_update(const struct inode *inode, const struct nfs_fattr *fattr)
{
return timespec_compare(&fattr->ctime, &inode->i_ctime) > 0;
}
| 299,904,067,766,106,040,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,336 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | void nfs_destroy_inode(struct inode *inode)
{
kmem_cache_free(nfs_inode_cachep, NFS_I(inode));
}
| 49,267,287,616,320,040,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,337 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static void nfs_destroy_inodecache(void)
{
kmem_cache_destroy(nfs_inode_cachep);
}
| 29,604,531,078,249,637,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,338 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | void nfs_fattr_init(struct nfs_fattr *fattr)
{
fattr->valid = 0;
fattr->time_start = jiffies;
fattr->gencount = nfs_inc_attr_generation_counter();
}
| 258,191,484,897,878,620,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,339 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | nfs_fattr_to_ino_t(struct nfs_fattr *fattr)
{
return nfs_fileid_to_ino_t(fattr->fileid);
}
| 99,560,730,459,138,200,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,340 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | nfs_fhget(struct super_block *sb, struct nfs_fh *fh, struct nfs_fattr *fattr)
{
struct nfs_find_desc desc = {
.fh = fh,
.fattr = fattr
};
struct inode *inode = ERR_PTR(-ENOENT);
unsigned long hash;
if ((fattr->valid & NFS_ATTR_FATTR) == 0)
goto out_no_inode;
if (!fattr->nlink) {
printk("NFS: Buggy serve... | 196,164,417,554,515,540,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,341 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static void nfs_file_clear_open_context(struct file *filp)
{
struct inode *inode = filp->f_path.dentry->d_inode;
struct nfs_open_context *ctx = nfs_file_open_context(filp);
if (ctx) {
filp->private_data = NULL;
spin_lock(&inode->i_lock);
list_move_tail(&ctx->list, &NFS_I(inode)->open_files);
spin_unlock(&in... | 64,912,889,069,142,670,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,342 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static void nfs_file_set_open_context(struct file *filp, struct nfs_open_context *ctx)
{
struct inode *inode = filp->f_path.dentry->d_inode;
struct nfs_inode *nfsi = NFS_I(inode);
filp->private_data = get_nfs_open_context(ctx);
spin_lock(&inode->i_lock);
list_add(&ctx->list, &nfsi->open_files);
spin_unlock(&inod... | 303,384,843,400,263,050,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,343 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | nfs_find_actor(struct inode *inode, void *opaque)
{
struct nfs_find_desc *desc = (struct nfs_find_desc *)opaque;
struct nfs_fh *fh = desc->fh;
struct nfs_fattr *fattr = desc->fattr;
if (NFS_FILEID(inode) != fattr->fileid)
return 0;
if (nfs_compare_fh(NFS_FH(inode), fh))
return 0;
if (is_bad_inode(inode) || ... | 79,841,771,378,622,130,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,344 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | int nfs_getattr(struct vfsmount *mnt, struct dentry *dentry, struct kstat *stat)
{
struct inode *inode = dentry->d_inode;
int need_atime = NFS_I(inode)->cache_validity & NFS_INO_INVALID_ATIME;
int err;
/*
* Flush out writes to the server in order to update c/mtime.
*
* Hold the i_mutex to suspend application... | 118,276,695,063,631,580,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,345 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | unsigned long nfs_inc_attr_generation_counter(void)
{
return atomic_long_inc_return(&nfs_attr_generation_counter);
}
| 69,429,106,403,708,070,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,346 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | static int __init nfs_init_inodecache(void)
{
nfs_inode_cachep = kmem_cache_create("nfs_inode_cache",
sizeof(struct nfs_inode),
0, (SLAB_RECLAIM_ACCOUNT|
SLAB_MEM_SPREAD),
init_once);
if (nfs_inode_cachep == NULL)
return -ENOMEM;
return 0;
}
| 42,127,387,689,091,670,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
25,347 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 0 | nfs_init_locked(struct inode *inode, void *opaque)
{
struct nfs_find_desc *desc = (struct nfs_find_desc *)opaque;
struct nfs_fattr *fattr = desc->fattr;
set_nfs_fileid(inode, fattr->fileid);
nfs_copy_fh(NFS_FH(inode), desc->fh);
return 0;
}
| 188,436,323,367,340,700,000,000,000,000,000,000,000 | inode.c | 234,679,368,960,977,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.