idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
26,817 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | cifs_reconnect(struct TCP_Server_Info *server)
{
int rc = 0;
struct list_head *tmp, *tmp2;
struct cifsSesInfo *ses;
struct cifsTconInfo *tcon;
struct mid_q_entry *mid_entry;
spin_lock(&GlobalMid_Lock);
if (server->tcpStatus == CifsExiting) {
/* the demux thread will exit normally
next time through the loop ... | 57,767,759,624,532,160,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,818 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | cifs_sb_master_tcon(struct cifs_sb_info *cifs_sb)
{
return tlink_tcon(cifs_sb_master_tlink(cifs_sb));
}
| 29,455,574,380,527,766,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,819 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | cifs_sb_master_tlink(struct cifs_sb_info *cifs_sb)
{
return cifs_sb->master_tlink;
}
| 99,205,048,684,184,400,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,820 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | cifs_sb_tcon_pending_wait(void *unused)
{
schedule();
return signal_pending(current) ? -ERESTARTSYS : 0;
}
| 302,588,229,299,918,440,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,821 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | cifs_sb_tlink(struct cifs_sb_info *cifs_sb)
{
int ret;
uid_t fsuid = current_fsuid();
struct tcon_link *tlink, *newtlink;
if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
return cifs_get_tlink(cifs_sb_master_tlink(cifs_sb));
spin_lock(&cifs_sb->tlink_tree_lock);
tlink = tlink_rb_search(&cifs_sb->tlink_t... | 171,587,759,775,319,800,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,822 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | int cifs_setup_session(unsigned int xid, struct cifsSesInfo *ses,
struct nls_table *nls_info)
{
int rc = 0;
struct TCP_Server_Info *server = ses->server;
ses->flags = 0;
ses->capabilities = server->capabilities;
if (linuxExtEnabled == 0)
ses->capabilities &= (~CAP_UNIX);
cFYI(1, "Security Mode: 0x%x Capabi... | 246,313,488,377,461,200,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,823 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | cifs_umount(struct super_block *sb, struct cifs_sb_info *cifs_sb)
{
struct rb_root *root = &cifs_sb->tlink_tree;
struct rb_node *node;
struct tcon_link *tlink;
char *tmp;
cancel_delayed_work_sync(&cifs_sb->prune_tlinks);
spin_lock(&cifs_sb->tlink_tree_lock);
while ((node = rb_first(root))) {
tlink = rb_entry... | 294,646,454,086,478,200,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,824 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | static int coalesce_t2(struct smb_hdr *psecond, struct smb_hdr *pTargetSMB)
{
struct smb_t2_rsp *pSMB2 = (struct smb_t2_rsp *)psecond;
struct smb_t2_rsp *pSMBt = (struct smb_t2_rsp *)pTargetSMB;
char *data_area_of_target;
char *data_area_of_buf2;
int remaining;
__u16 byte_count, total_data_size, total_in_buf, to... | 227,119,395,423,534,180,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,825 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | convert_delimiter(char *path, char delim)
{
int i;
char old_delim;
if (path == NULL)
return;
if (delim == '/')
old_delim = '\\';
else
old_delim = '/';
for (i = 0; path[i] != '\0'; i++) {
if (path[i] == old_delim)
path[i] = delim;
}
}
| 38,939,977,275,158,720,000,000,000,000,000,000,000 | connect.c | 259,629,772,591,307,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,826 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | extract_hostname(const char *unc)
{
const char *src;
char *dst, *delim;
unsigned int len;
/* skip double chars at beginning of string */
/* BB: check validity of these bytes? */
src = unc + 2;
/* delimiter between hostname and sharename is always '\\' now */
delim = strchr(src, '\\');
if (!delim)
return ER... | 264,900,552,954,774,470,000,000,000,000,000,000,000 | connect.c | 259,629,772,591,307,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,827 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | generic_ip_connect(struct TCP_Server_Info *server)
{
int rc = 0;
__be16 sport;
int slen, sfamily;
struct socket *socket = server->ssocket;
struct sockaddr *saddr;
saddr = (struct sockaddr *) &server->dstaddr;
if (server->dstaddr.ss_family == AF_INET6) {
sport = ((struct sockaddr_in6 *) saddr)->sin6_port;
s... | 265,379,004,740,409,140,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,828 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | get_dfs_path(int xid, struct cifsSesInfo *pSesInfo, const char *old_path,
const struct nls_table *nls_codepage, unsigned int *pnum_referrals,
struct dfs_info3_param **preferrals, int remap)
{
char *temp_unc;
int rc = 0;
*pnum_referrals = 0;
*preferrals = NULL;
if (pSesInfo->ipc_tid == 0) {
temp_unc... | 298,354,172,711,834,100,000,000,000,000,000,000,000 | connect.c | 259,629,772,591,307,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,829 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | ip_connect(struct TCP_Server_Info *server)
{
__be16 *sport;
struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
if (server->dstaddr.ss_family == AF_INET6)
sport = &addr6->sin6_port;
else
sport = &addr->sin_port;
if (*sport ... | 329,395,442,285,851,850,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,830 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | ip_rfc1001_connect(struct TCP_Server_Info *server)
{
int rc = 0;
/*
* some servers require RFC1001 sessinit before sending
* negprot - BB check reconnection in case where second
* sessinit is sent but no second negprot
*/
struct rfc1002_session_packet *ses_init_buf;
struct smb_hdr *smb_buf;
ses_init_buf = ... | 91,095,056,989,516,290,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,831 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | match_address(struct TCP_Server_Info *server, struct sockaddr *addr,
struct sockaddr *srcaddr)
{
switch (addr->sa_family) {
case AF_INET: {
struct sockaddr_in *addr4 = (struct sockaddr_in *)addr;
struct sockaddr_in *srv_addr4 =
(struct sockaddr_in *)&server->dstaddr;
if (addr4->sin_addr.s_addr != s... | 222,636,123,200,127,440,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,832 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | match_port(struct TCP_Server_Info *server, struct sockaddr *addr)
{
__be16 port, *sport;
switch (addr->sa_family) {
case AF_INET:
sport = &((struct sockaddr_in *) &server->dstaddr)->sin_port;
port = ((struct sockaddr_in *) addr)->sin_port;
break;
case AF_INET6:
sport = &((struct sockaddr_in6 *) &server->ds... | 50,160,519,624,283,265,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,833 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | match_security(struct TCP_Server_Info *server, struct smb_vol *vol)
{
unsigned int secFlags;
if (vol->secFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
secFlags = vol->secFlg;
else
secFlags = global_secflags | vol->secFlg;
switch (server->secType) {
case LANMAN:
if (!(secFlags & (CIFSSEC_MAY_LANMAN|CIFS... | 181,250,442,087,438,000,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,834 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | void reset_cifs_unix_caps(int xid, struct cifsTconInfo *tcon,
struct super_block *sb, struct smb_vol *vol_info)
{
/* if we are reconnecting then should we check to see if
* any requested capabilities changed locally e.g. via
* remount but we can not do much about it here
* if they have (even if we could det... | 298,055,794,112,674,380,000,000,000,000,000,000,000 | connect.c | 259,629,772,591,307,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,835 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | static void setup_cifs_sb(struct smb_vol *pvolume_info,
struct cifs_sb_info *cifs_sb)
{
INIT_DELAYED_WORK(&cifs_sb->prune_tlinks, cifs_prune_tlinks);
if (pvolume_info->rsize > CIFSMaxBufSize) {
cERROR(1, "rsize %d too large, using MaxBufSize",
pvolume_info->rsize);
cifs_sb->rsize = CIFSMaxBufSize;
} els... | 24,590,316,442,999,110,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,836 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | srcip_matches(struct sockaddr *srcaddr, struct sockaddr *rhs)
{
switch (srcaddr->sa_family) {
case AF_UNSPEC:
return (rhs->sa_family == AF_UNSPEC);
case AF_INET: {
struct sockaddr_in *saddr4 = (struct sockaddr_in *)srcaddr;
struct sockaddr_in *vaddr4 = (struct sockaddr_in *)rhs;
return (saddr4->sin_addr.s_ad... | 147,137,904,189,071,230,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,837 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink)
{
struct rb_node **new = &(root->rb_node), *parent = NULL;
struct tcon_link *tlink;
while (*new) {
tlink = rb_entry(*new, struct tcon_link, tl_rbnode);
parent = *new;
if (tlink->tl_uid > new_tlink->tl_uid)
new = &((*new)->rb_left);
else
... | 121,846,771,319,413,760,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,838 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 0 | tlink_rb_search(struct rb_root *root, uid_t uid)
{
struct rb_node *node = root->rb_node;
struct tcon_link *tlink;
while (node) {
tlink = rb_entry(node, struct tcon_link, tl_rbnode);
if (tlink->tl_uid > uid)
node = node->rb_left;
else if (tlink->tl_uid < uid)
node = node->rb_right;
else
return tlin... | 152,528,407,828,475,280,000,000,000,000,000,000,000 | connect.c | 332,227,986,165,163,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
26,839 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int alloc_initial_descbuffers(struct b43_dmaring *ring)
{
int i, err = -ENOMEM;
struct b43_dmadesc_generic *desc;
struct b43_dmadesc_meta *meta;
for (i = 0; i < ring->nr_slots; i++) {
desc = ring->ops->idx2desc(ring, i, &meta);
err = setup_rx_descbuffer(ring, desc, meta, GFP_KERNEL);
if (err) {
b4... | 267,430,849,919,909,600,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,840 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int alloc_ringmemory(struct b43_dmaring *ring)
{
gfp_t flags = GFP_KERNEL;
/* The specs call for 4K buffers for 30- and 32-bit DMA with 4K
* alignment and 8K buffers for 64-bit DMA with 8K alignment. Testing
* has shown that 4K is sufficient for the latter as long as the buffer
* does not cross an 8K bo... | 307,936,980,503,028,300,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,841 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void b43_destroy_dmaring(struct b43_dmaring *ring,
const char *ringname)
{
if (!ring)
return;
#ifdef CONFIG_B43_DEBUG
{
/* Print some statistics. */
u64 failed_packets = ring->nr_failed_tx_packets;
u64 succeed_packets = ring->nr_succeed_tx_packets;
u64 nr_packets = failed_packets + succeed_packe... | 40,117,124,111,581,480,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,842 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void b43_dma_direct_fifo_rx(struct b43_wldev *dev,
unsigned int engine_index, bool enable)
{
enum b43_dmatype type;
u16 mmio_base;
type = dma_mask_to_engine_type(supported_dma_mask(dev));
mmio_base = b43_dmacontroller_base(type, engine_index);
direct_fifo_rx(dev, type, mmio_base, enable);
}
| 182,622,296,401,614,460,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,843 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void b43_dma_free(struct b43_wldev *dev)
{
struct b43_dma *dma;
if (b43_using_pio_transfers(dev))
return;
dma = &dev->dma;
destroy_ring(dma, rx_ring);
destroy_ring(dma, tx_ring_AC_BK);
destroy_ring(dma, tx_ring_AC_BE);
destroy_ring(dma, tx_ring_AC_VI);
destroy_ring(dma, tx_ring_AC_VO);
destroy_ring(dma, tx... | 140,911,058,670,950,970,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,844 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void b43_dma_handle_txstatus(struct b43_wldev *dev,
const struct b43_txstatus *status)
{
const struct b43_dma_ops *ops;
struct b43_dmaring *ring;
struct b43_dmadesc_generic *desc;
struct b43_dmadesc_meta *meta;
int slot, firstused;
bool frame_succeed;
ring = parse_cookie(dev, status->cookie, &slot);
if... | 125,071,949,489,558,960,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,845 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | int b43_dma_init(struct b43_wldev *dev)
{
struct b43_dma *dma = &dev->dma;
int err;
u64 dmamask;
enum b43_dmatype type;
dmamask = supported_dma_mask(dev);
type = dma_mask_to_engine_type(dmamask);
err = b43_dma_set_mask(dev, dmamask);
if (err)
return err;
err = -ENOMEM;
/* setup TX DMA channels. */
dma->t... | 135,000,762,728,371,630,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,846 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void b43_dma_rx(struct b43_dmaring *ring)
{
const struct b43_dma_ops *ops = ring->ops;
int slot, current_slot;
int used_slots = 0;
B43_WARN_ON(ring->tx);
current_slot = ops->get_current_rxslot(ring);
B43_WARN_ON(!(current_slot >= 0 && current_slot < ring->nr_slots));
slot = ring->current_slot;
for (; slot != ... | 227,495,175,659,729,300,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,847 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int b43_dma_set_mask(struct b43_wldev *dev, u64 mask)
{
u64 orig_mask = mask;
bool fallback = 0;
int err;
/* Try to set the DMA mask. If it fails, try falling back to a
* lower mask, as we can always also support a lower one. */
while (1) {
err = dma_set_mask(dev->dev->dma_dev, mask);
if (!err) {
... | 66,973,504,916,288,720,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,848 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | int b43_dma_tx(struct b43_wldev *dev, struct sk_buff *skb)
{
struct b43_dmaring *ring;
struct ieee80211_hdr *hdr;
int err = 0;
struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
hdr = (struct ieee80211_hdr *)skb->data;
if (info->flags & IEEE80211_TX_CTL_SEND_AFTER_DTIM) {
/* The multicast ring will be sen... | 192,375,390,995,622,720,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,849 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void b43_dma_tx_resume(struct b43_wldev *dev)
{
b43_dma_tx_resume_ring(dev->dma.tx_ring_mcast);
b43_dma_tx_resume_ring(dev->dma.tx_ring_AC_VO);
b43_dma_tx_resume_ring(dev->dma.tx_ring_AC_VI);
b43_dma_tx_resume_ring(dev->dma.tx_ring_AC_BE);
b43_dma_tx_resume_ring(dev->dma.tx_ring_AC_BK);
b43_power_saving_ctl_bits(... | 130,001,566,295,853,900,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,850 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void b43_dma_tx_suspend(struct b43_wldev *dev)
{
b43_power_saving_ctl_bits(dev, B43_PS_AWAKE);
b43_dma_tx_suspend_ring(dev->dma.tx_ring_AC_BK);
b43_dma_tx_suspend_ring(dev->dma.tx_ring_AC_BE);
b43_dma_tx_suspend_ring(dev->dma.tx_ring_AC_VI);
b43_dma_tx_suspend_ring(dev->dma.tx_ring_AC_VO);
b43_dma_tx_suspend_ring... | 47,470,755,263,623,830,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,851 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void b43_dma_tx_suspend_ring(struct b43_dmaring *ring)
{
B43_WARN_ON(!ring->tx);
ring->ops->tx_suspend(ring);
}
| 191,986,643,542,495,560,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,852 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static u16 b43_dmacontroller_base(enum b43_dmatype type, int controller_idx)
{
static const u16 map64[] = {
B43_MMIO_DMA64_BASE0,
B43_MMIO_DMA64_BASE1,
B43_MMIO_DMA64_BASE2,
B43_MMIO_DMA64_BASE3,
B43_MMIO_DMA64_BASE4,
B43_MMIO_DMA64_BASE5,
};
static const u16 map32[] = {
B43_MMIO_DMA32_BASE0,
B43_MMI... | 316,443,107,209,135,330,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,853 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int b43_dmacontroller_rx_reset(struct b43_wldev *dev, u16 mmio_base,
enum b43_dmatype type)
{
int i;
u32 value;
u16 offset;
might_sleep();
offset = (type == B43_DMA_64BIT) ? B43_DMA64_RXCTL : B43_DMA32_RXCTL;
b43_write32(dev, mmio_base + offset, 0);
for (i = 0; i < 10; i++) {
offset = (type ... | 151,575,484,504,716,970,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,854 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int b43_dmacontroller_tx_reset(struct b43_wldev *dev, u16 mmio_base,
enum b43_dmatype type)
{
int i;
u32 value;
u16 offset;
might_sleep();
for (i = 0; i < 10; i++) {
offset = (type == B43_DMA_64BIT) ? B43_DMA64_TXSTATUS :
B43_DMA32_TXSTATUS;
value = b43_read32(dev, mmio_base + offse... | 112,373,775,032,244,590,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,855 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void b43_poison_rx_buffer(struct b43_dmaring *ring, struct sk_buff *skb)
{
struct b43_rxhdr_fw4 *rxhdr;
unsigned char *frame;
/* This poisons the RX buffer to detect DMA failures. */
rxhdr = (struct b43_rxhdr_fw4 *)(skb->data);
rxhdr->frame_len = 0;
B43_WARN_ON(ring->rx_buffersize < ring->frameoffset + ... | 143,086,723,550,090,660,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,856 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static bool b43_rx_buffer_is_poisoned(struct b43_dmaring *ring, struct sk_buff *skb)
{
unsigned char *f = skb->data + ring->frameoffset;
return ((f[0] & f[1] & f[2] & f[3] & f[4] & f[5] & f[6] & f[7]) == 0xFF);
}
| 111,379,809,997,664,530,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,857 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | struct b43_dmaring *b43_setup_dmaring(struct b43_wldev *dev,
int controller_index,
int for_tx,
enum b43_dmatype type)
{
struct b43_dmaring *ring;
int i, err;
dma_addr_t dma_test;
ring = kzalloc(sizeof(*ring), GFP_KERNEL);
if (!ring)
goto out;
ring->nr_slots = B43_RXRING_SLOTS;
i... | 92,389,556,829,076,530,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,858 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void direct_fifo_rx(struct b43_wldev *dev, enum b43_dmatype type,
u16 mmio_base, bool enable)
{
u32 ctl;
if (type == B43_DMA_64BIT) {
ctl = b43_read32(dev, mmio_base + B43_DMA64_RXCTL);
ctl &= ~B43_DMA64_RXDIRECTFIFO;
if (enable)
ctl |= B43_DMA64_RXDIRECTFIFO;
b43_write32(dev, mmio_base + B43... | 306,011,460,147,490,030,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,859 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static enum b43_dmatype dma_mask_to_engine_type(u64 dmamask)
{
if (dmamask == DMA_BIT_MASK(30))
return B43_DMA_30BIT;
if (dmamask == DMA_BIT_MASK(32))
return B43_DMA_32BIT;
if (dmamask == DMA_BIT_MASK(64))
return B43_DMA_64BIT;
B43_WARN_ON(1);
return B43_DMA_30BIT;
}
| 147,743,024,060,642,600,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,860 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int dma_tx_fragment(struct b43_dmaring *ring,
struct sk_buff *skb)
{
const struct b43_dma_ops *ops = ring->ops;
struct ieee80211_tx_info *info = IEEE80211_SKB_CB(skb);
struct b43_private_tx_info *priv_info = b43_get_priv_tx_info(info);
u8 *header;
int slot, old_top_slot, old_used_slots;
int err;
str... | 57,245,586,937,359,210,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,861 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void dmacontroller_cleanup(struct b43_dmaring *ring)
{
if (ring->tx) {
b43_dmacontroller_tx_reset(ring->dev, ring->mmio_base,
ring->type);
if (ring->type == B43_DMA_64BIT) {
b43_dma_write(ring, B43_DMA64_TXRINGLO, 0);
b43_dma_write(ring, B43_DMA64_TXRINGHI, 0);
} else
b43_dma_write(ring, ... | 99,422,450,603,730,260,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,862 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int dmacontroller_setup(struct b43_dmaring *ring)
{
int err = 0;
u32 value;
u32 addrext;
u32 trans = ssb_dma_translation(ring->dev->dev);
if (ring->tx) {
if (ring->type == B43_DMA_64BIT) {
u64 ringbase = (u64) (ring->dmabase);
addrext = ((ringbase >> 32) & SSB_DMA_TRANSLATION_MASK)
>> SSB_D... | 260,762,342,151,710,740,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,863 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void free_all_descbuffers(struct b43_dmaring *ring)
{
struct b43_dmadesc_generic *desc;
struct b43_dmadesc_meta *meta;
int i;
if (!ring->used_slots)
return;
for (i = 0; i < ring->nr_slots; i++) {
desc = ring->ops->idx2desc(ring, i, &meta);
if (!meta->skb || b43_dma_ptr_is_poisoned(meta->skb)) {
B... | 319,132,460,736,227,430,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,864 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void free_ringmemory(struct b43_dmaring *ring)
{
dma_free_coherent(ring->dev->dev->dma_dev, B43_DMA_RINGMEMSIZE,
ring->descbase, ring->dmabase);
}
| 169,427,071,296,985,590,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,865 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static inline int free_slots(struct b43_dmaring *ring)
{
return (ring->nr_slots - ring->used_slots);
}
| 301,675,471,033,554,700,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,866 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static u16 generate_cookie(struct b43_dmaring *ring, int slot)
{
u16 cookie;
/* Use the upper 4 bits of the cookie as
* DMA controller ID and store the slot number
* in the lower 12 bits.
* Note that the cookie must never be 0, as this
* is a special value used in RX path.
* It can also not be 0xFFFF becau... | 257,604,416,496,886,350,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,867 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | dma_addr_t map_descbuffer(struct b43_dmaring *ring,
unsigned char *buf, size_t len, int tx)
{
dma_addr_t dmaaddr;
if (tx) {
dmaaddr = dma_map_single(ring->dev->dev->dma_dev,
buf, len, DMA_TO_DEVICE);
} else {
dmaaddr = dma_map_single(ring->dev->dev->dma_dev,
buf, len, DMA_FROM_DEVICE);
... | 247,377,888,899,923,000,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,868 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static inline int next_slot(struct b43_dmaring *ring, int slot)
{
B43_WARN_ON(!(slot >= -1 && slot <= ring->nr_slots - 1));
if (slot == ring->nr_slots - 1)
return 0;
return slot + 1;
}
| 91,293,503,372,582,570,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,869 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op32_fill_descriptor(struct b43_dmaring *ring,
struct b43_dmadesc_generic *desc,
dma_addr_t dmaaddr, u16 bufsize,
int start, int end, int irq)
{
struct b43_dmadesc32 *descbase = ring->descbase;
int slot;
u32 ctl;
u32 addr;
u32 addrext;
slot = (int)(&(desc->dma32) - descbase);
B43_WARN... | 278,759,343,111,357,240,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,870 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int op32_get_current_rxslot(struct b43_dmaring *ring)
{
u32 val;
val = b43_dma_read(ring, B43_DMA32_RXSTATUS);
val &= B43_DMA32_RXDPTR;
return (val / sizeof(struct b43_dmadesc32));
}
| 55,063,100,163,543,370,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,871 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | struct b43_dmadesc_generic *op32_idx2desc(struct b43_dmaring *ring,
int slot,
struct b43_dmadesc_meta **meta)
{
struct b43_dmadesc32 *desc;
*meta = &(ring->meta[slot]);
desc = ring->descbase;
desc = &(desc[slot]);
return (struct b43_dmadesc_generic *)desc;
}
| 183,612,840,094,649,900,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,872 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op32_poke_tx(struct b43_dmaring *ring, int slot)
{
b43_dma_write(ring, B43_DMA32_TXINDEX,
(u32) (slot * sizeof(struct b43_dmadesc32)));
}
| 41,793,065,163,772,645,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,873 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op32_set_current_rxslot(struct b43_dmaring *ring, int slot)
{
b43_dma_write(ring, B43_DMA32_RXINDEX,
(u32) (slot * sizeof(struct b43_dmadesc32)));
}
| 108,237,306,970,580,640,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,874 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op32_tx_resume(struct b43_dmaring *ring)
{
b43_dma_write(ring, B43_DMA32_TXCTL, b43_dma_read(ring, B43_DMA32_TXCTL)
& ~B43_DMA32_TXSUSPEND);
}
| 288,358,961,677,813,770,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,875 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op32_tx_suspend(struct b43_dmaring *ring)
{
b43_dma_write(ring, B43_DMA32_TXCTL, b43_dma_read(ring, B43_DMA32_TXCTL)
| B43_DMA32_TXSUSPEND);
}
| 275,870,919,211,548,400,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,876 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op64_fill_descriptor(struct b43_dmaring *ring,
struct b43_dmadesc_generic *desc,
dma_addr_t dmaaddr, u16 bufsize,
int start, int end, int irq)
{
struct b43_dmadesc64 *descbase = ring->descbase;
int slot;
u32 ctl0 = 0, ctl1 = 0;
u32 addrlo, addrhi;
u32 addrext;
slot = (int)(&(desc->dma6... | 210,088,549,302,386,850,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,877 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int op64_get_current_rxslot(struct b43_dmaring *ring)
{
u32 val;
val = b43_dma_read(ring, B43_DMA64_RXSTATUS);
val &= B43_DMA64_RXSTATDPTR;
return (val / sizeof(struct b43_dmadesc64));
}
| 203,485,145,316,402,180,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,878 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | struct b43_dmadesc_generic *op64_idx2desc(struct b43_dmaring *ring,
int slot,
struct b43_dmadesc_meta **meta)
{
struct b43_dmadesc64 *desc;
*meta = &(ring->meta[slot]);
desc = ring->descbase;
desc = &(desc[slot]);
return (struct b43_dmadesc_generic *)desc;
}
| 14,480,480,599,479,707,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,879 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op64_poke_tx(struct b43_dmaring *ring, int slot)
{
b43_dma_write(ring, B43_DMA64_TXINDEX,
(u32) (slot * sizeof(struct b43_dmadesc64)));
}
| 198,216,350,281,930,200,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,880 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op64_set_current_rxslot(struct b43_dmaring *ring, int slot)
{
b43_dma_write(ring, B43_DMA64_RXINDEX,
(u32) (slot * sizeof(struct b43_dmadesc64)));
}
| 83,968,129,477,618,490,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,881 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op64_tx_resume(struct b43_dmaring *ring)
{
b43_dma_write(ring, B43_DMA64_TXCTL, b43_dma_read(ring, B43_DMA64_TXCTL)
& ~B43_DMA64_TXSUSPEND);
}
| 46,323,814,358,932,960,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,882 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void op64_tx_suspend(struct b43_dmaring *ring)
{
b43_dma_write(ring, B43_DMA64_TXCTL, b43_dma_read(ring, B43_DMA64_TXCTL)
| B43_DMA64_TXSUSPEND);
}
| 176,731,798,772,912,200,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,883 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | struct b43_dmaring *parse_cookie(struct b43_wldev *dev, u16 cookie, int *slot)
{
struct b43_dma *dma = &dev->dma;
struct b43_dmaring *ring = NULL;
switch (cookie & 0xF000) {
case 0x1000:
ring = dma->tx_ring_AC_BK;
break;
case 0x2000:
ring = dma->tx_ring_AC_BE;
break;
case 0x3000:
ring = dma->tx_ring_AC... | 62,092,842,014,073,290,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,884 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static inline int prev_slot(struct b43_dmaring *ring, int slot)
{
B43_WARN_ON(!(slot >= 0 && slot <= ring->nr_slots - 1));
if (slot == 0)
return ring->nr_slots - 1;
return slot - 1;
}
| 12,887,356,416,204,017,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,885 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static inline int request_slot(struct b43_dmaring *ring)
{
int slot;
B43_WARN_ON(!ring->tx);
B43_WARN_ON(ring->stopped);
B43_WARN_ON(free_slots(ring) == 0);
slot = next_slot(ring, ring->current_slot);
ring->current_slot = slot;
ring->used_slots++;
update_max_used_slots(ring, ring->used_slots);
return slot;... | 112,177,942,545,947,300,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,886 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static struct b43_dmaring *select_ring_by_priority(struct b43_wldev *dev,
u8 queue_prio)
{
struct b43_dmaring *ring;
if (dev->qos_enabled) {
/* 0 = highest priority */
switch (queue_prio) {
default:
B43_WARN_ON(1);
/* fallthrough */
case 0:
ring = dev->dma.tx_ring_AC_VO;
break;
case 1:... | 104,067,352,819,118,550,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,887 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static int setup_rx_descbuffer(struct b43_dmaring *ring,
struct b43_dmadesc_generic *desc,
struct b43_dmadesc_meta *meta, gfp_t gfp_flags)
{
dma_addr_t dmaaddr;
struct sk_buff *skb;
B43_WARN_ON(ring->tx);
skb = __dev_alloc_skb(ring->rx_buffersize, gfp_flags);
if (unlikely(!skb))
return -ENO... | 54,180,949,973,099,350,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,888 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static inline int should_inject_overflow(struct b43_dmaring *ring)
{
#ifdef CONFIG_B43_DEBUG
if (unlikely(b43_debug(ring->dev, B43_DBG_DMAOVERFLOW))) {
/* Check if we should inject another ringbuffer overflow
* to test handling of this situation in the stack. */
unsigned long next_overflow;
next_overflow = r... | 289,543,813,694,541,770,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,889 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static u64 supported_dma_mask(struct b43_wldev *dev)
{
u32 tmp;
u16 mmio_base;
tmp = b43_read32(dev, SSB_TMSHIGH);
if (tmp & SSB_TMSHIGH_DMA64)
return DMA_BIT_MASK(64);
mmio_base = b43_dmacontroller_base(0, 0);
b43_write32(dev, mmio_base + B43_DMA32_TXCTL, B43_DMA32_TXADDREXT_MASK);
tmp = b43_read32(dev, mmio... | 151,597,833,450,584,050,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,890 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void sync_descbuffer_for_cpu(struct b43_dmaring *ring,
dma_addr_t addr, size_t len)
{
B43_WARN_ON(ring->tx);
dma_sync_single_for_cpu(ring->dev->dev->dma_dev,
addr, len, DMA_FROM_DEVICE);
}
| 5,650,183,268,640,270,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,891 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void sync_descbuffer_for_device(struct b43_dmaring *ring,
dma_addr_t addr, size_t len)
{
B43_WARN_ON(ring->tx);
dma_sync_single_for_device(ring->dev->dev->dma_dev,
addr, len, DMA_FROM_DEVICE);
}
| 113,001,751,268,060,580,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,892 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void unmap_descbuffer(struct b43_dmaring *ring,
dma_addr_t addr, size_t len, int tx)
{
if (tx) {
dma_unmap_single(ring->dev->dev->dma_dev,
addr, len, DMA_TO_DEVICE);
} else {
dma_unmap_single(ring->dev->dev->dma_dev,
addr, len, DMA_FROM_DEVICE);
}
}
| 290,171,468,526,767,830,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,893 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | static void update_max_used_slots(struct b43_dmaring *ring,
int current_used_slots)
{
if (current_used_slots <= ring->max_used_slots)
return;
ring->max_used_slots = current_used_slots;
if (b43_debug(ring->dev, B43_DBG_DMAVERBOSE)) {
b43dbg(ring->dev->wl,
"max_used_slots increased to %d on %s ring ... | 130,746,306,435,935,810,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,894 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 0 | void update_max_used_slots(struct b43_dmaring *ring, int current_used_slots)
{
}
| 226,868,767,203,845,100,000,000,000,000,000,000,000 | dma.c | 261,830,879,301,148,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
26,895 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static void __fuse_get_request(struct fuse_req *req)
{
atomic_inc(&req->count);
}
| 314,932,198,971,655,000,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,896 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static void __fuse_put_request(struct fuse_req *req)
{
BUG_ON(atomic_read(&req->count) < 2);
atomic_dec(&req->count);
}
| 285,403,896,605,660,940,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,897 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static void block_sigs(sigset_t *oldset)
{
sigset_t mask;
siginitsetinv(&mask, sigmask(SIGKILL));
sigprocmask(SIG_BLOCK, &mask, oldset);
}
| 25,253,986,523,079,507,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,898 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int copy_out_args(struct fuse_copy_state *cs, struct fuse_out *out,
unsigned nbytes)
{
unsigned reqsize = sizeof(struct fuse_out_header);
if (out->h.error)
return nbytes != reqsize ? -EINVAL : 0;
reqsize += len_args(out->numargs, out->args);
if (reqsize < nbytes || (reqsize > nbytes && !out->argvar)... | 153,496,811,465,426,780,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,899 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static struct fuse_forget_link *dequeue_forget(struct fuse_conn *fc,
unsigned max,
unsigned *countp)
{
struct fuse_forget_link *head = fc->forget_list_head.next;
struct fuse_forget_link **newhead = &head;
unsigned count;
for (count = 0; *newhead != NULL && count < max; count++)
newhead = ... | 168,480,960,735,307,800,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,900 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static void end_polls(struct fuse_conn *fc)
{
struct rb_node *p;
p = rb_first(&fc->polled_files);
while (p) {
struct fuse_file *ff;
ff = rb_entry(p, struct fuse_file, polled_node);
wake_up_interruptible_all(&ff->poll_wait);
p = rb_next(p);
}
}
| 302,126,961,937,764,230,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,901 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int forget_pending(struct fuse_conn *fc)
{
return fc->forget_list_head.next != NULL;
}
| 175,283,056,429,065,720,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,902 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | void fuse_abort_conn(struct fuse_conn *fc)
{
spin_lock(&fc->lock);
if (fc->connected) {
fc->connected = 0;
fc->blocked = 0;
end_io_requests(fc);
end_queued_requests(fc);
end_polls(fc);
wake_up_all(&fc->waitq);
wake_up_all(&fc->blocked_waitq);
kill_fasync(&fc->fasync, SIGIO, POLL_IN);
}
spin_unlock(&... | 68,977,717,990,112,380,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,903 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_check_page(struct page *page)
{
if (page_mapcount(page) ||
page->mapping != NULL ||
page_count(page) != 1 ||
(page->flags & PAGE_FLAGS_CHECK_AT_PREP &
~(1 << PG_locked |
1 << PG_referenced |
1 << PG_uptodate |
1 << PG_lru |
1 << PG_active |
1... | 257,646,472,041,074,000,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,904 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_copy_args(struct fuse_copy_state *cs, unsigned numargs,
unsigned argpages, struct fuse_arg *args,
int zeroing)
{
int err = 0;
unsigned i;
for (i = 0; !err && i < numargs; i++) {
struct fuse_arg *arg = &args[i];
if (i == numargs - 1 && argpages)
err = fuse_copy_pages(cs, arg->size, ... | 40,471,935,343,359,862,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,905 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_copy_do(struct fuse_copy_state *cs, void **val, unsigned *size)
{
unsigned ncpy = min(*size, cs->len);
if (val) {
if (cs->write)
memcpy(cs->buf, *val, ncpy);
else
memcpy(*val, cs->buf, ncpy);
*val += ncpy;
}
*size -= ncpy;
cs->len -= ncpy;
cs->buf += ncpy;
return ncpy;
}
| 326,964,996,635,991,330,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,906 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_copy_fill(struct fuse_copy_state *cs)
{
unsigned long offset;
int err;
unlock_request(cs->fc, cs->req);
fuse_copy_finish(cs);
if (cs->pipebufs) {
struct pipe_buffer *buf = cs->pipebufs;
if (!cs->write) {
err = buf->ops->confirm(cs->pipe, buf);
if (err)
return err;
BUG_ON(!cs->nr... | 211,675,172,631,857,700,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,907 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static void fuse_copy_finish(struct fuse_copy_state *cs)
{
if (cs->currbuf) {
struct pipe_buffer *buf = cs->currbuf;
if (!cs->write) {
buf->ops->unmap(cs->pipe, buf, cs->mapaddr);
} else {
kunmap(buf->page);
buf->len = PAGE_SIZE - cs->len;
}
cs->currbuf = NULL;
cs->mapaddr = NULL;
} else if (cs-... | 174,579,985,528,625,850,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,908 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static void fuse_copy_init(struct fuse_copy_state *cs, struct fuse_conn *fc,
int write,
const struct iovec *iov, unsigned long nr_segs)
{
memset(cs, 0, sizeof(*cs));
cs->fc = fc;
cs->write = write;
cs->iov = iov;
cs->nr_segs = nr_segs;
}
| 303,549,778,518,720,400,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,909 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_copy_one(struct fuse_copy_state *cs, void *val, unsigned size)
{
while (size) {
if (!cs->len) {
int err = fuse_copy_fill(cs);
if (err)
return err;
}
fuse_copy_do(cs, &val, &size);
}
return 0;
}
| 78,133,793,770,845,500,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,910 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_copy_page(struct fuse_copy_state *cs, struct page **pagep,
unsigned offset, unsigned count, int zeroing)
{
int err;
struct page *page = *pagep;
if (page && zeroing && count < PAGE_SIZE)
clear_highpage(page);
while (count) {
if (cs->write && cs->pipebufs && page) {
return fuse_ref_page(... | 219,410,951,408,798,600,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,911 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_copy_pages(struct fuse_copy_state *cs, unsigned nbytes,
int zeroing)
{
unsigned i;
struct fuse_req *req = cs->req;
unsigned offset = req->page_offset;
unsigned count = min(nbytes, (unsigned) PAGE_SIZE - offset);
for (i = 0; i < req->num_pages && (nbytes || zeroing); i++) {
int err;
err ... | 290,431,419,272,238,800,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,912 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | void fuse_dev_cleanup(void)
{
misc_deregister(&fuse_miscdevice);
kmem_cache_destroy(fuse_req_cachep);
}
| 115,619,130,936,751,950,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,913 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static ssize_t fuse_dev_do_read(struct fuse_conn *fc, struct file *file,
struct fuse_copy_state *cs, size_t nbytes)
{
int err;
struct fuse_req *req;
struct fuse_in *in;
unsigned reqsize;
restart:
spin_lock(&fc->lock);
err = -EAGAIN;
if ((file->f_flags & O_NONBLOCK) && fc->connected &&
!request_pending... | 292,342,694,740,123,260,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,914 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static ssize_t fuse_dev_do_write(struct fuse_conn *fc,
struct fuse_copy_state *cs, size_t nbytes)
{
int err;
struct fuse_req *req;
struct fuse_out_header oh;
if (nbytes < sizeof(struct fuse_out_header))
return -EINVAL;
err = fuse_copy_one(cs, &oh, sizeof(oh));
if (err)
goto err_finish;
err = -EINVAL;... | 337,834,719,466,889,030,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,915 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | static int fuse_dev_fasync(int fd, struct file *file, int on)
{
struct fuse_conn *fc = fuse_get_conn(file);
if (!fc)
return -EPERM;
/* No locking - fasync_helper does its own locking */
return fasync_helper(fd, file, on, &fc->fasync);
}
| 323,251,535,707,845,100,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
26,916 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 0 | int __init fuse_dev_init(void)
{
int err = -ENOMEM;
fuse_req_cachep = kmem_cache_create("fuse_request",
sizeof(struct fuse_req),
0, 0, NULL);
if (!fuse_req_cachep)
goto out;
err = misc_register(&fuse_miscdevice);
if (err)
goto out_cache_clean;
return 0;
out_cache_clean:
kmem_cache_destr... | 324,825,070,314,279,600,000,000,000,000,000,000,000 | dev.c | 218,502,694,604,823,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.