idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
29,272 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static void ldm_free_vblks (struct list_head *lh)
{
struct list_head *item, *tmp;
BUG_ON (!lh);
list_for_each_safe (item, tmp, lh)
kfree (list_entry (item, struct vblk, list));
}
| 95,154,644,091,707,020,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,273 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static struct vblk * ldm_get_disk_objid (const struct ldmdb *ldb)
{
struct list_head *item;
BUG_ON (!ldb);
list_for_each (item, &ldb->v_disk) {
struct vblk *v = list_entry (item, struct vblk, list);
if (!memcmp (v->vblk.disk.disk_id, ldb->ph.disk_id, GUID_SIZE))
return v;
}
return NULL;
}
| 62,811,873,135,120,480,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,274 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_get_vblks(struct parsed_partitions *state, unsigned long base,
struct ldmdb *ldb)
{
int size, perbuf, skip, finish, s, v, recs;
u8 *data = NULL;
Sector sect;
bool result = false;
LIST_HEAD (frags);
BUG_ON(!state || !ldb);
size = ldb->vm.vblk_size;
perbuf = 512 / size;
skip = ldb->vm.... | 161,428,187,363,971,740,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,275 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static u64 ldm_get_vnum (const u8 *block)
{
u64 tmp = 0;
u8 length;
BUG_ON (!block);
length = *block++;
if (length && length <= 8)
while (length--)
tmp = (tmp << 8) | *block++;
else
ldm_error ("Illegal length %d.", length);
return tmp;
}
| 129,504,720,534,008,750,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,276 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static int ldm_get_vstr (const u8 *block, u8 *buffer, int buflen)
{
int length;
BUG_ON (!block || !buffer);
length = block[0];
if (length >= buflen) {
ldm_error ("Truncating string %d -> %d.", length, buflen);
length = buflen - 1;
}
memcpy (buffer, block + 1, length);
buffer[length] = 0;
return length;
}
| 283,293,767,044,924,540,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,277 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_ldmdb_add (u8 *data, int len, struct ldmdb *ldb)
{
struct vblk *vb;
struct list_head *item;
BUG_ON (!data || !ldb);
vb = kmalloc (sizeof (*vb), GFP_KERNEL);
if (!vb) {
ldm_crit ("Out of memory.");
return false;
}
if (!ldm_parse_vblk (data, len, vb)) {
kfree(vb);
return false; /* Alre... | 185,074,947,331,356,400,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,278 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_cmp3 (const u8 *buffer, int buflen, struct vblk *vb)
{
int r_objid, r_name, r_vstate, r_child, r_parent, r_stripe, r_cols, len;
struct vblk_comp *comp;
BUG_ON (!buffer || !vb);
r_objid = ldm_relative (buffer, buflen, 0x18, 0);
r_name = ldm_relative (buffer, buflen, 0x18, r_objid);
r_vst... | 78,153,343,489,379,520,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,279 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static int ldm_parse_dgr3 (const u8 *buffer, int buflen, struct vblk *vb)
{
int r_objid, r_name, r_diskid, r_id1, r_id2, len;
struct vblk_dgrp *dgrp;
BUG_ON (!buffer || !vb);
r_objid = ldm_relative (buffer, buflen, 0x18, 0);
r_name = ldm_relative (buffer, buflen, 0x18, r_objid);
r_diskid = ldm_relative (buff... | 45,715,644,504,777,880,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,280 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static int ldm_parse_hexbyte (const u8 *src)
{
unsigned int x; /* For correct wrapping */
int h;
/* high part */
x = h = hex_to_bin(src[0]);
if (h < 0)
return -1;
/* low part */
h = hex_to_bin(src[1]);
if (h < 0)
return -1;
return (x << 4) + h;
}
| 82,129,795,523,672,570,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,281 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_privhead(const u8 *data, struct privhead *ph)
{
bool is_vista = false;
BUG_ON(!data || !ph);
if (MAGIC_PRIVHEAD != get_unaligned_be64(data)) {
ldm_error("Cannot find PRIVHEAD structure. LDM database is"
" corrupt. Aborting.");
return false;
}
ph->ver_major = get_unaligned_be16(data + ... | 191,050,957,447,840,200,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,282 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_prt3(const u8 *buffer, int buflen, struct vblk *vb)
{
int r_objid, r_name, r_size, r_parent, r_diskid, r_index, len;
struct vblk_part *part;
BUG_ON(!buffer || !vb);
r_objid = ldm_relative(buffer, buflen, 0x18, 0);
if (r_objid < 0) {
ldm_error("r_objid %d < 0", r_objid);
return false;
}
... | 208,840,267,008,834,400,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,283 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_tocblock (const u8 *data, struct tocblock *toc)
{
BUG_ON (!data || !toc);
if (MAGIC_TOCBLOCK != get_unaligned_be64(data)) {
ldm_crit ("Cannot find TOCBLOCK, database may be corrupt.");
return false;
}
strncpy (toc->bitmap1_name, data + 0x24, sizeof (toc->bitmap1_name));
toc->bitmap1_name... | 306,485,277,138,857,270,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,284 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_vblk (const u8 *buf, int len, struct vblk *vb)
{
bool result = false;
int r_objid;
BUG_ON (!buf || !vb);
r_objid = ldm_relative (buf, len, 0x18, 0);
if (r_objid < 0) {
ldm_error ("VBLK header is corrupt.");
return false;
}
vb->flags = buf[0x12];
vb->type = buf[0x13];
vb->obj_id ... | 136,178,643,727,089,080,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,285 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_vmdb (const u8 *data, struct vmdb *vm)
{
BUG_ON (!data || !vm);
if (MAGIC_VMDB != get_unaligned_be32(data)) {
ldm_crit ("Cannot find the VMDB, database may be corrupt.");
return false;
}
vm->ver_major = get_unaligned_be16(data + 0x12);
vm->ver_minor = get_unaligned_be16(data + 0x14);
i... | 123,048,109,379,786,070,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,286 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_parse_vol5(const u8 *buffer, int buflen, struct vblk *vb)
{
int r_objid, r_name, r_vtype, r_disable_drive_letter, r_child, r_size;
int r_id1, r_id2, r_size2, r_drive, len;
struct vblk_volu *volu;
BUG_ON(!buffer || !vb);
r_objid = ldm_relative(buffer, buflen, 0x18, 0);
if (r_objid < 0) {
ldm_err... | 67,916,213,607,454,950,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,287 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | int ldm_partition(struct parsed_partitions *state)
{
struct ldmdb *ldb;
unsigned long base;
int result = -1;
BUG_ON(!state);
/* Look for signs of a Dynamic Disk */
if (!ldm_validate_partition_table(state))
return 0;
ldb = kmalloc (sizeof (*ldb), GFP_KERNEL);
if (!ldb) {
ldm_crit ("Out of memory.");
go... | 28,603,198,487,705,760,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,288 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static int ldm_relative(const u8 *buffer, int buflen, int base, int offset)
{
base += offset;
if (!buffer || offset < 0 || base > buflen) {
if (!buffer)
ldm_error("!buffer");
if (offset < 0)
ldm_error("offset (%d) < 0", offset);
if (base > buflen)
ldm_error("base (%d) > buflen (%d)", base, buflen);
... | 192,421,795,727,188,600,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,289 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_validate_partition_table(struct parsed_partitions *state)
{
Sector sect;
u8 *data;
struct partition *p;
int i;
bool result = false;
BUG_ON(!state);
data = read_part_sector(state, 0, §);
if (!data) {
ldm_crit ("Disk read failed.");
return false;
}
if (*(__le16*) (data + 0x01FE) != cp... | 44,145,490,366,189,450,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,290 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_validate_privheads(struct parsed_partitions *state,
struct privhead *ph1)
{
static const int off[3] = { OFF_PRIV1, OFF_PRIV2, OFF_PRIV3 };
struct privhead *ph[3] = { ph1 };
Sector sect;
u8 *data;
bool result = false;
long num_sects;
int i;
BUG_ON (!state || !ph1);
ph[1] = kmalloc (size... | 252,952,686,055,349,970,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,291 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 0 | static bool ldm_validate_tocblocks(struct parsed_partitions *state,
unsigned long base, struct ldmdb *ldb)
{
static const int off[4] = { OFF_TOCB1, OFF_TOCB2, OFF_TOCB3, OFF_TOCB4};
struct tocblock *tb[4];
struct privhead *ph;
Sector sect;
u8 *data;
int i, nr_tbs;
bool result = false;
BUG_ON(!state || !... | 236,855,593,940,620,000,000,000,000,000,000,000,000 | ldm.c | 193,102,196,756,441,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
29,292 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static inline u8 ip4_frag_ecn(u8 tos)
{
tos = (tos & INET_ECN_MASK) + 1;
/*
* After the last operation we have (in binary):
* INET_ECN_NOT_ECT => 001
* INET_ECN_ECT_1 => 010
* INET_ECN_ECT_0 => 011
* INET_ECN_CE => 100
*/
return (tos & 2) ? 0 : tos;
}
| 1,987,634,889,536,484,300,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,293 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static __inline__ void ip4_frag_free(struct inet_frag_queue *q)
{
struct ipq *qp;
qp = container_of(q, struct ipq, q);
if (qp->peer)
inet_putpeer(qp->peer);
}
| 272,096,561,148,696,430,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,294 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static void ip4_frag_init(struct inet_frag_queue *q, void *a)
{
struct ipq *qp = container_of(q, struct ipq, q);
struct ip4_create_arg *arg = a;
qp->protocol = arg->iph->protocol;
qp->id = arg->iph->id;
qp->ecn = ip4_frag_ecn(arg->iph->tos);
qp->saddr = arg->iph->saddr;
qp->daddr = arg->iph->daddr;
qp->user = ... | 9,857,679,004,120,880,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,295 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static int ip4_frag_match(struct inet_frag_queue *q, void *a)
{
struct ipq *qp;
struct ip4_create_arg *arg = a;
qp = container_of(q, struct ipq, q);
return qp->id == arg->iph->id &&
qp->saddr == arg->iph->saddr &&
qp->daddr == arg->iph->daddr &&
qp->protocol == arg->iph->protocol &&
qp->user == arg->us... | 26,058,397,521,246,700,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,296 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static void ip4_frags_ctl_register(void)
{
register_net_sysctl_rotable(net_ipv4_ctl_path, ip4_frags_ctl_table);
}
| 196,129,405,723,270,350,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,297 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static inline void ip4_frags_ctl_register(void)
{
}
| 212,386,813,126,162,930,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,298 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static int __net_init ip4_frags_ns_ctl_register(struct net *net)
{
struct ctl_table *table;
struct ctl_table_header *hdr;
table = ip4_frags_ns_ctl_table;
if (!net_eq(net, &init_net)) {
table = kmemdup(table, sizeof(ip4_frags_ns_ctl_table), GFP_KERNEL);
if (table == NULL)
goto err_alloc;
table[0].data = &... | 86,754,080,960,743,730,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,299 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static inline int ip4_frags_ns_ctl_register(struct net *net)
{
return 0;
}
| 74,362,655,091,165,910,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,300 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static void __net_exit ip4_frags_ns_ctl_unregister(struct net *net)
{
struct ctl_table *table;
table = net->ipv4.frags_hdr->ctl_table_arg;
unregister_net_sysctl_table(net->ipv4.frags_hdr);
kfree(table);
}
| 161,468,824,893,565,830,000,000,000,000,000,000,000 | ip_fragment.c | 145,317,037,223,021,030,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,301 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static inline void ip4_frags_ns_ctl_unregister(struct net *net)
{
}
| 27,691,799,920,676,230,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,302 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static void ip_evictor(struct net *net)
{
int evicted;
evicted = inet_frag_evictor(&net->ipv4.frags, &ip4_frags);
if (evicted)
IP_ADD_STATS_BH(net, IPSTATS_MIB_REASMFAILS, evicted);
}
| 299,830,351,345,681,930,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,303 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | int ip_frag_mem(struct net *net)
{
return atomic_read(&net->ipv4.frags.mem);
}
| 107,147,094,153,196,660,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,304 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static int ip_frag_queue(struct ipq *qp, struct sk_buff *skb)
{
struct sk_buff *prev, *next;
struct net_device *dev;
int flags, offset;
int ihl, end;
int err = -ENOENT;
u8 ecn;
if (qp->q.last_in & INET_FRAG_COMPLETE)
goto err;
if (!(IPCB(skb)->flags & IPSKB_FRAG_COMPLETE) &&
unlikely(ip_frag_too_far(qp... | 116,915,016,931,798,400,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,305 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static int ip_frag_reasm(struct ipq *qp, struct sk_buff *prev,
struct net_device *dev)
{
struct net *net = container_of(qp->q.net, struct net, ipv4.frags);
struct iphdr *iph;
struct sk_buff *fp, *head = qp->q.fragments;
int len;
int ihlen;
int err;
ipq_kill(qp);
/* Make the one we just received the head. ... | 87,705,460,092,046,080,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,306 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static int ip_frag_reinit(struct ipq *qp)
{
struct sk_buff *fp;
if (!mod_timer(&qp->q.timer, jiffies + qp->q.net->timeout)) {
atomic_inc(&qp->q.refcnt);
return -ETIMEDOUT;
}
fp = qp->q.fragments;
do {
struct sk_buff *xp = fp->next;
frag_kfree_skb(qp->q.net, fp);
fp = xp;
} while (fp);
qp->q.last_in ... | 328,922,628,508,362,530,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,307 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static inline int ip_frag_too_far(struct ipq *qp)
{
struct inet_peer *peer = qp->peer;
unsigned int max = sysctl_ipfrag_max_dist;
unsigned int start, end;
int rc;
if (!peer || !max)
return 0;
start = qp->rid;
end = atomic_inc_return(&peer->rid);
qp->rid = end;
rc = qp->q.fragments && (end - start) > max;... | 77,831,409,587,278,790,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,308 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static __inline__ void ipq_put(struct ipq *ipq)
{
inet_frag_put(&ipq->q, &ip4_frags);
}
| 268,063,678,650,201,200,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,309 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static unsigned int ipqhashfn(__be16 id, __be32 saddr, __be32 daddr, u8 prot)
{
return jhash_3words((__force u32)id << 16 | prot,
(__force u32)saddr, (__force u32)daddr,
ip4_frags.rnd) & (INETFRAGS_HASHSZ - 1);
}
| 168,695,604,265,335,660,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,310 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static void __net_exit ipv4_frags_exit_net(struct net *net)
{
ip4_frags_ns_ctl_unregister(net);
inet_frags_exit_net(&net->ipv4.frags, &ip4_frags);
}
| 338,118,710,028,261,800,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,311 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 0 | static int __net_init ipv4_frags_init_net(struct net *net)
{
/*
* Fragment cache limits. We will commit 256K at one time. Should we
* cross that limit we will prune down to 192K. This should cope with
* even the most extreme cases without allowing an attacker to
* measurably harm machine performance.
*/
net... | 157,532,461,183,437,960,000,000,000,000,000,000,000 | ip_fragment.c | 88,100,855,803,852,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
29,312 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | void __ecryptfs_printk(const char *fmt, ...)
{
va_list args;
va_start(args, fmt);
if (fmt[1] == '7') { /* KERN_DEBUG */
if (ecryptfs_verbosity >= 1)
vprintk(fmt, args);
} else
vprintk(fmt, args);
va_end(args);
}
| 312,076,362,385,451,680,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,313 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static int do_sysfs_registration(void)
{
int rc;
ecryptfs_kobj = kobject_create_and_add("ecryptfs", fs_kobj);
if (!ecryptfs_kobj) {
printk(KERN_ERR "Unable to create ecryptfs kset\n");
rc = -ENOMEM;
goto out;
}
rc = sysfs_create_group(ecryptfs_kobj, &attr_group);
if (rc) {
printk(KERN_ERR
"Unabl... | 62,924,652,842,015,640,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,314 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static void do_sysfs_unregistration(void)
{
sysfs_remove_group(ecryptfs_kobj, &attr_group);
kobject_put(ecryptfs_kobj);
}
| 234,858,901,716,342,670,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,315 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static void __exit ecryptfs_exit(void)
{
int rc;
rc = ecryptfs_destroy_crypto();
if (rc)
printk(KERN_ERR "Failure whilst attempting to destroy crypto; "
"rc = [%d]\n", rc);
ecryptfs_release_messaging();
ecryptfs_destroy_kthread();
do_sysfs_unregistration();
unregister_filesystem(&ecryptfs_fs_type);
... | 72,533,203,124,185,815,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,316 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static void ecryptfs_free_kmem_caches(void)
{
int i;
for (i = 0; i < ARRAY_SIZE(ecryptfs_cache_infos); i++) {
struct ecryptfs_cache_info *info;
info = &ecryptfs_cache_infos[i];
if (*(info->cache))
kmem_cache_destroy(*(info->cache));
}
}
| 83,065,153,291,968,955,000,000,000,000,000,000,000 | main.c | 327,155,547,214,049,540,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,317 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static int __init ecryptfs_init(void)
{
int rc;
if (ECRYPTFS_DEFAULT_EXTENT_SIZE > PAGE_CACHE_SIZE) {
rc = -EINVAL;
ecryptfs_printk(KERN_ERR, "The eCryptfs extent size is "
"larger than the host's page size, and so "
"eCryptfs cannot run on this system. The "
"default eCryptfs extent size is [%u] byt... | 14,257,939,546,257,488,000,000,000,000,000,000,000 | main.c | 327,155,547,214,049,540,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,318 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static int ecryptfs_init_global_auth_toks(
struct ecryptfs_mount_crypt_stat *mount_crypt_stat)
{
struct ecryptfs_global_auth_tok *global_auth_tok;
struct ecryptfs_auth_tok *auth_tok;
int rc = 0;
list_for_each_entry(global_auth_tok,
&mount_crypt_stat->global_auth_tok_list,
mount_crypt_stat_list) {
... | 147,238,539,660,219,120,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,319 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static int ecryptfs_init_kmem_caches(void)
{
int i;
for (i = 0; i < ARRAY_SIZE(ecryptfs_cache_infos); i++) {
struct ecryptfs_cache_info *info;
info = &ecryptfs_cache_infos[i];
*(info->cache) = kmem_cache_create(info->name, info->size,
0, SLAB_HWCACHE_ALIGN, info->ctor);
if (!*(info->cache)) {
ecryptf... | 130,139,884,914,856,790,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,320 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static int ecryptfs_init_lower_file(struct dentry *dentry,
struct file **lower_file)
{
const struct cred *cred = current_cred();
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
struct vfsmount *lower_mnt = ecryptfs_dentry_to_lower_mnt(dentry);
int rc;
rc = ecryptfs_privileged_open(lower_fi... | 21,058,873,925,409,862,000,000,000,000,000,000,000 | main.c | 327,155,547,214,049,540,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,321 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static void ecryptfs_init_mount_crypt_stat(
struct ecryptfs_mount_crypt_stat *mount_crypt_stat)
{
memset((void *)mount_crypt_stat, 0,
sizeof(struct ecryptfs_mount_crypt_stat));
INIT_LIST_HEAD(&mount_crypt_stat->global_auth_tok_list);
mutex_init(&mount_crypt_stat->global_auth_tok_list_mutex);
mount_crypt_st... | 148,028,023,797,480,220,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,322 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static void ecryptfs_kill_block_super(struct super_block *sb)
{
struct ecryptfs_sb_info *sb_info = ecryptfs_superblock_to_private(sb);
kill_anon_super(sb);
if (!sb_info)
return;
ecryptfs_destroy_mount_crypt_stat(&sb_info->mount_crypt_stat);
bdi_destroy(&sb_info->bdi);
kmem_cache_free(ecryptfs_sb_info_cache, sb_... | 124,447,599,881,849,210,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,323 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | void ecryptfs_put_lower_file(struct inode *inode)
{
struct ecryptfs_inode_info *inode_info;
inode_info = ecryptfs_inode_to_private(inode);
if (atomic_dec_and_mutex_lock(&inode_info->lower_file_count,
&inode_info->lower_file_mutex)) {
fput(inode_info->lower_file);
inode_info->lower_file = NULL;
mutex... | 332,716,244,053,197,840,000,000,000,000,000,000,000 | main.c | 327,155,547,214,049,540,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,324 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | inode_info_init_once(void *vptr)
{
struct ecryptfs_inode_info *ei = (struct ecryptfs_inode_info *)vptr;
inode_init_once(&ei->vfs_inode);
}
| 133,103,022,687,958,440,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,325 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 0 | static ssize_t version_show(struct kobject *kobj,
struct kobj_attribute *attr, char *buff)
{
return snprintf(buff, PAGE_SIZE, "%d\n", ECRYPTFS_VERSIONING_MASK);
}
| 174,683,589,180,117,650,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
29,454 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | static long cp_oldabi_stat64(struct kstat *stat,
struct oldabi_stat64 __user *statbuf)
{
struct oldabi_stat64 tmp;
tmp.st_dev = huge_encode_dev(stat->dev);
tmp.__pad1 = 0;
tmp.__st_ino = stat->ino;
tmp.st_mode = stat->mode;
tmp.st_nlink = stat->nlink;
tmp.st_uid = stat->uid;
tmp.st_gid = stat->gid;
tm... | 5,824,222,993,836,275,000,000,000,000,000,000,000 | sys_oabi-compat.c | 260,668,981,499,625,920,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,455 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_bind(int fd, struct sockaddr __user *addr, int addrlen)
{
sa_family_t sa_family;
if (addrlen == 112 &&
get_user(sa_family, &addr->sa_family) == 0 &&
sa_family == AF_UNIX)
addrlen = 110;
return sys_bind(fd, addr, addrlen);
}
| 274,631,923,850,411,250,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,456 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_epoll_ctl(int epfd, int op, int fd,
struct oabi_epoll_event __user *event)
{
struct oabi_epoll_event user;
struct epoll_event kernel;
mm_segment_t fs;
long ret;
if (op == EPOLL_CTL_DEL)
return sys_epoll_ctl(epfd, op, fd, NULL);
if (copy_from_user(&user, event, sizeof(user)))
r... | 164,561,129,570,360,460,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,457 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_epoll_wait(int epfd,
struct oabi_epoll_event __user *events,
int maxevents, int timeout)
{
struct epoll_event *kbuf;
mm_segment_t fs;
long ret, err, i;
if (maxevents <= 0 || maxevents > (INT_MAX/sizeof(struct epoll_event)))
return -EINVAL;
kbuf = kmalloc(sizeof(*kbuf) * ... | 75,904,859,096,628,460,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,458 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_fcntl64(unsigned int fd, unsigned int cmd,
unsigned long arg)
{
struct oabi_flock64 user;
struct flock64 kernel;
mm_segment_t fs = USER_DS; /* initialized to kill a warning */
unsigned long local_arg = arg;
int ret;
switch (cmd) {
case F_GETLK64:
case F_SETLK64:
case F_SETLKW64:
... | 18,257,506,101,521,069,000,000,000,000,000,000,000 | sys_oabi-compat.c | 260,668,981,499,625,920,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,459 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_fstat64(unsigned long fd,
struct oldabi_stat64 __user * statbuf)
{
struct kstat stat;
int error = vfs_fstat(fd, &stat);
if (!error)
error = cp_oldabi_stat64(&stat, statbuf);
return error;
}
| 205,787,242,180,761,060,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,460 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_fstatat64(int dfd,
const char __user *filename,
struct oldabi_stat64 __user *statbuf,
int flag)
{
struct kstat stat;
int error;
error = vfs_fstatat(dfd, filename, &stat, flag);
if (error)
return error;
return cp_oldabi_stat64(&stat, statbuf);
}
| 235,208,655,786,606,920,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,461 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage int sys_oabi_ipc(uint call, int first, int second, int third,
void __user *ptr, long fifth)
{
switch (call & 0xffff) {
case SEMOP:
return sys_oabi_semtimedop(first,
(struct oabi_sembuf __user *)ptr,
second, NULL);
case SEMTIMEDOP:
return sys_oabi_semtimedop(first,
(... | 154,596,803,644,212,220,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,462 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_lstat64(const char __user * filename,
struct oldabi_stat64 __user * statbuf)
{
struct kstat stat;
int error = vfs_lstat(filename, &stat);
if (!error)
error = cp_oldabi_stat64(&stat, statbuf);
return error;
}
| 333,150,191,338,632,540,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,463 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_semop(int semid, struct oabi_sembuf __user *tsops,
unsigned nsops)
{
return sys_oabi_semtimedop(semid, tsops, nsops, NULL);
}
| 21,804,002,244,618,476,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,464 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_sendmsg(int fd, struct msghdr __user *msg, unsigned flags)
{
struct sockaddr __user *addr;
int msg_namelen;
sa_family_t sa_family;
if (msg &&
get_user(msg_namelen, &msg->msg_namelen) == 0 &&
msg_namelen == 112 &&
get_user(addr, &msg->msg_name) == 0 &&
get_user(sa_family,... | 5,645,158,390,841,647,000,000,000,000,000,000,000 | sys_oabi-compat.c | 260,668,981,499,625,920,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,465 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_sendto(int fd, void __user *buff,
size_t len, unsigned flags,
struct sockaddr __user *addr,
int addrlen)
{
sa_family_t sa_family;
if (addrlen == 112 &&
get_user(sa_family, &addr->sa_family) == 0 &&
sa_family == AF_UNIX)
addrlen = 110;
return sys_sendto(fd, buff, len,... | 315,202,363,438,098,770,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,466 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0 | asmlinkage long sys_oabi_stat64(const char __user * filename,
struct oldabi_stat64 __user * statbuf)
{
struct kstat stat;
int error = vfs_stat(filename, &stat);
if (!error)
error = cp_oldabi_stat64(&stat, statbuf);
return error;
}
| 295,600,161,971,496,670,000,000,000,000,000,000,000 | sys_oabi-compat.c | 54,121,632,294,371,570,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
29,552 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | int __tpm_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf)
{
int rc;
struct tpm_cmd_t cmd;
cmd.header.in = pcrread_header;
cmd.params.pcrread_in.pcr_idx = cpu_to_be32(pcr_idx);
rc = transmit_cmd(chip, &cmd, READ_PCR_RESULT_SIZE,
"attempting to read a pcr value");
if (rc == 0)
memcpy(res_buf, cmd... | 23,460,217,321,090,940,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,553 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | static void timeout_work(struct work_struct *work)
{
struct tpm_chip *chip = container_of(work, struct tpm_chip, work);
mutex_lock(&chip->buffer_mutex);
atomic_set(&chip->data_pending, 0);
memset(chip->data_buffer, 0, TPM_BUFSIZE);
mutex_unlock(&chip->buffer_mutex);
}
| 48,675,960,940,696,950,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,554 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip,
u32 ordinal)
{
int duration_idx = TPM_UNDEFINED;
int duration = 0;
if (ordinal < TPM_MAX_ORDINAL)
duration_idx = tpm_ordinal_duration[ordinal];
else if ((ordinal & TPM_PROTECTED_ORDINAL_MASK) <
TPM_MAX_PROTECTED_ORDINAL)
duration_idx =
... | 210,623,541,341,680,460,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,555 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | static struct tpm_chip *tpm_chip_find_get(int chip_num)
{
struct tpm_chip *pos, *chip = NULL;
rcu_read_lock();
list_for_each_entry_rcu(pos, &tpm_chip_list, list) {
if (chip_num != TPM_ANY_NUM && chip_num != pos->dev_num)
continue;
if (try_module_get(pos->dev->driver->owner)) {
chip = pos;
break;
}
... | 148,134,705,195,081,540,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,556 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | void tpm_dev_release(struct device *dev)
{
struct tpm_chip *chip = dev_get_drvdata(dev);
tpm_dev_vendor_release(chip);
chip->release(dev);
kfree(chip);
}
| 95,639,820,928,044,360,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,557 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | void tpm_dev_vendor_release(struct tpm_chip *chip)
{
if (chip->vendor.release)
chip->vendor.release(chip->dev);
clear_bit(chip->dev_num, dev_mask);
kfree(chip->vendor.miscdev.name);
}
| 232,035,761,439,856,070,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,558 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | void tpm_get_timeouts(struct tpm_chip *chip)
{
struct tpm_cmd_t tpm_cmd;
struct timeout_t *timeout_cap;
struct duration_t *duration_cap;
ssize_t rc;
u32 timeout;
tpm_cmd.header.in = tpm_getcap_header;
tpm_cmd.params.getcap_in.cap = TPM_CAP_PROP;
tpm_cmd.params.getcap_in.subcap_size = cpu_to_be32(4);
tpm_cmd.p... | 25,222,082,547,987,886,000,000,000,000,000,000,000 | tpm.c | 91,542,647,006,006,400,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,559 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash)
{
struct tpm_cmd_t cmd;
int rc;
struct tpm_chip *chip;
chip = tpm_chip_find_get(chip_num);
if (chip == NULL)
return -ENODEV;
cmd.header.in = pcrextend_header;
cmd.params.pcrextend_in.pcr_idx = cpu_to_be32(pcr_idx);
memcpy(cmd.params.pcrextend_in.... | 16,938,262,603,920,216,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,560 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf)
{
struct tpm_chip *chip;
int rc;
chip = tpm_chip_find_get(chip_num);
if (chip == NULL)
return -ENODEV;
rc = __tpm_pcr_read(chip, pcr_idx, res_buf);
tpm_chip_put(chip);
return rc;
}
| 147,394,230,922,930,570,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,561 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | int tpm_pm_resume(struct device *dev)
{
struct tpm_chip *chip = dev_get_drvdata(dev);
if (chip == NULL)
return -ENODEV;
return 0;
}
| 322,932,476,097,861,700,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,562 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | int tpm_pm_suspend(struct device *dev, pm_message_t pm_state)
{
struct tpm_chip *chip = dev_get_drvdata(dev);
struct tpm_cmd_t cmd;
int rc;
u8 dummy_hash[TPM_DIGEST_SIZE] = { 0 };
if (chip == NULL)
return -ENODEV;
/* for buggy tpm, flush pcrs with extend to selected dummy */
if (tpm_suspend_pcr) {
cmd.hea... | 228,770,813,831,034,320,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,563 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_read(struct file *file, char __user *buf,
size_t size, loff_t *off)
{
struct tpm_chip *chip = file->private_data;
ssize_t ret_size;
del_singleshot_timer_sync(&chip->user_read_timer);
flush_work_sync(&chip->work);
ret_size = atomic_read(&chip->data_pending);
atomic_set(&chip->data_pending, 0);
if ... | 248,801,715,730,229,700,000,000,000,000,000,000,000 | tpm.c | 299,506,003,106,706,660,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,564 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | struct tpm_chip *tpm_register_hardware(struct device *dev,
const struct tpm_vendor_specific *entry)
{
#define DEVNAME_SIZE 7
char *devname;
struct tpm_chip *chip;
/* Driver specific per-device data */
chip = kzalloc(sizeof(*chip), GFP_KERNEL);
devname = kmalloc(DEVNAME_SIZE, GFP_KERNEL);
if (chip == NULL ... | 73,204,038,625,309,100,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,565 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | void tpm_remove_hardware(struct device *dev)
{
struct tpm_chip *chip = dev_get_drvdata(dev);
if (chip == NULL) {
dev_err(dev, "No device data found\n");
return;
}
spin_lock(&driver_lock);
list_del_rcu(&chip->list);
spin_unlock(&driver_lock);
synchronize_rcu();
misc_deregister(&chip->vendor.miscdev);
sys... | 211,604,898,766,141,960,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,566 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | int tpm_send(u32 chip_num, void *cmd, size_t buflen)
{
struct tpm_chip *chip;
int rc;
chip = tpm_chip_find_get(chip_num);
if (chip == NULL)
return -ENODEV;
rc = transmit_cmd(chip, cmd, buflen, "attempting tpm_cmd");
tpm_chip_put(chip);
return rc;
}
| 184,972,228,247,082,100,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,567 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr,
char *buf)
{
cap_t cap;
ssize_t rc;
rc = tpm_getcap(dev, TPM_CAP_FLAG_PERM, &cap,
"attempting to determine the permanent active state");
if (rc)
return 0;
rc = sprintf(buf, "%d\n", !cap.perm_flags.deactivated);
return rc;
}
| 126,001,309,630,284,350,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,568 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr,
char *buf)
{
cap_t cap;
ssize_t rc;
rc = tpm_getcap(dev, TPM_CAP_FLAG_PERM, &cap,
"attempting to determine the permanent enabled state");
if (rc)
return 0;
rc = sprintf(buf, "%d\n", !cap.perm_flags.disable);
return rc;
}
| 162,688,654,052,414,130,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,569 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr,
char *buf)
{
cap_t cap;
ssize_t rc;
rc = tpm_getcap(dev, TPM_CAP_PROP_OWNER, &cap,
"attempting to determine the owner state");
if (rc)
return 0;
rc = sprintf(buf, "%d\n", cap.owned);
return rc;
}
| 129,871,321,636,617,470,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,570 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_show_pcrs(struct device *dev, struct device_attribute *attr,
char *buf)
{
cap_t cap;
u8 digest[TPM_DIGEST_SIZE];
ssize_t rc;
int i, j, num_pcrs;
char *str = buf;
struct tpm_chip *chip = dev_get_drvdata(dev);
rc = tpm_getcap(dev, TPM_CAP_PROP_PCR, &cap,
"attempting to determine the number ... | 17,874,632,902,383,020,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,571 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_show_pubek(struct device *dev, struct device_attribute *attr,
char *buf)
{
u8 *data;
struct tpm_cmd_t tpm_cmd;
ssize_t err;
int i, rc;
char *str = buf;
struct tpm_chip *chip = dev_get_drvdata(dev);
tpm_cmd.header.in = tpm_readpubek_header;
err = transmit_cmd(chip, &tpm_cmd, READ_PUBEK_RES... | 267,926,771,094,633,300,000,000,000,000,000,000,000 | tpm.c | 91,542,647,006,006,400,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,572 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_show_temp_deactivated(struct device * dev,
struct device_attribute * attr, char *buf)
{
cap_t cap;
ssize_t rc;
rc = tpm_getcap(dev, TPM_CAP_FLAG_VOL, &cap,
"attempting to determine the temporary state");
if (rc)
return 0;
rc = sprintf(buf, "%d\n", cap.stclear_flags.deactivated);
return rc;... | 11,999,052,795,349,564,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,573 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | ssize_t tpm_store_cancel(struct device *dev, struct device_attribute *attr,
const char *buf, size_t count)
{
struct tpm_chip *chip = dev_get_drvdata(dev);
if (chip == NULL)
return 0;
chip->vendor.cancel(chip);
return count;
}
| 125,925,873,625,797,220,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,574 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | static ssize_t tpm_transmit(struct tpm_chip *chip, const char *buf,
size_t bufsiz)
{
ssize_t rc;
u32 count, ordinal;
unsigned long stop;
count = be32_to_cpu(*((__be32 *) (buf + 2)));
ordinal = be32_to_cpu(*((__be32 *) (buf + 6)));
if (count == 0)
return -ENODATA;
if (count > bufsiz) {
dev_err(chip->d... | 310,180,816,331,073,330,000,000,000,000,000,000,000 | tpm.c | 91,542,647,006,006,400,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,575 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | static ssize_t transmit_cmd(struct tpm_chip *chip, struct tpm_cmd_t *cmd,
int len, const char *desc)
{
int err;
len = tpm_transmit(chip,(u8 *) cmd, len);
if (len < 0)
return len;
if (len == TPM_ERROR_SIZE) {
err = be32_to_cpu(cmd->header.out.return_code);
dev_dbg(chip->dev, "A TPM error (%d) occurred... | 307,095,210,697,026,100,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,576 | linux | 1309d7afbed112f0e8e90be9af975550caa0076b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b | char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 0 | static void user_reader_timeout(unsigned long ptr)
{
struct tpm_chip *chip = (struct tpm_chip *) ptr;
schedule_work(&chip->work);
}
| 214,240,534,996,384,600,000,000,000,000,000,000,000 | tpm.c | 114,485,295,375,309,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1160 | The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1160 |
29,577 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int check_chainloops(const struct ebt_entries *chain, struct ebt_cl_stack *cl_s,
unsigned int udc_cnt, unsigned int hooknr, char *base)
{
int i, chain_nr = -1, pos = 0, nentries = chain->nentries, verdict;
const struct ebt_entry *e = (struct ebt_entry *)chain->data;
const struct ebt_entry_target *t;
whil... | 289,187,138,119,820,180,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,578 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_calc_entry(const struct ebt_entry *e,
const struct ebt_table_info *info,
const void *base,
struct compat_ebt_replace *newinfo)
{
const struct ebt_entry_target *t;
unsigned int entry_offset;
int off, ret, i;
if (e->bitmask == 0)
return 0;
off = 0;
entry_offset = (void ... | 23,932,292,850,722,363,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,579 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_calc_watcher(struct ebt_entry_watcher *w, int *off)
{
*off += xt_compat_target_offset(w->u.watcher);
*off += ebt_compat_entry_padsize();
return 0;
}
| 331,362,089,742,953,200,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,580 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_copy_entries(unsigned char *data, unsigned int size_user,
struct ebt_entries_buf_state *state)
{
unsigned int size_remaining = size_user;
int ret;
ret = EBT_ENTRY_ITERATE(data, size_user, size_entry_mwt, data,
&size_remaining, state);
if (ret < 0)
return ret;
WARN_ON(size_remaining);... | 310,145,064,969,461,370,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,581 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_copy_entry_to_user(struct ebt_entry *e, void __user **dstptr,
unsigned int *size)
{
struct ebt_entry_target *t;
struct ebt_entry __user *ce;
u32 watchers_offset, target_offset, next_offset;
compat_uint_t origsize;
int ret;
if (e->bitmask == 0) {
if (*size < sizeof(struct ebt_entries))
... | 143,287,425,353,722,120,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,582 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_copy_everything_to_user(struct ebt_table *t,
void __user *user, int *len, int cmd)
{
struct compat_ebt_replace repl, tmp;
struct ebt_counter *oldcounters;
struct ebt_table_info tinfo;
int ret;
void __user *pos;
memset(&tinfo, 0, sizeof(tinfo));
if (cmd == EBT_SO_GET_ENTRIES) {
tinfo.... | 129,690,450,845,899,360,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,583 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_do_ebt_get_ctl(struct sock *sk, int cmd,
void __user *user, int *len)
{
int ret;
struct compat_ebt_replace tmp;
struct ebt_table *t;
if (!capable(CAP_NET_ADMIN))
return -EPERM;
/* try real handler in case userland supplied needed padding */
if ((cmd == EBT_SO_GET_INFO ||
cmd == EBT_S... | 323,383,473,610,281,940,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,584 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_do_ebt_set_ctl(struct sock *sk,
int cmd, void __user *user, unsigned int len)
{
int ret;
if (!capable(CAP_NET_ADMIN))
return -EPERM;
switch (cmd) {
case EBT_SO_SET_ENTRIES:
ret = compat_do_replace(sock_net(sk), user, len);
break;
case EBT_SO_SET_COUNTERS:
ret = compat_update_counters(... | 252,820,682,652,147,970,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.