idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
29,272
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static void ldm_free_vblks (struct list_head *lh) { struct list_head *item, *tmp; BUG_ON (!lh); list_for_each_safe (item, tmp, lh) kfree (list_entry (item, struct vblk, list)); }
95,154,644,091,707,020,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,273
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static struct vblk * ldm_get_disk_objid (const struct ldmdb *ldb) { struct list_head *item; BUG_ON (!ldb); list_for_each (item, &ldb->v_disk) { struct vblk *v = list_entry (item, struct vblk, list); if (!memcmp (v->vblk.disk.disk_id, ldb->ph.disk_id, GUID_SIZE)) return v; } return NULL; }
62,811,873,135,120,480,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,274
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_get_vblks(struct parsed_partitions *state, unsigned long base, struct ldmdb *ldb) { int size, perbuf, skip, finish, s, v, recs; u8 *data = NULL; Sector sect; bool result = false; LIST_HEAD (frags); BUG_ON(!state || !ldb); size = ldb->vm.vblk_size; perbuf = 512 / size; skip = ldb->vm....
161,428,187,363,971,740,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,275
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static u64 ldm_get_vnum (const u8 *block) { u64 tmp = 0; u8 length; BUG_ON (!block); length = *block++; if (length && length <= 8) while (length--) tmp = (tmp << 8) | *block++; else ldm_error ("Illegal length %d.", length); return tmp; }
129,504,720,534,008,750,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,276
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static int ldm_get_vstr (const u8 *block, u8 *buffer, int buflen) { int length; BUG_ON (!block || !buffer); length = block[0]; if (length >= buflen) { ldm_error ("Truncating string %d -> %d.", length, buflen); length = buflen - 1; } memcpy (buffer, block + 1, length); buffer[length] = 0; return length; }
283,293,767,044,924,540,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,277
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_ldmdb_add (u8 *data, int len, struct ldmdb *ldb) { struct vblk *vb; struct list_head *item; BUG_ON (!data || !ldb); vb = kmalloc (sizeof (*vb), GFP_KERNEL); if (!vb) { ldm_crit ("Out of memory."); return false; } if (!ldm_parse_vblk (data, len, vb)) { kfree(vb); return false; /* Alre...
185,074,947,331,356,400,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,278
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_cmp3 (const u8 *buffer, int buflen, struct vblk *vb) { int r_objid, r_name, r_vstate, r_child, r_parent, r_stripe, r_cols, len; struct vblk_comp *comp; BUG_ON (!buffer || !vb); r_objid = ldm_relative (buffer, buflen, 0x18, 0); r_name = ldm_relative (buffer, buflen, 0x18, r_objid); r_vst...
78,153,343,489,379,520,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,279
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static int ldm_parse_dgr3 (const u8 *buffer, int buflen, struct vblk *vb) { int r_objid, r_name, r_diskid, r_id1, r_id2, len; struct vblk_dgrp *dgrp; BUG_ON (!buffer || !vb); r_objid = ldm_relative (buffer, buflen, 0x18, 0); r_name = ldm_relative (buffer, buflen, 0x18, r_objid); r_diskid = ldm_relative (buff...
45,715,644,504,777,880,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,280
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static int ldm_parse_hexbyte (const u8 *src) { unsigned int x; /* For correct wrapping */ int h; /* high part */ x = h = hex_to_bin(src[0]); if (h < 0) return -1; /* low part */ h = hex_to_bin(src[1]); if (h < 0) return -1; return (x << 4) + h; }
82,129,795,523,672,570,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,281
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_privhead(const u8 *data, struct privhead *ph) { bool is_vista = false; BUG_ON(!data || !ph); if (MAGIC_PRIVHEAD != get_unaligned_be64(data)) { ldm_error("Cannot find PRIVHEAD structure. LDM database is" " corrupt. Aborting."); return false; } ph->ver_major = get_unaligned_be16(data + ...
191,050,957,447,840,200,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,282
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_prt3(const u8 *buffer, int buflen, struct vblk *vb) { int r_objid, r_name, r_size, r_parent, r_diskid, r_index, len; struct vblk_part *part; BUG_ON(!buffer || !vb); r_objid = ldm_relative(buffer, buflen, 0x18, 0); if (r_objid < 0) { ldm_error("r_objid %d < 0", r_objid); return false; } ...
208,840,267,008,834,400,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,283
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_tocblock (const u8 *data, struct tocblock *toc) { BUG_ON (!data || !toc); if (MAGIC_TOCBLOCK != get_unaligned_be64(data)) { ldm_crit ("Cannot find TOCBLOCK, database may be corrupt."); return false; } strncpy (toc->bitmap1_name, data + 0x24, sizeof (toc->bitmap1_name)); toc->bitmap1_name...
306,485,277,138,857,270,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,284
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_vblk (const u8 *buf, int len, struct vblk *vb) { bool result = false; int r_objid; BUG_ON (!buf || !vb); r_objid = ldm_relative (buf, len, 0x18, 0); if (r_objid < 0) { ldm_error ("VBLK header is corrupt."); return false; } vb->flags = buf[0x12]; vb->type = buf[0x13]; vb->obj_id ...
136,178,643,727,089,080,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,285
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_vmdb (const u8 *data, struct vmdb *vm) { BUG_ON (!data || !vm); if (MAGIC_VMDB != get_unaligned_be32(data)) { ldm_crit ("Cannot find the VMDB, database may be corrupt."); return false; } vm->ver_major = get_unaligned_be16(data + 0x12); vm->ver_minor = get_unaligned_be16(data + 0x14); i...
123,048,109,379,786,070,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,286
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_parse_vol5(const u8 *buffer, int buflen, struct vblk *vb) { int r_objid, r_name, r_vtype, r_disable_drive_letter, r_child, r_size; int r_id1, r_id2, r_size2, r_drive, len; struct vblk_volu *volu; BUG_ON(!buffer || !vb); r_objid = ldm_relative(buffer, buflen, 0x18, 0); if (r_objid < 0) { ldm_err...
67,916,213,607,454,950,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,287
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
int ldm_partition(struct parsed_partitions *state) { struct ldmdb *ldb; unsigned long base; int result = -1; BUG_ON(!state); /* Look for signs of a Dynamic Disk */ if (!ldm_validate_partition_table(state)) return 0; ldb = kmalloc (sizeof (*ldb), GFP_KERNEL); if (!ldb) { ldm_crit ("Out of memory."); go...
28,603,198,487,705,760,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,288
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static int ldm_relative(const u8 *buffer, int buflen, int base, int offset) { base += offset; if (!buffer || offset < 0 || base > buflen) { if (!buffer) ldm_error("!buffer"); if (offset < 0) ldm_error("offset (%d) < 0", offset); if (base > buflen) ldm_error("base (%d) > buflen (%d)", base, buflen); ...
192,421,795,727,188,600,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,289
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_validate_partition_table(struct parsed_partitions *state) { Sector sect; u8 *data; struct partition *p; int i; bool result = false; BUG_ON(!state); data = read_part_sector(state, 0, &sect); if (!data) { ldm_crit ("Disk read failed."); return false; } if (*(__le16*) (data + 0x01FE) != cp...
44,145,490,366,189,450,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,290
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_validate_privheads(struct parsed_partitions *state, struct privhead *ph1) { static const int off[3] = { OFF_PRIV1, OFF_PRIV2, OFF_PRIV3 }; struct privhead *ph[3] = { ph1 }; Sector sect; u8 *data; bool result = false; long num_sects; int i; BUG_ON (!state || !ph1); ph[1] = kmalloc (size...
252,952,686,055,349,970,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,291
linux
cae13fe4cc3f24820ffb990c09110626837e85d4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4
Fix for buffer overflow in ldm_frag_add not sufficient As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer overflow in ldm_frag_add) is not sufficient. The original patch in commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted partition table") does not consider that, for subsequen...
0
static bool ldm_validate_tocblocks(struct parsed_partitions *state, unsigned long base, struct ldmdb *ldb) { static const int off[4] = { OFF_TOCB1, OFF_TOCB2, OFF_TOCB3, OFF_TOCB4}; struct tocblock *tb[4]; struct privhead *ph; Sector sect; u8 *data; int i, nr_tbs; bool result = false; BUG_ON(!state || !...
236,855,593,940,620,000,000,000,000,000,000,000,000
ldm.c
193,102,196,756,441,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-2182
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this...
https://nvd.nist.gov/vuln/detail/CVE-2011-2182
29,292
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static inline u8 ip4_frag_ecn(u8 tos) { tos = (tos & INET_ECN_MASK) + 1; /* * After the last operation we have (in binary): * INET_ECN_NOT_ECT => 001 * INET_ECN_ECT_1 => 010 * INET_ECN_ECT_0 => 011 * INET_ECN_CE => 100 */ return (tos & 2) ? 0 : tos; }
1,987,634,889,536,484,300,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,293
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static __inline__ void ip4_frag_free(struct inet_frag_queue *q) { struct ipq *qp; qp = container_of(q, struct ipq, q); if (qp->peer) inet_putpeer(qp->peer); }
272,096,561,148,696,430,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,294
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static void ip4_frag_init(struct inet_frag_queue *q, void *a) { struct ipq *qp = container_of(q, struct ipq, q); struct ip4_create_arg *arg = a; qp->protocol = arg->iph->protocol; qp->id = arg->iph->id; qp->ecn = ip4_frag_ecn(arg->iph->tos); qp->saddr = arg->iph->saddr; qp->daddr = arg->iph->daddr; qp->user = ...
9,857,679,004,120,880,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,295
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static int ip4_frag_match(struct inet_frag_queue *q, void *a) { struct ipq *qp; struct ip4_create_arg *arg = a; qp = container_of(q, struct ipq, q); return qp->id == arg->iph->id && qp->saddr == arg->iph->saddr && qp->daddr == arg->iph->daddr && qp->protocol == arg->iph->protocol && qp->user == arg->us...
26,058,397,521,246,700,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,296
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static void ip4_frags_ctl_register(void) { register_net_sysctl_rotable(net_ipv4_ctl_path, ip4_frags_ctl_table); }
196,129,405,723,270,350,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,297
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static inline void ip4_frags_ctl_register(void) { }
212,386,813,126,162,930,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,298
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static int __net_init ip4_frags_ns_ctl_register(struct net *net) { struct ctl_table *table; struct ctl_table_header *hdr; table = ip4_frags_ns_ctl_table; if (!net_eq(net, &init_net)) { table = kmemdup(table, sizeof(ip4_frags_ns_ctl_table), GFP_KERNEL); if (table == NULL) goto err_alloc; table[0].data = &...
86,754,080,960,743,730,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,299
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static inline int ip4_frags_ns_ctl_register(struct net *net) { return 0; }
74,362,655,091,165,910,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,300
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static void __net_exit ip4_frags_ns_ctl_unregister(struct net *net) { struct ctl_table *table; table = net->ipv4.frags_hdr->ctl_table_arg; unregister_net_sysctl_table(net->ipv4.frags_hdr); kfree(table); }
161,468,824,893,565,830,000,000,000,000,000,000,000
ip_fragment.c
145,317,037,223,021,030,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,301
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static inline void ip4_frags_ns_ctl_unregister(struct net *net) { }
27,691,799,920,676,230,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,302
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static void ip_evictor(struct net *net) { int evicted; evicted = inet_frag_evictor(&net->ipv4.frags, &ip4_frags); if (evicted) IP_ADD_STATS_BH(net, IPSTATS_MIB_REASMFAILS, evicted); }
299,830,351,345,681,930,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,303
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
int ip_frag_mem(struct net *net) { return atomic_read(&net->ipv4.frags.mem); }
107,147,094,153,196,660,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,304
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static int ip_frag_queue(struct ipq *qp, struct sk_buff *skb) { struct sk_buff *prev, *next; struct net_device *dev; int flags, offset; int ihl, end; int err = -ENOENT; u8 ecn; if (qp->q.last_in & INET_FRAG_COMPLETE) goto err; if (!(IPCB(skb)->flags & IPSKB_FRAG_COMPLETE) && unlikely(ip_frag_too_far(qp...
116,915,016,931,798,400,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,305
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static int ip_frag_reasm(struct ipq *qp, struct sk_buff *prev, struct net_device *dev) { struct net *net = container_of(qp->q.net, struct net, ipv4.frags); struct iphdr *iph; struct sk_buff *fp, *head = qp->q.fragments; int len; int ihlen; int err; ipq_kill(qp); /* Make the one we just received the head. ...
87,705,460,092,046,080,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,306
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static int ip_frag_reinit(struct ipq *qp) { struct sk_buff *fp; if (!mod_timer(&qp->q.timer, jiffies + qp->q.net->timeout)) { atomic_inc(&qp->q.refcnt); return -ETIMEDOUT; } fp = qp->q.fragments; do { struct sk_buff *xp = fp->next; frag_kfree_skb(qp->q.net, fp); fp = xp; } while (fp); qp->q.last_in ...
328,922,628,508,362,530,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,307
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static inline int ip_frag_too_far(struct ipq *qp) { struct inet_peer *peer = qp->peer; unsigned int max = sysctl_ipfrag_max_dist; unsigned int start, end; int rc; if (!peer || !max) return 0; start = qp->rid; end = atomic_inc_return(&peer->rid); qp->rid = end; rc = qp->q.fragments && (end - start) > max;...
77,831,409,587,278,790,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,308
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static __inline__ void ipq_put(struct ipq *ipq) { inet_frag_put(&ipq->q, &ip4_frags); }
268,063,678,650,201,200,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,309
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static unsigned int ipqhashfn(__be16 id, __be32 saddr, __be32 daddr, u8 prot) { return jhash_3words((__force u32)id << 16 | prot, (__force u32)saddr, (__force u32)daddr, ip4_frags.rnd) & (INETFRAGS_HASHSZ - 1); }
168,695,604,265,335,660,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,310
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static void __net_exit ipv4_frags_exit_net(struct net *net) { ip4_frags_ns_ctl_unregister(net); inet_frags_exit_net(&net->ipv4.frags, &ip4_frags); }
338,118,710,028,261,800,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,311
linux
64f3b9e203bd06855072e295557dca1485a2ecba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba
net: ip_expire() must revalidate route Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path) added a bug in IP defragmentation handling, in case timeout is fired. When a frame is defragmented, we use last skb dst field when building final skb. Its dst is valid, since we are in rcu read section. But if ...
0
static int __net_init ipv4_frags_init_net(struct net *net) { /* * Fragment cache limits. We will commit 256K at one time. Should we * cross that limit we will prune down to 192K. This should cope with * even the most extreme cases without allowing an attacker to * measurably harm machine performance. */ net...
157,532,461,183,437,960,000,000,000,000,000,000,000
ip_fragment.c
88,100,855,803,852,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-1927
The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
https://nvd.nist.gov/vuln/detail/CVE-2011-1927
29,312
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
void __ecryptfs_printk(const char *fmt, ...) { va_list args; va_start(args, fmt); if (fmt[1] == '7') { /* KERN_DEBUG */ if (ecryptfs_verbosity >= 1) vprintk(fmt, args); } else vprintk(fmt, args); va_end(args); }
312,076,362,385,451,680,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,313
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static int do_sysfs_registration(void) { int rc; ecryptfs_kobj = kobject_create_and_add("ecryptfs", fs_kobj); if (!ecryptfs_kobj) { printk(KERN_ERR "Unable to create ecryptfs kset\n"); rc = -ENOMEM; goto out; } rc = sysfs_create_group(ecryptfs_kobj, &attr_group); if (rc) { printk(KERN_ERR "Unabl...
62,924,652,842,015,640,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,314
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static void do_sysfs_unregistration(void) { sysfs_remove_group(ecryptfs_kobj, &attr_group); kobject_put(ecryptfs_kobj); }
234,858,901,716,342,670,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,315
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static void __exit ecryptfs_exit(void) { int rc; rc = ecryptfs_destroy_crypto(); if (rc) printk(KERN_ERR "Failure whilst attempting to destroy crypto; " "rc = [%d]\n", rc); ecryptfs_release_messaging(); ecryptfs_destroy_kthread(); do_sysfs_unregistration(); unregister_filesystem(&ecryptfs_fs_type); ...
72,533,203,124,185,815,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,316
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static void ecryptfs_free_kmem_caches(void) { int i; for (i = 0; i < ARRAY_SIZE(ecryptfs_cache_infos); i++) { struct ecryptfs_cache_info *info; info = &ecryptfs_cache_infos[i]; if (*(info->cache)) kmem_cache_destroy(*(info->cache)); } }
83,065,153,291,968,955,000,000,000,000,000,000,000
main.c
327,155,547,214,049,540,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,317
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static int __init ecryptfs_init(void) { int rc; if (ECRYPTFS_DEFAULT_EXTENT_SIZE > PAGE_CACHE_SIZE) { rc = -EINVAL; ecryptfs_printk(KERN_ERR, "The eCryptfs extent size is " "larger than the host's page size, and so " "eCryptfs cannot run on this system. The " "default eCryptfs extent size is [%u] byt...
14,257,939,546,257,488,000,000,000,000,000,000,000
main.c
327,155,547,214,049,540,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,318
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static int ecryptfs_init_global_auth_toks( struct ecryptfs_mount_crypt_stat *mount_crypt_stat) { struct ecryptfs_global_auth_tok *global_auth_tok; struct ecryptfs_auth_tok *auth_tok; int rc = 0; list_for_each_entry(global_auth_tok, &mount_crypt_stat->global_auth_tok_list, mount_crypt_stat_list) { ...
147,238,539,660,219,120,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,319
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static int ecryptfs_init_kmem_caches(void) { int i; for (i = 0; i < ARRAY_SIZE(ecryptfs_cache_infos); i++) { struct ecryptfs_cache_info *info; info = &ecryptfs_cache_infos[i]; *(info->cache) = kmem_cache_create(info->name, info->size, 0, SLAB_HWCACHE_ALIGN, info->ctor); if (!*(info->cache)) { ecryptf...
130,139,884,914,856,790,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,320
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static int ecryptfs_init_lower_file(struct dentry *dentry, struct file **lower_file) { const struct cred *cred = current_cred(); struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry); struct vfsmount *lower_mnt = ecryptfs_dentry_to_lower_mnt(dentry); int rc; rc = ecryptfs_privileged_open(lower_fi...
21,058,873,925,409,862,000,000,000,000,000,000,000
main.c
327,155,547,214,049,540,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,321
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static void ecryptfs_init_mount_crypt_stat( struct ecryptfs_mount_crypt_stat *mount_crypt_stat) { memset((void *)mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat)); INIT_LIST_HEAD(&mount_crypt_stat->global_auth_tok_list); mutex_init(&mount_crypt_stat->global_auth_tok_list_mutex); mount_crypt_st...
148,028,023,797,480,220,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,322
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static void ecryptfs_kill_block_super(struct super_block *sb) { struct ecryptfs_sb_info *sb_info = ecryptfs_superblock_to_private(sb); kill_anon_super(sb); if (!sb_info) return; ecryptfs_destroy_mount_crypt_stat(&sb_info->mount_crypt_stat); bdi_destroy(&sb_info->bdi); kmem_cache_free(ecryptfs_sb_info_cache, sb_...
124,447,599,881,849,210,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,323
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
void ecryptfs_put_lower_file(struct inode *inode) { struct ecryptfs_inode_info *inode_info; inode_info = ecryptfs_inode_to_private(inode); if (atomic_dec_and_mutex_lock(&inode_info->lower_file_count, &inode_info->lower_file_mutex)) { fput(inode_info->lower_file); inode_info->lower_file = NULL; mutex...
332,716,244,053,197,840,000,000,000,000,000,000,000
main.c
327,155,547,214,049,540,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,324
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
inode_info_init_once(void *vptr) { struct ecryptfs_inode_info *ei = (struct ecryptfs_inode_info *)vptr; inode_init_once(&ei->vfs_inode); }
133,103,022,687,958,440,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,325
linux
764355487ea220fdc2faf128d577d7f679b91f97
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97
Ecryptfs: Add mount option to check uid of device being mounted = expect uid Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount source (device) can be raced when the ownership test is done in userspace. Provide Ecryptfs a means to force the uid check at mount time. Signed-off-by: John Johansen...
0
static ssize_t version_show(struct kobject *kobj, struct kobj_attribute *attr, char *buff) { return snprintf(buff, PAGE_SIZE, "%d\n", ECRYPTFS_VERSIONING_MASK); }
174,683,589,180,117,650,000,000,000,000,000,000,000
main.c
24,751,742,485,860,580,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
https://nvd.nist.gov/vuln/detail/CVE-2011-1833
29,454
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
static long cp_oldabi_stat64(struct kstat *stat, struct oldabi_stat64 __user *statbuf) { struct oldabi_stat64 tmp; tmp.st_dev = huge_encode_dev(stat->dev); tmp.__pad1 = 0; tmp.__st_ino = stat->ino; tmp.st_mode = stat->mode; tmp.st_nlink = stat->nlink; tmp.st_uid = stat->uid; tmp.st_gid = stat->gid; tm...
5,824,222,993,836,275,000,000,000,000,000,000,000
sys_oabi-compat.c
260,668,981,499,625,920,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,455
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_bind(int fd, struct sockaddr __user *addr, int addrlen) { sa_family_t sa_family; if (addrlen == 112 && get_user(sa_family, &addr->sa_family) == 0 && sa_family == AF_UNIX) addrlen = 110; return sys_bind(fd, addr, addrlen); }
274,631,923,850,411,250,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,456
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_epoll_ctl(int epfd, int op, int fd, struct oabi_epoll_event __user *event) { struct oabi_epoll_event user; struct epoll_event kernel; mm_segment_t fs; long ret; if (op == EPOLL_CTL_DEL) return sys_epoll_ctl(epfd, op, fd, NULL); if (copy_from_user(&user, event, sizeof(user))) r...
164,561,129,570,360,460,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,457
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_epoll_wait(int epfd, struct oabi_epoll_event __user *events, int maxevents, int timeout) { struct epoll_event *kbuf; mm_segment_t fs; long ret, err, i; if (maxevents <= 0 || maxevents > (INT_MAX/sizeof(struct epoll_event))) return -EINVAL; kbuf = kmalloc(sizeof(*kbuf) * ...
75,904,859,096,628,460,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,458
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_fcntl64(unsigned int fd, unsigned int cmd, unsigned long arg) { struct oabi_flock64 user; struct flock64 kernel; mm_segment_t fs = USER_DS; /* initialized to kill a warning */ unsigned long local_arg = arg; int ret; switch (cmd) { case F_GETLK64: case F_SETLK64: case F_SETLKW64: ...
18,257,506,101,521,069,000,000,000,000,000,000,000
sys_oabi-compat.c
260,668,981,499,625,920,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,459
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_fstat64(unsigned long fd, struct oldabi_stat64 __user * statbuf) { struct kstat stat; int error = vfs_fstat(fd, &stat); if (!error) error = cp_oldabi_stat64(&stat, statbuf); return error; }
205,787,242,180,761,060,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,460
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_fstatat64(int dfd, const char __user *filename, struct oldabi_stat64 __user *statbuf, int flag) { struct kstat stat; int error; error = vfs_fstatat(dfd, filename, &stat, flag); if (error) return error; return cp_oldabi_stat64(&stat, statbuf); }
235,208,655,786,606,920,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,461
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage int sys_oabi_ipc(uint call, int first, int second, int third, void __user *ptr, long fifth) { switch (call & 0xffff) { case SEMOP: return sys_oabi_semtimedop(first, (struct oabi_sembuf __user *)ptr, second, NULL); case SEMTIMEDOP: return sys_oabi_semtimedop(first, (...
154,596,803,644,212,220,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,462
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_lstat64(const char __user * filename, struct oldabi_stat64 __user * statbuf) { struct kstat stat; int error = vfs_lstat(filename, &stat); if (!error) error = cp_oldabi_stat64(&stat, statbuf); return error; }
333,150,191,338,632,540,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,463
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_semop(int semid, struct oabi_sembuf __user *tsops, unsigned nsops) { return sys_oabi_semtimedop(semid, tsops, nsops, NULL); }
21,804,002,244,618,476,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,464
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_sendmsg(int fd, struct msghdr __user *msg, unsigned flags) { struct sockaddr __user *addr; int msg_namelen; sa_family_t sa_family; if (msg && get_user(msg_namelen, &msg->msg_namelen) == 0 && msg_namelen == 112 && get_user(addr, &msg->msg_name) == 0 && get_user(sa_family,...
5,645,158,390,841,647,000,000,000,000,000,000,000
sys_oabi-compat.c
260,668,981,499,625,920,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,465
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_sendto(int fd, void __user *buff, size_t len, unsigned flags, struct sockaddr __user *addr, int addrlen) { sa_family_t sa_family; if (addrlen == 112 && get_user(sa_family, &addr->sa_family) == 0 && sa_family == AF_UNIX) addrlen = 110; return sys_sendto(fd, buff, len,...
315,202,363,438,098,770,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,466
linux
0f22072ab50cac7983f9660d33974b45184da4f9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9
ARM: 6891/1: prevent heap corruption in OABI semtimedop When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not bound the nsops argument. A sufficiently large value will cause an integer overflow in allocation size, followed by copying too much data into the allocated buffer. Fix this by restricting nsop...
0
asmlinkage long sys_oabi_stat64(const char __user * filename, struct oldabi_stat64 __user * statbuf) { struct kstat stat; int error = vfs_stat(filename, &stat); if (!error) error = cp_oldabi_stat64(&stat, statbuf); return error; }
295,600,161,971,496,670,000,000,000,000,000,000,000
sys_oabi-compat.c
54,121,632,294,371,570,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1759
29,552
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
int __tpm_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf) { int rc; struct tpm_cmd_t cmd; cmd.header.in = pcrread_header; cmd.params.pcrread_in.pcr_idx = cpu_to_be32(pcr_idx); rc = transmit_cmd(chip, &cmd, READ_PCR_RESULT_SIZE, "attempting to read a pcr value"); if (rc == 0) memcpy(res_buf, cmd...
23,460,217,321,090,940,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,553
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
static void timeout_work(struct work_struct *work) { struct tpm_chip *chip = container_of(work, struct tpm_chip, work); mutex_lock(&chip->buffer_mutex); atomic_set(&chip->data_pending, 0); memset(chip->data_buffer, 0, TPM_BUFSIZE); mutex_unlock(&chip->buffer_mutex); }
48,675,960,940,696,950,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,554
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
unsigned long tpm_calc_ordinal_duration(struct tpm_chip *chip, u32 ordinal) { int duration_idx = TPM_UNDEFINED; int duration = 0; if (ordinal < TPM_MAX_ORDINAL) duration_idx = tpm_ordinal_duration[ordinal]; else if ((ordinal & TPM_PROTECTED_ORDINAL_MASK) < TPM_MAX_PROTECTED_ORDINAL) duration_idx = ...
210,623,541,341,680,460,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,555
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
static struct tpm_chip *tpm_chip_find_get(int chip_num) { struct tpm_chip *pos, *chip = NULL; rcu_read_lock(); list_for_each_entry_rcu(pos, &tpm_chip_list, list) { if (chip_num != TPM_ANY_NUM && chip_num != pos->dev_num) continue; if (try_module_get(pos->dev->driver->owner)) { chip = pos; break; } ...
148,134,705,195,081,540,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,556
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
void tpm_dev_release(struct device *dev) { struct tpm_chip *chip = dev_get_drvdata(dev); tpm_dev_vendor_release(chip); chip->release(dev); kfree(chip); }
95,639,820,928,044,360,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,557
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
void tpm_dev_vendor_release(struct tpm_chip *chip) { if (chip->vendor.release) chip->vendor.release(chip->dev); clear_bit(chip->dev_num, dev_mask); kfree(chip->vendor.miscdev.name); }
232,035,761,439,856,070,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,558
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
void tpm_get_timeouts(struct tpm_chip *chip) { struct tpm_cmd_t tpm_cmd; struct timeout_t *timeout_cap; struct duration_t *duration_cap; ssize_t rc; u32 timeout; tpm_cmd.header.in = tpm_getcap_header; tpm_cmd.params.getcap_in.cap = TPM_CAP_PROP; tpm_cmd.params.getcap_in.subcap_size = cpu_to_be32(4); tpm_cmd.p...
25,222,082,547,987,886,000,000,000,000,000,000,000
tpm.c
91,542,647,006,006,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,559
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) { struct tpm_cmd_t cmd; int rc; struct tpm_chip *chip; chip = tpm_chip_find_get(chip_num); if (chip == NULL) return -ENODEV; cmd.header.in = pcrextend_header; cmd.params.pcrextend_in.pcr_idx = cpu_to_be32(pcr_idx); memcpy(cmd.params.pcrextend_in....
16,938,262,603,920,216,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,560
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) { struct tpm_chip *chip; int rc; chip = tpm_chip_find_get(chip_num); if (chip == NULL) return -ENODEV; rc = __tpm_pcr_read(chip, pcr_idx, res_buf); tpm_chip_put(chip); return rc; }
147,394,230,922,930,570,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,561
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
int tpm_pm_resume(struct device *dev) { struct tpm_chip *chip = dev_get_drvdata(dev); if (chip == NULL) return -ENODEV; return 0; }
322,932,476,097,861,700,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,562
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
int tpm_pm_suspend(struct device *dev, pm_message_t pm_state) { struct tpm_chip *chip = dev_get_drvdata(dev); struct tpm_cmd_t cmd; int rc; u8 dummy_hash[TPM_DIGEST_SIZE] = { 0 }; if (chip == NULL) return -ENODEV; /* for buggy tpm, flush pcrs with extend to selected dummy */ if (tpm_suspend_pcr) { cmd.hea...
228,770,813,831,034,320,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,563
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_read(struct file *file, char __user *buf, size_t size, loff_t *off) { struct tpm_chip *chip = file->private_data; ssize_t ret_size; del_singleshot_timer_sync(&chip->user_read_timer); flush_work_sync(&chip->work); ret_size = atomic_read(&chip->data_pending); atomic_set(&chip->data_pending, 0); if ...
248,801,715,730,229,700,000,000,000,000,000,000,000
tpm.c
299,506,003,106,706,660,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,564
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
struct tpm_chip *tpm_register_hardware(struct device *dev, const struct tpm_vendor_specific *entry) { #define DEVNAME_SIZE 7 char *devname; struct tpm_chip *chip; /* Driver specific per-device data */ chip = kzalloc(sizeof(*chip), GFP_KERNEL); devname = kmalloc(DEVNAME_SIZE, GFP_KERNEL); if (chip == NULL ...
73,204,038,625,309,100,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,565
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
void tpm_remove_hardware(struct device *dev) { struct tpm_chip *chip = dev_get_drvdata(dev); if (chip == NULL) { dev_err(dev, "No device data found\n"); return; } spin_lock(&driver_lock); list_del_rcu(&chip->list); spin_unlock(&driver_lock); synchronize_rcu(); misc_deregister(&chip->vendor.miscdev); sys...
211,604,898,766,141,960,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,566
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
int tpm_send(u32 chip_num, void *cmd, size_t buflen) { struct tpm_chip *chip; int rc; chip = tpm_chip_find_get(chip_num); if (chip == NULL) return -ENODEV; rc = transmit_cmd(chip, cmd, buflen, "attempting tpm_cmd"); tpm_chip_put(chip); return rc; }
184,972,228,247,082,100,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,567
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_show_active(struct device * dev, struct device_attribute * attr, char *buf) { cap_t cap; ssize_t rc; rc = tpm_getcap(dev, TPM_CAP_FLAG_PERM, &cap, "attempting to determine the permanent active state"); if (rc) return 0; rc = sprintf(buf, "%d\n", !cap.perm_flags.deactivated); return rc; }
126,001,309,630,284,350,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,568
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_show_enabled(struct device * dev, struct device_attribute * attr, char *buf) { cap_t cap; ssize_t rc; rc = tpm_getcap(dev, TPM_CAP_FLAG_PERM, &cap, "attempting to determine the permanent enabled state"); if (rc) return 0; rc = sprintf(buf, "%d\n", !cap.perm_flags.disable); return rc; }
162,688,654,052,414,130,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,569
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_show_owned(struct device * dev, struct device_attribute * attr, char *buf) { cap_t cap; ssize_t rc; rc = tpm_getcap(dev, TPM_CAP_PROP_OWNER, &cap, "attempting to determine the owner state"); if (rc) return 0; rc = sprintf(buf, "%d\n", cap.owned); return rc; }
129,871,321,636,617,470,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,570
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_show_pcrs(struct device *dev, struct device_attribute *attr, char *buf) { cap_t cap; u8 digest[TPM_DIGEST_SIZE]; ssize_t rc; int i, j, num_pcrs; char *str = buf; struct tpm_chip *chip = dev_get_drvdata(dev); rc = tpm_getcap(dev, TPM_CAP_PROP_PCR, &cap, "attempting to determine the number ...
17,874,632,902,383,020,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,571
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_show_pubek(struct device *dev, struct device_attribute *attr, char *buf) { u8 *data; struct tpm_cmd_t tpm_cmd; ssize_t err; int i, rc; char *str = buf; struct tpm_chip *chip = dev_get_drvdata(dev); tpm_cmd.header.in = tpm_readpubek_header; err = transmit_cmd(chip, &tpm_cmd, READ_PUBEK_RES...
267,926,771,094,633,300,000,000,000,000,000,000,000
tpm.c
91,542,647,006,006,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,572
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_show_temp_deactivated(struct device * dev, struct device_attribute * attr, char *buf) { cap_t cap; ssize_t rc; rc = tpm_getcap(dev, TPM_CAP_FLAG_VOL, &cap, "attempting to determine the temporary state"); if (rc) return 0; rc = sprintf(buf, "%d\n", cap.stclear_flags.deactivated); return rc;...
11,999,052,795,349,564,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,573
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
ssize_t tpm_store_cancel(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { struct tpm_chip *chip = dev_get_drvdata(dev); if (chip == NULL) return 0; chip->vendor.cancel(chip); return count; }
125,925,873,625,797,220,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,574
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
static ssize_t tpm_transmit(struct tpm_chip *chip, const char *buf, size_t bufsiz) { ssize_t rc; u32 count, ordinal; unsigned long stop; count = be32_to_cpu(*((__be32 *) (buf + 2))); ordinal = be32_to_cpu(*((__be32 *) (buf + 6))); if (count == 0) return -ENODATA; if (count > bufsiz) { dev_err(chip->d...
310,180,816,331,073,330,000,000,000,000,000,000,000
tpm.c
91,542,647,006,006,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,575
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
static ssize_t transmit_cmd(struct tpm_chip *chip, struct tpm_cmd_t *cmd, int len, const char *desc) { int err; len = tpm_transmit(chip,(u8 *) cmd, len); if (len < 0) return len; if (len == TPM_ERROR_SIZE) { err = be32_to_cpu(cmd->header.out.return_code); dev_dbg(chip->dev, "A TPM error (%d) occurred...
307,095,210,697,026,100,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,576
linux
1309d7afbed112f0e8e90be9af975550caa0076b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1309d7afbed112f0e8e90be9af975550caa0076b
char/tpm: Fix unitialized usage of data buffer This patch fixes information leakage to the userspace by initializing the data buffer to zero. Reported-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Peter Huewe <huewe.external@infineon.com> Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com> [ Also re...
0
static void user_reader_timeout(unsigned long ptr) { struct tpm_chip *chip = (struct tpm_chip *) ptr; schedule_work(&chip->work); }
214,240,534,996,384,600,000,000,000,000,000,000,000
tpm.c
114,485,295,375,309,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1160
29,577
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int check_chainloops(const struct ebt_entries *chain, struct ebt_cl_stack *cl_s, unsigned int udc_cnt, unsigned int hooknr, char *base) { int i, chain_nr = -1, pos = 0, nentries = chain->nentries, verdict; const struct ebt_entry *e = (struct ebt_entry *)chain->data; const struct ebt_entry_target *t; whil...
289,187,138,119,820,180,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,578
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_calc_entry(const struct ebt_entry *e, const struct ebt_table_info *info, const void *base, struct compat_ebt_replace *newinfo) { const struct ebt_entry_target *t; unsigned int entry_offset; int off, ret, i; if (e->bitmask == 0) return 0; off = 0; entry_offset = (void ...
23,932,292,850,722,363,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,579
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_calc_watcher(struct ebt_entry_watcher *w, int *off) { *off += xt_compat_target_offset(w->u.watcher); *off += ebt_compat_entry_padsize(); return 0; }
331,362,089,742,953,200,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,580
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_copy_entries(unsigned char *data, unsigned int size_user, struct ebt_entries_buf_state *state) { unsigned int size_remaining = size_user; int ret; ret = EBT_ENTRY_ITERATE(data, size_user, size_entry_mwt, data, &size_remaining, state); if (ret < 0) return ret; WARN_ON(size_remaining);...
310,145,064,969,461,370,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,581
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_copy_entry_to_user(struct ebt_entry *e, void __user **dstptr, unsigned int *size) { struct ebt_entry_target *t; struct ebt_entry __user *ce; u32 watchers_offset, target_offset, next_offset; compat_uint_t origsize; int ret; if (e->bitmask == 0) { if (*size < sizeof(struct ebt_entries)) ...
143,287,425,353,722,120,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,582
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_copy_everything_to_user(struct ebt_table *t, void __user *user, int *len, int cmd) { struct compat_ebt_replace repl, tmp; struct ebt_counter *oldcounters; struct ebt_table_info tinfo; int ret; void __user *pos; memset(&tinfo, 0, sizeof(tinfo)); if (cmd == EBT_SO_GET_ENTRIES) { tinfo....
129,690,450,845,899,360,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,583
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) { int ret; struct compat_ebt_replace tmp; struct ebt_table *t; if (!capable(CAP_NET_ADMIN)) return -EPERM; /* try real handler in case userland supplied needed padding */ if ((cmd == EBT_SO_GET_INFO || cmd == EBT_S...
323,383,473,610,281,940,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,584
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len) { int ret; if (!capable(CAP_NET_ADMIN)) return -EPERM; switch (cmd) { case EBT_SO_SET_ENTRIES: ret = compat_do_replace(sock_net(sk), user, len); break; case EBT_SO_SET_COUNTERS: ret = compat_update_counters(...
252,820,682,652,147,970,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080