idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
29,585
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_do_replace(struct net *net, void __user *user, unsigned int len) { int ret, i, countersize, size64; struct ebt_table_info *newinfo; struct ebt_replace tmp; struct ebt_entries_buf_state state; void *entries_tmp; ret = compat_copy_ebt_replace_from_user(&tmp, user, len); if (ret) { /* t...
229,842,489,337,794,430,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,586
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_match_to_user(struct ebt_entry_match *m, void __user **dstptr, unsigned int *size) { const struct xt_match *match = m->u.match; struct compat_ebt_entry_mwt __user *cm = *dstptr; int off = ebt_compat_match_offset(match, m->match_size); compat_uint_t msize = m->match_size - off; BUG_ON(off >= ...
254,874,328,113,439,350,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,587
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_mtw_from_user(struct compat_ebt_entry_mwt *mwt, enum compat_mwt compat_mwt, struct ebt_entries_buf_state *state, const unsigned char *base) { char name[EBT_FUNCTION_MAXNAMELEN]; struct xt_match *match; struct xt_target *wt; void *dst = NULL; int off, pad = 0, ret = 0; unsigned int si...
237,250,881,292,278,360,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,588
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_target_to_user(struct ebt_entry_target *t, void __user **dstptr, unsigned int *size) { const struct xt_target *target = t->u.target; struct compat_ebt_entry_mwt __user *cm = *dstptr; int off = xt_compat_target_offset(target); compat_uint_t tsize = t->target_size - off; BUG_ON(off >= t-...
250,340,783,919,181,530,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,589
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int compat_watcher_to_user(struct ebt_entry_watcher *w, void __user **dstptr, unsigned int *size) { return compat_target_to_user((struct ebt_entry_target *)w, dstptr, size); }
249,212,298,269,559,040,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,590
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int copy_counters_to_user(struct ebt_table *t, const struct ebt_counter *oldcounters, void __user *user, unsigned int num_counters, unsigned int nentries) { struct ebt_counter *counterstmp; int ret = 0; /* userspace might not need the counters */ if (num_counters == 0) return 0; if (nu...
214,066,961,326,502,430,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,591
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int copy_everything_to_user(struct ebt_table *t, void __user *user, const int *len, int cmd) { struct ebt_replace tmp; const struct ebt_counter *oldcounters; unsigned int entries_size, nentries; int ret; char *entries; if (cmd == EBT_SO_GET_ENTRIES) { entries_size = t->private->entries_size; nentr...
1,189,813,762,719,007,900,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,592
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) { int ret; struct ebt_replace tmp; struct ebt_table *t; if (!capable(CAP_NET_ADMIN)) return -EPERM; if (copy_from_user(&tmp, user, sizeof(tmp))) return -EFAULT; t = find_table_lock(sock_net(sk), tmp.name, &ret, &ebt_mutex); i...
329,511,262,943,778,840,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,593
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len) { int ret; if (!capable(CAP_NET_ADMIN)) return -EPERM; switch(cmd) { case EBT_SO_SET_ENTRIES: ret = do_replace(sock_net(sk), user, len); break; case EBT_SO_SET_COUNTERS: ret = update_counters(sock_net(sk), user, len...
299,289,973,808,826,300,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,594
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int do_replace_finish(struct net *net, struct ebt_replace *repl, struct ebt_table_info *newinfo) { int ret, i; struct ebt_counter *counterstmp = NULL; /* used to be able to unlock earlier */ struct ebt_table_info *table; struct ebt_table *t; /* the user wants counters back the check on the si...
272,778,129,596,429,600,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,595
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int do_update_counters(struct net *net, const char *name, struct ebt_counter __user *counters, unsigned int num_counters, const void __user *user, unsigned int len) { int i, ret; struct ebt_counter *tmp; struct ebt_table *t; if (num_counters == 0) return -EINVAL; tmp = vmalloc(num_counters *...
253,534,465,345,822,450,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,596
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_basic_match(const struct ebt_entry *e, const struct sk_buff *skb, const struct net_device *in, const struct net_device *out) { const struct ethhdr *h = eth_hdr(skb); const struct net_bridge_port *p; __be16 ethproto; int verdict, i; if (vlan_tx_tag_present(skb)) ethproto = htons(ETH_P_8021Q);...
230,666,592,789,252,200,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,597
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int ebt_buf_add(struct ebt_entries_buf_state *state, void *data, unsigned int sz) { if (state->buf_kern_start == NULL) goto count_only; BUG_ON(state->buf_kern_offset + sz > state->buf_kern_len); memcpy(state->buf_kern_start + state->buf_kern_offset, data, sz); count_only: state->buf_user_offse...
306,424,752,315,225,560,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,598
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int ebt_buf_add_pad(struct ebt_entries_buf_state *state, unsigned int sz) { char *b = state->buf_kern_start; BUG_ON(b && state->buf_kern_offset > state->buf_kern_len); if (b != NULL && sz > 0) memset(b + state->buf_kern_offset, 0, sz); /* do not adjust ->buf_user_offset here, we added kernel-side padding...
130,080,860,033,931,060,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,599
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_check_entry_size_and_hooks(const struct ebt_entry *e, const struct ebt_table_info *newinfo, unsigned int *n, unsigned int *cnt, unsigned int *totalcnt, unsigned int *udc_cnt) { int i; for (i = 0; i < NF_BR_NUMHOOKS; i++) { if ((void *)e == (void *)newinfo->hook_entry[i]) break; } /* beginning of ...
293,168,497,692,248,730,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,600
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_check_match(struct ebt_entry_match *m, struct xt_mtchk_param *par, unsigned int *cnt) { const struct ebt_entry *e = par->entryinfo; struct xt_match *match; size_t left = ((char *)e + e->watchers_offset) - (char *)m; int ret; if (left < sizeof(struct ebt_entry_match) || left - sizeof(struct ebt_entry_ma...
46,907,104,229,164,230,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,601
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_check_watcher(struct ebt_entry_watcher *w, struct xt_tgchk_param *par, unsigned int *cnt) { const struct ebt_entry *e = par->entryinfo; struct xt_target *watcher; size_t left = ((char *)e + e->target_offset) - (char *)w; int ret; if (left < sizeof(struct ebt_entry_watcher) || left - sizeof(struct ebt_...
307,251,952,053,309,200,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,602
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_cleanup_entry(struct ebt_entry *e, struct net *net, unsigned int *cnt) { struct xt_tgdtor_param par; struct ebt_entry_target *t; if (e->bitmask == 0) return 0; /* we're done */ if (cnt && (*cnt)-- == 0) return 1; EBT_WATCHER_ITERATE(e, ebt_cleanup_watcher, net, NULL); EBT_MATCH_ITERATE(e, ebt_cleanup_ma...
315,758,386,882,040,270,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,603
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_cleanup_match(struct ebt_entry_match *m, struct net *net, unsigned int *i) { struct xt_mtdtor_param par; if (i && (*i)-- == 0) return 1; par.net = net; par.match = m->u.match; par.matchinfo = m->data; par.family = NFPROTO_BRIDGE; if (par.match->destroy != NULL) par.match->destroy(&par); m...
308,321,748,295,522,950,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,604
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_cleanup_watcher(struct ebt_entry_watcher *w, struct net *net, unsigned int *i) { struct xt_tgdtor_param par; if (i && (*i)-- == 0) return 1; par.net = net; par.target = w->u.watcher; par.targinfo = w->data; par.family = NFPROTO_BRIDGE; if (par.target->destroy != NULL) par.target->destroy(&par)...
16,276,708,502,811,230,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,605
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int ebt_compat_entry_padsize(void) { BUILD_BUG_ON(XT_ALIGN(sizeof(struct ebt_entry_match)) < COMPAT_XT_ALIGN(sizeof(struct compat_ebt_entry_mwt))); return (int) XT_ALIGN(sizeof(struct ebt_entry_match)) - COMPAT_XT_ALIGN(sizeof(struct compat_ebt_entry_mwt)); }
314,632,605,942,379,080,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,606
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int ebt_compat_match_offset(const struct xt_match *match, unsigned int userlen) { /* * ebt_among needs special handling. The kernel .matchsize is * set to -1 at registration time; at runtime an EBT_ALIGN()ed * value is expected. * Example: userspace sends 4500, ebt_among.c wants 4504. */ if (u...
277,952,142,396,359,000,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,607
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_dev_check(const char *entry, const struct net_device *device) { int i = 0; const char *devname; if (*entry == '\0') return 0; if (!device) return 1; devname = device->name; /* 1 is the wildcard token */ while (entry[i] != '\0' && entry[i] != 1 && entry[i] == devname[i]) i++; return (devname[i] != ent...
170,458,418,575,662,060,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,608
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
unsigned int ebt_do_table (unsigned int hook, struct sk_buff *skb, const struct net_device *in, const struct net_device *out, struct ebt_table *table) { int i, nentries; struct ebt_entry *point; struct ebt_counter *counter_base, *cb_base; const struct ebt_entry_target *t; int verdict, sp = 0; struct ebt_cha...
178,881,301,999,683,170,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,609
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static inline int ebt_make_matchname(const struct ebt_entry_match *m, const char *base, char __user *ubase) { char __user *hlp = ubase + ((char *)m - base); if (copy_to_user(hlp, m->u.match->name, EBT_FUNCTION_MAXNAMELEN)) return -EFAULT; return 0; }
328,887,731,999,872,870,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,610
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_make_names(struct ebt_entry *e, const char *base, char __user *ubase) { int ret; char __user *hlp; const struct ebt_entry_target *t; if (e->bitmask == 0) return 0; hlp = ubase + (((char *)e + e->target_offset) - base); t = (struct ebt_entry_target *)(((char *)e) + e->target_offset); ret = EBT_MATCH_ITER...
286,695,475,725,568,200,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,611
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static inline int ebt_make_watchername(const struct ebt_entry_watcher *w, const char *base, char __user *ubase) { char __user *hlp = ubase + ((char *)w - base); if (copy_to_user(hlp , w->u.watcher->name, EBT_FUNCTION_MAXNAMELEN)) return -EFAULT; return 0; }
193,972,968,981,752,230,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,612
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
struct ebt_entry *ebt_next_entry(const struct ebt_entry *entry) { return (void *)entry + entry->next_offset; }
200,338,687,588,601,270,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,613
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
ebt_register_table(struct net *net, const struct ebt_table *input_table) { struct ebt_table_info *newinfo; struct ebt_table *t, *table; struct ebt_replace_kernel *repl; int ret, i, countersize; void *p; if (input_table == NULL || (repl = input_table->table) == NULL || repl->entries == NULL || repl->entries_...
87,182,477,632,595,470,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,614
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int ebt_size_mwt(struct compat_ebt_entry_mwt *match32, unsigned int size_left, enum compat_mwt type, struct ebt_entries_buf_state *state, const void *base) { int growth = 0; char *buf; if (size_left == 0) return 0; buf = (char *) match32; while (size_left >= sizeof(*match32)) { struct ebt_entry...
216,117,303,091,531,300,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,615
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static void ebt_standard_compat_from_user(void *dst, const void *src) { int v = *(compat_int_t *)src; if (v >= 0) v += xt_compat_calc_jump(NFPROTO_BRIDGE, v); memcpy(dst, &v, sizeof(v)); }
39,889,252,890,986,000,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,616
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
void ebt_unregister_table(struct net *net, struct ebt_table *table) { int i; if (!table) { BUGPRINT("Request to unregister NULL table!!!\n"); return; } mutex_lock(&ebt_mutex); list_del(&table->list); mutex_unlock(&ebt_mutex); EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size, ebt_...
148,703,509,398,341,620,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,617
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int ebt_verify_pointers(const struct ebt_replace *repl, struct ebt_table_info *newinfo) { unsigned int limit = repl->entries_size; unsigned int valid_hooks = repl->valid_hooks; unsigned int offset = 0; int i; for (i = 0; i < NF_BR_NUMHOOKS; i++) newinfo->hook_entry[i] = NULL; newinfo->entries...
246,267,646,926,598,620,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,618
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static void __exit ebtables_fini(void) { nf_unregister_sockopt(&ebt_sockopts); xt_unregister_target(&ebt_standard_target); printk(KERN_INFO "Ebtables v2.0 unregistered\n"); }
211,310,597,719,372,500,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,619
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int __init ebtables_init(void) { int ret; ret = xt_register_target(&ebt_standard_target); if (ret < 0) return ret; ret = nf_register_sockopt(&ebt_sockopts); if (ret < 0) { xt_unregister_target(&ebt_standard_target); return ret; } printk(KERN_INFO "Ebtables v2.0 registered\n"); return 0; }
66,924,430,564,930,840,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,620
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
find_inlist_lock(struct list_head *head, const char *name, const char *prefix, int *error, struct mutex *mutex) { return try_then_request_module( find_inlist_lock_noload(head, name, error, mutex), "%s%s", prefix, name); }
137,300,540,423,566,280,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,621
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
find_inlist_lock_noload(struct list_head *head, const char *name, int *error, struct mutex *mutex) { struct { struct list_head list; char name[EBT_FUNCTION_MAXNAMELEN]; } *e; *error = mutex_lock_interruptible(mutex); if (*error != 0) return NULL; list_for_each_entry(e, head, list) { if (strcmp(e->name...
178,118,456,214,204,300,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,622
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
find_table_lock(struct net *net, const char *name, int *error, struct mutex *mutex) { return find_inlist_lock(&net->xt.tables[NFPROTO_BRIDGE], name, "ebtable_", error, mutex); }
249,657,990,077,550,970,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,623
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static void get_counters(const struct ebt_counter *oldcounters, struct ebt_counter *counters, unsigned int nentries) { int i, cpu; struct ebt_counter *counter_base; /* counters of cpu 0 */ memcpy(counters, oldcounters, sizeof(struct ebt_counter) * nentries); /* add other counters to those of cpu 0 */ ...
141,095,347,761,168,850,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,624
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int size_entry_mwt(struct ebt_entry *entry, const unsigned char *base, unsigned int *total, struct ebt_entries_buf_state *state) { unsigned int i, j, startoff, new_offset = 0; /* stores match/watchers/targets & offset of next struct ebt_entry: */ unsigned int offsets[4]; unsigned int *offsets_updat...
215,396,417,339,146,500,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,625
linux
d846f71195d57b0bbb143382647c2c6638b04c5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a
bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the "name" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to modprobe commandline. It would be seen...
0
static int translate_table(struct net *net, const char *name, struct ebt_table_info *newinfo) { unsigned int i, j, k, udc_cnt; int ret; struct ebt_cl_stack *cl_s = NULL; /* used in the checking for chain loops */ i = 0; while (i < NF_BR_NUMHOOKS && !newinfo->hook_entry[i]) i++; if (i == NF_BR_NUMHOOKS) {...
164,611,056,594,555,400,000,000,000,000,000,000,000
ebtables.c
113,570,915,128,802,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ...
https://nvd.nist.gov/vuln/detail/CVE-2011-1080
29,626
linux
43629f8f5ea32a998d06d1bb41eefa0e821ff573
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573
Bluetooth: bnep: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the "device" field is NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of kernel stack. Signed-off-by: Vasiliy Kul...
0
void __exit bnep_sock_cleanup(void) { if (bt_sock_unregister(BTPROTO_BNEP) < 0) BT_ERR("Can't unregister BNEP socket"); proto_unregister(&bnep_proto); }
248,763,422,332,007,850,000,000,000,000,000,000,000
sock.c
202,386,133,395,416,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1079
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN...
https://nvd.nist.gov/vuln/detail/CVE-2011-1079
29,627
linux
43629f8f5ea32a998d06d1bb41eefa0e821ff573
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573
Bluetooth: bnep: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the "device" field is NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of kernel stack. Signed-off-by: Vasiliy Kul...
0
static int bnep_sock_compat_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg) { if (cmd == BNEPGETCONNLIST) { struct bnep_connlist_req cl; uint32_t uci; int err; if (get_user(cl.cnum, (uint32_t __user *) arg) || get_user(uci, (u32 __user *) (arg + 4))) return -EFAULT; cl.ci = compat_pt...
48,089,961,195,765,160,000,000,000,000,000,000,000
sock.c
202,386,133,395,416,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1079
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN...
https://nvd.nist.gov/vuln/detail/CVE-2011-1079
29,628
linux
43629f8f5ea32a998d06d1bb41eefa0e821ff573
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573
Bluetooth: bnep: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the "device" field is NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of kernel stack. Signed-off-by: Vasiliy Kul...
0
int __init bnep_sock_init(void) { int err; err = proto_register(&bnep_proto, 0); if (err < 0) return err; err = bt_sock_register(BTPROTO_BNEP, &bnep_sock_family_ops); if (err < 0) goto error; return 0; error: BT_ERR("Can't register BNEP socket"); proto_unregister(&bnep_proto); return err; }
69,629,652,195,341,800,000,000,000,000,000,000,000
sock.c
202,386,133,395,416,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1079
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN...
https://nvd.nist.gov/vuln/detail/CVE-2011-1079
29,629
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void __sco_chan_add(struct sco_conn *conn, struct sock *sk, struct sock *parent) { BT_DBG("conn %p", conn); sco_pi(sk)->conn = conn; conn->sk = sk; if (parent) bt_accept_enqueue(parent, sk); }
118,669,219,914,739,030,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,630
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static struct sock *__sco_get_sock_by_addr(bdaddr_t *ba) { struct sock *sk; struct hlist_node *node; sk_for_each(sk, node, &sco_sk_list.head) if (!bacmp(&bt_sk(sk)->src, ba)) goto found; sk = NULL; found: return sk; }
82,927,569,774,889,450,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,631
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void __sco_sock_close(struct sock *sk) { BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket); switch (sk->sk_state) { case BT_LISTEN: sco_sock_cleanup_listen(sk); break; case BT_CONNECTED: case BT_CONFIG: case BT_CONNECT: case BT_DISCONN: sco_chan_del(sk, ECONNRESET); break; de...
72,473,851,270,617,660,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,632
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static inline int sco_chan_add(struct sco_conn *conn, struct sock *sk, struct sock *parent) { int err = 0; sco_conn_lock(conn); if (conn->sk) err = -EBUSY; else __sco_chan_add(conn, sk, parent); sco_conn_unlock(conn); return err; }
2,517,941,497,408,804,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,633
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_chan_del(struct sock *sk, int err) { struct sco_conn *conn; conn = sco_pi(sk)->conn; BT_DBG("sk %p, conn %p, err %d", sk, conn, err); if (conn) { sco_conn_lock(conn); conn->sk = NULL; sco_pi(sk)->conn = NULL; sco_conn_unlock(conn); hci_conn_put(conn->hcon); } sk->sk_state = BT_CLOSED...
173,971,586,832,202,260,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,634
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static inline struct sock *sco_chan_get(struct sco_conn *conn) { struct sock *sk = NULL; sco_conn_lock(conn); sk = conn->sk; sco_conn_unlock(conn); return sk; }
130,881,911,386,106,570,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,635
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static struct sco_conn *sco_conn_add(struct hci_conn *hcon, __u8 status) { struct hci_dev *hdev = hcon->hdev; struct sco_conn *conn = hcon->sco_data; if (conn || status) return conn; conn = kzalloc(sizeof(struct sco_conn), GFP_ATOMIC); if (!conn) return NULL; spin_lock_init(&conn->lock); hcon->sco_data =...
159,369,517,909,067,400,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,636
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_conn_ready(struct sco_conn *conn) { struct sock *parent; struct sock *sk = conn->sk; BT_DBG("conn %p", conn); sco_conn_lock(conn); if (sk) { sco_sock_clear_timer(sk); bh_lock_sock(sk); sk->sk_state = BT_CONNECTED; sk->sk_state_change(sk); bh_unlock_sock(sk); } else { parent = sco_ge...
308,343,065,013,860,870,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,637
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_connect(struct sock *sk) { bdaddr_t *src = &bt_sk(sk)->src; bdaddr_t *dst = &bt_sk(sk)->dst; struct sco_conn *conn; struct hci_conn *hcon; struct hci_dev *hdev; int err, type; BT_DBG("%s -> %s", batostr(src), batostr(dst)); hdev = hci_get_route(dst, src); if (!hdev) return -EHOSTUNREACH; ...
199,323,351,768,102,400,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,638
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_connect_cfm(struct hci_conn *hcon, __u8 status) { BT_DBG("hcon %p bdaddr %s status %d", hcon, batostr(&hcon->dst), status); if (hcon->type != SCO_LINK && hcon->type != ESCO_LINK) return -EINVAL; if (!status) { struct sco_conn *conn; conn = sco_conn_add(hcon, status); if (conn) sco_conn_r...
260,315,807,527,100,560,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,639
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 type) { register struct sock *sk; struct hlist_node *node; int lm = 0; if (type != SCO_LINK && type != ESCO_LINK) return -EINVAL; BT_DBG("hdev %s, bdaddr %s", hdev->name, batostr(bdaddr)); /* Find listening sockets */ read_lock(&sco_sk_...
46,593,651,542,875,410,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,640
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_debugfs_open(struct inode *inode, struct file *file) { return single_open(file, sco_debugfs_show, inode->i_private); }
201,805,521,614,707,820,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,641
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_debugfs_show(struct seq_file *f, void *p) { struct sock *sk; struct hlist_node *node; read_lock_bh(&sco_sk_list.lock); sk_for_each(sk, node, &sco_sk_list.head) { seq_printf(f, "%s %s %d\n", batostr(&bt_sk(sk)->src), batostr(&bt_sk(sk)->dst), sk->sk_state); } read_unlock_bh(&sco_sk_list.loc...
52,597,402,266,357,870,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,642
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_disconn_cfm(struct hci_conn *hcon, __u8 reason) { BT_DBG("hcon %p reason %d", hcon, reason); if (hcon->type != SCO_LINK && hcon->type != ESCO_LINK) return -EINVAL; sco_conn_del(hcon, bt_err(reason)); return 0; }
319,793,471,101,303,470,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,643
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void __exit sco_exit(void) { debugfs_remove(sco_debugfs); if (bt_sock_unregister(BTPROTO_SCO) < 0) BT_ERR("SCO socket unregistration failed"); if (hci_unregister_proto(&sco_hci_proto) < 0) BT_ERR("SCO protocol unregistration failed"); proto_unregister(&sco_proto); }
30,331,403,588,735,013,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,644
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static struct sock *sco_get_sock_listen(bdaddr_t *src) { struct sock *sk = NULL, *sk1 = NULL; struct hlist_node *node; read_lock(&sco_sk_list.lock); sk_for_each(sk, node, &sco_sk_list.head) { if (sk->sk_state != BT_LISTEN) continue; /* Exact match. */ if (!bacmp(&bt_sk(sk)->src, src)) break; /* Cl...
157,167,103,084,476,060,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,645
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int __init sco_init(void) { int err; err = proto_register(&sco_proto, 0); if (err < 0) return err; err = bt_sock_register(BTPROTO_SCO, &sco_sock_family_ops); if (err < 0) { BT_ERR("SCO socket registration failed"); goto error; } err = hci_register_proto(&sco_hci_proto); if (err < 0) { BT_ERR("...
188,628,749,910,777,140,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,646
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static inline void sco_recv_frame(struct sco_conn *conn, struct sk_buff *skb) { struct sock *sk = sco_chan_get(conn); if (!sk) goto drop; BT_DBG("sk %p len %d", sk, skb->len); if (sk->sk_state != BT_CONNECTED) goto drop; if (!sock_queue_rcv_skb(sk, skb)) return; drop: kfree_skb(skb); }
172,582,023,184,112,720,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,647
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_recv_scodata(struct hci_conn *hcon, struct sk_buff *skb) { struct sco_conn *conn = hcon->sco_data; if (!conn) goto drop; BT_DBG("conn %p len %d", conn, skb->len); if (skb->len) { sco_recv_frame(conn, skb); return 0; } drop: kfree_skb(skb); return 0; }
203,880,707,162,430,730,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,648
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static inline int sco_send_frame(struct sock *sk, struct msghdr *msg, int len) { struct sco_conn *conn = sco_pi(sk)->conn; struct sk_buff *skb; int err, count; /* Check outgoing MTU */ if (len > conn->mtu) return -EINVAL; BT_DBG("sk %p len %d", sk, len); count = min_t(unsigned int, conn->mtu, len); skb = b...
337,615,966,143,013,100,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,649
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static struct sock *sco_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio) { struct sock *sk; sk = sk_alloc(net, PF_BLUETOOTH, prio, &sco_proto); if (!sk) return NULL; sock_init_data(sock, sk); INIT_LIST_HEAD(&bt_sk(sk)->accept_q); sk->sk_destruct = sco_sock_destruct; sk->sk_sndtimeo = ...
297,590,426,076,992,800,000,000,000,000,000,000,000
sco.c
259,186,263,733,993,200,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,650
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len) { struct sockaddr_sco *sa = (struct sockaddr_sco *) addr; struct sock *sk = sock->sk; bdaddr_t *src = &sa->sco_bdaddr; int err = 0; BT_DBG("sk %p %s", sk, batostr(&sa->sco_bdaddr)); if (!addr || addr->sa_family != AF_BLUETOOTH) ...
89,921,846,377,031,160,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,651
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_clear_timer(struct sock *sk) { BT_DBG("sock %p state %d", sk, sk->sk_state); sk_stop_timer(sk, &sk->sk_timer); }
107,875,280,703,160,330,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,652
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_close(struct sock *sk) { sco_sock_clear_timer(sk); lock_sock(sk); __sco_sock_close(sk); release_sock(sk); sco_sock_kill(sk); }
94,105,855,787,441,620,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,653
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_create(struct net *net, struct socket *sock, int protocol, int kern) { struct sock *sk; BT_DBG("sock %p", sock); sock->state = SS_UNCONNECTED; if (sock->type != SOCK_SEQPACKET) return -ESOCKTNOSUPPORT; sock->ops = &sco_sock_ops; sk = sco_sock_alloc(net, sock, protocol, GFP_ATOMIC)...
30,254,968,374,222,580,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,654
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_destruct(struct sock *sk) { BT_DBG("sk %p", sk); skb_queue_purge(&sk->sk_receive_queue); skb_queue_purge(&sk->sk_write_queue); }
88,223,350,931,283,480,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,655
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) { struct sockaddr_sco *sa = (struct sockaddr_sco *) addr; struct sock *sk = sock->sk; BT_DBG("sock %p, sk %p", sock, sk); addr->sa_family = AF_BLUETOOTH; *len = sizeof(struct sockaddr_sco); if (peer) bacpy(&sa->sco_bd...
240,510,448,533,291,100,000,000,000,000,000,000,000
sco.c
259,186,263,733,993,200,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,656
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_init(struct sock *sk, struct sock *parent) { BT_DBG("sk %p", sk); if (parent) sk->sk_type = parent->sk_type; }
122,743,522,996,567,880,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,657
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_kill(struct sock *sk) { if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket) return; BT_DBG("sk %p state %d", sk, sk->sk_state); /* Kill poor orphan */ bt_sock_unlink(&sco_sk_list, sk); sock_set_flag(sk, SOCK_DEAD); sock_put(sk); }
267,792,617,219,460,850,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,658
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_listen(struct socket *sock, int backlog) { struct sock *sk = sock->sk; int err = 0; BT_DBG("sk %p backlog %d", sk, backlog); lock_sock(sk); if (sk->sk_state != BT_BOUND || sock->type != SOCK_SEQPACKET) { err = -EBADFD; goto done; } sk->sk_max_ack_backlog = backlog; sk->sk_ack_backlog...
189,695,014,406,271,800,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,659
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_release(struct socket *sock) { struct sock *sk = sock->sk; int err = 0; BT_DBG("sock %p, sk %p", sock, sk); if (!sk) return 0; sco_sock_close(sk); if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime) { lock_sock(sk); err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); relea...
298,851,620,440,613,400,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,660
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len) { struct sock *sk = sock->sk; int err; BT_DBG("sock %p, sk %p", sock, sk); err = sock_error(sk); if (err) return err; if (msg->msg_flags & MSG_OOB) return -EOPNOTSUPP; lock_sock(sk); if (sk->sk_s...
289,232,381,263,741,100,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,661
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_set_timer(struct sock *sk, long timeout) { BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout); sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout); }
13,697,326,576,415,001,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,662
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen) { struct sock *sk = sock->sk; int err = 0; BT_DBG("sk %p", sk); lock_sock(sk); switch (optname) { default: err = -ENOPROTOOPT; break; } release_sock(sk); return err; }
116,285,963,524,543,300,000,000,000,000,000,000,000
sco.c
188,977,212,689,375,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,663
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static int sco_sock_shutdown(struct socket *sock, int how) { struct sock *sk = sock->sk; int err = 0; BT_DBG("sock %p, sk %p", sock, sk); if (!sk) return 0; lock_sock(sk); if (!sk->sk_shutdown) { sk->sk_shutdown = SHUTDOWN_MASK; sco_sock_clear_timer(sk); __sco_sock_close(sk); if (sock_flag(sk, SOCK_...
271,441,321,352,039,260,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,664
linux
c4c896e1471aec3b004a693c689f60be3b17ac86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86
Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openwall.com> Signed-off-by: Gustavo F. ...
0
static void sco_sock_timeout(unsigned long arg) { struct sock *sk = (struct sock *) arg; BT_DBG("sock %p state %d", sk, sk->sk_state); bh_lock_sock(sk); sk->sk_err = ETIMEDOUT; sk->sk_state_change(sk); bh_unlock_sock(sk); sco_sock_kill(sk); sock_put(sk); }
132,443,533,513,898,880,000,000,000,000,000,000,000
sco.c
130,640,662,370,797,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
https://nvd.nist.gov/vuln/detail/CVE-2011-1078
29,685
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip) { return jhash_1word(mdb->secret, (__force u32)ip) & (mdb->max - 1); }
74,583,332,016,577,430,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,686
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb, const struct in6_addr *ip) { return jhash2((__force u32 *)ip->s6_addr32, 4, mdb->secret) & (mdb->max - 1); }
330,326,989,591,428,250,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,687
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static void __br_multicast_enable_port(struct net_bridge_port *port) { port->multicast_startup_queries_sent = 0; if (try_to_del_timer_sync(&port->multicast_query_timer) >= 0 || del_timer(&port->multicast_query_timer)) mod_timer(&port->multicast_query_timer, jiffies); }
193,656,881,358,125,080,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,688
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_ip4_multicast_add_group(struct net_bridge *br, struct net_bridge_port *port, __be32 group) { struct br_ip br_group; if (ipv4_is_local_multicast(group)) return 0; br_group.u.ip4 = group; br_group.proto = htons(ETH_P_IP); return br_multicast_add_group(br, port, &br_group); }
2,159,779,507,039,751,700,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,689
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br, __be32 group) { struct sk_buff *skb; struct igmphdr *ih; struct ethhdr *eth; struct iphdr *iph; skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) + sizeof(*ih) + 4); if (!skb) goto out; skb->protoco...
41,510,545,874,499,153,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,690
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_ip4_multicast_igmp3_report(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct igmpv3_report *ih; struct igmpv3_grec *grec; int i; int len; int num; int type; int err = 0; __be32 group; if (!pskb_may_pull(skb, sizeof(*ih))) return -EINVAL; ih = igmp...
155,639,526,314,967,320,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,691
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static void br_ip4_multicast_leave_group(struct net_bridge *br, struct net_bridge_port *port, __be32 group) { struct br_ip br_group; if (ipv4_is_local_multicast(group)) return; br_group.u.ip4 = group; br_group.proto = htons(ETH_P_IP); br_multicast_leave_group(br, port, &br_group); }
322,609,575,533,803,300,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,692
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_ip4_multicast_query(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct iphdr *iph = ip_hdr(skb); struct igmphdr *ih = igmp_hdr(skb); struct net_bridge_mdb_entry *mp; struct igmpv3_query *ih3; struct net_bridge_port_group *p; struct net_bridge_port_group __...
239,115,568,497,159,350,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,693
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_ip6_multicast_add_group(struct net_bridge *br, struct net_bridge_port *port, const struct in6_addr *group) { struct br_ip br_group; if (ipv6_is_local_multicast(group)) return 0; ipv6_addr_copy(&br_group.u.ip6, group); br_group.proto = htons(ETH_P_IP); return br_multicast_add_...
250,431,617,756,856,000,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,694
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br, struct in6_addr *group) { struct sk_buff *skb; struct ipv6hdr *ip6h; struct mld_msg *mldq; struct ethhdr *eth; u8 *hopopt; unsigned long interval; skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) + 8...
328,539,686,406,513,500,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,695
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_ip6_multicast_mld2_report(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct icmp6hdr *icmp6h; struct mld2_grec *grec; int i; int len; int num; int err = 0; if (!pskb_may_pull(skb, sizeof(*icmp6h))) return -EINVAL; icmp6h = icmp6_hdr(skb); num = ntohs...
115,818,059,854,229,400,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,696
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b) { if (a->proto != b->proto) return 0; switch (a->proto) { case htons(ETH_P_IP): return a->u.ip4 == b->u.ip4; #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) case htons(ETH_P_IPV6): return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);...
140,986,587,831,152,450,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,697
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb, struct br_ip *ip) { switch (ip->proto) { case htons(ETH_P_IP): return __br_ip4_hash(mdb, ip->u.ip4); #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) case htons(ETH_P_IPV6): return __br_ip6_hash(mdb, &ip->u.ip6); #endif } return 0; ...
229,817,123,562,345,170,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,698
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_mdb_copy(struct net_bridge_mdb_htable *new, struct net_bridge_mdb_htable *old, int elasticity) { struct net_bridge_mdb_entry *mp; struct hlist_node *p; int maxlen; int len; int i; for (i = 0; i < old->max; i++) hlist_for_each_entry(mp, p, &old->mhash[i], hlist[old->ver]) hlis...
264,774,120,614,818,860,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,699
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static void br_mdb_free(struct rcu_head *head) { struct net_bridge_mdb_htable *mdb = container_of(head, struct net_bridge_mdb_htable, rcu); struct net_bridge_mdb_htable *old = mdb->old; mdb->old = NULL; kfree(old->mhash); kfree(old); }
156,212,783,459,801,100,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,700
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br, struct sk_buff *skb) { struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb); struct br_ip ip; if (br->multicast_disabled) return NULL; if (BR_INPUT_SKB_CB(skb)->igmp) return NULL; ip.proto = skb->protocol; switch (skb->protocol) {...
223,064,896,882,630,540,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,701
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static struct net_bridge_mdb_entry *br_mdb_ip4_get( struct net_bridge_mdb_htable *mdb, __be32 dst) { struct br_ip br_dst; br_dst.u.ip4 = dst; br_dst.proto = htons(ETH_P_IP); return br_mdb_ip_get(mdb, &br_dst); }
297,301,049,432,491,800,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,702
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static struct net_bridge_mdb_entry *br_mdb_ip6_get( struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst) { struct br_ip br_dst; ipv6_addr_copy(&br_dst.u.ip6, dst); br_dst.proto = htons(ETH_P_IPV6); return br_mdb_ip_get(mdb, &br_dst); }
57,093,382,691,971,320,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,703
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static struct net_bridge_mdb_entry *br_mdb_ip_get( struct net_bridge_mdb_htable *mdb, struct br_ip *dst) { if (!mdb) return NULL; return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst)); }
223,167,319,092,981,670,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716
29,704
linux
6b0d6a9b4296fa16a28d10d416db7a770fc03287
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287
bridge: Fix mglist corruption that leads to memory corruption The list mp->mglist is used to indicate whether a multicast group is active on the bridge interface itself as opposed to one of the constituent interfaces in the bridge. Unfortunately the operation that adds the mp->mglist node to the list neglected to che...
0
static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max, int elasticity) { struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1); struct net_bridge_mdb_htable *mdb; int err; mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC); if (!mdb) return -ENOMEM; mdb->max = max; mdb->old =...
227,988,808,476,367,940,000,000,000,000,000,000,000
br_multicast.c
98,479,723,134,747,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-0716
The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface.
https://nvd.nist.gov/vuln/detail/CVE-2011-0716