idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
29,585 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_do_replace(struct net *net, void __user *user,
unsigned int len)
{
int ret, i, countersize, size64;
struct ebt_table_info *newinfo;
struct ebt_replace tmp;
struct ebt_entries_buf_state state;
void *entries_tmp;
ret = compat_copy_ebt_replace_from_user(&tmp, user, len);
if (ret) {
/* t... | 229,842,489,337,794,430,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,586 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_match_to_user(struct ebt_entry_match *m, void __user **dstptr,
unsigned int *size)
{
const struct xt_match *match = m->u.match;
struct compat_ebt_entry_mwt __user *cm = *dstptr;
int off = ebt_compat_match_offset(match, m->match_size);
compat_uint_t msize = m->match_size - off;
BUG_ON(off >= ... | 254,874,328,113,439,350,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,587 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_mtw_from_user(struct compat_ebt_entry_mwt *mwt,
enum compat_mwt compat_mwt,
struct ebt_entries_buf_state *state,
const unsigned char *base)
{
char name[EBT_FUNCTION_MAXNAMELEN];
struct xt_match *match;
struct xt_target *wt;
void *dst = NULL;
int off, pad = 0, ret = 0;
unsigned int si... | 237,250,881,292,278,360,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,588 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_target_to_user(struct ebt_entry_target *t,
void __user **dstptr,
unsigned int *size)
{
const struct xt_target *target = t->u.target;
struct compat_ebt_entry_mwt __user *cm = *dstptr;
int off = xt_compat_target_offset(target);
compat_uint_t tsize = t->target_size - off;
BUG_ON(off >= t-... | 250,340,783,919,181,530,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,589 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int compat_watcher_to_user(struct ebt_entry_watcher *w,
void __user **dstptr,
unsigned int *size)
{
return compat_target_to_user((struct ebt_entry_target *)w,
dstptr, size);
}
| 249,212,298,269,559,040,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,590 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int copy_counters_to_user(struct ebt_table *t,
const struct ebt_counter *oldcounters,
void __user *user, unsigned int num_counters,
unsigned int nentries)
{
struct ebt_counter *counterstmp;
int ret = 0;
/* userspace might not need the counters */
if (num_counters == 0)
return 0;
if (nu... | 214,066,961,326,502,430,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,591 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int copy_everything_to_user(struct ebt_table *t, void __user *user,
const int *len, int cmd)
{
struct ebt_replace tmp;
const struct ebt_counter *oldcounters;
unsigned int entries_size, nentries;
int ret;
char *entries;
if (cmd == EBT_SO_GET_ENTRIES) {
entries_size = t->private->entries_size;
nentr... | 1,189,813,762,719,007,900,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,592 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
{
int ret;
struct ebt_replace tmp;
struct ebt_table *t;
if (!capable(CAP_NET_ADMIN))
return -EPERM;
if (copy_from_user(&tmp, user, sizeof(tmp)))
return -EFAULT;
t = find_table_lock(sock_net(sk), tmp.name, &ret, &ebt_mutex);
i... | 329,511,262,943,778,840,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,593 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int do_ebt_set_ctl(struct sock *sk,
int cmd, void __user *user, unsigned int len)
{
int ret;
if (!capable(CAP_NET_ADMIN))
return -EPERM;
switch(cmd) {
case EBT_SO_SET_ENTRIES:
ret = do_replace(sock_net(sk), user, len);
break;
case EBT_SO_SET_COUNTERS:
ret = update_counters(sock_net(sk), user, len... | 299,289,973,808,826,300,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,594 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int do_replace_finish(struct net *net, struct ebt_replace *repl,
struct ebt_table_info *newinfo)
{
int ret, i;
struct ebt_counter *counterstmp = NULL;
/* used to be able to unlock earlier */
struct ebt_table_info *table;
struct ebt_table *t;
/* the user wants counters back
the check on the si... | 272,778,129,596,429,600,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,595 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int do_update_counters(struct net *net, const char *name,
struct ebt_counter __user *counters,
unsigned int num_counters,
const void __user *user, unsigned int len)
{
int i, ret;
struct ebt_counter *tmp;
struct ebt_table *t;
if (num_counters == 0)
return -EINVAL;
tmp = vmalloc(num_counters *... | 253,534,465,345,822,450,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,596 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_basic_match(const struct ebt_entry *e, const struct sk_buff *skb,
const struct net_device *in, const struct net_device *out)
{
const struct ethhdr *h = eth_hdr(skb);
const struct net_bridge_port *p;
__be16 ethproto;
int verdict, i;
if (vlan_tx_tag_present(skb))
ethproto = htons(ETH_P_8021Q);... | 230,666,592,789,252,200,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,597 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int ebt_buf_add(struct ebt_entries_buf_state *state,
void *data, unsigned int sz)
{
if (state->buf_kern_start == NULL)
goto count_only;
BUG_ON(state->buf_kern_offset + sz > state->buf_kern_len);
memcpy(state->buf_kern_start + state->buf_kern_offset, data, sz);
count_only:
state->buf_user_offse... | 306,424,752,315,225,560,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,598 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int ebt_buf_add_pad(struct ebt_entries_buf_state *state, unsigned int sz)
{
char *b = state->buf_kern_start;
BUG_ON(b && state->buf_kern_offset > state->buf_kern_len);
if (b != NULL && sz > 0)
memset(b + state->buf_kern_offset, 0, sz);
/* do not adjust ->buf_user_offset here, we added kernel-side padding... | 130,080,860,033,931,060,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,599 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_check_entry_size_and_hooks(const struct ebt_entry *e,
const struct ebt_table_info *newinfo,
unsigned int *n, unsigned int *cnt,
unsigned int *totalcnt, unsigned int *udc_cnt)
{
int i;
for (i = 0; i < NF_BR_NUMHOOKS; i++) {
if ((void *)e == (void *)newinfo->hook_entry[i])
break;
}
/* beginning of ... | 293,168,497,692,248,730,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,600 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_check_match(struct ebt_entry_match *m, struct xt_mtchk_param *par,
unsigned int *cnt)
{
const struct ebt_entry *e = par->entryinfo;
struct xt_match *match;
size_t left = ((char *)e + e->watchers_offset) - (char *)m;
int ret;
if (left < sizeof(struct ebt_entry_match) ||
left - sizeof(struct ebt_entry_ma... | 46,907,104,229,164,230,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,601 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_check_watcher(struct ebt_entry_watcher *w, struct xt_tgchk_param *par,
unsigned int *cnt)
{
const struct ebt_entry *e = par->entryinfo;
struct xt_target *watcher;
size_t left = ((char *)e + e->target_offset) - (char *)w;
int ret;
if (left < sizeof(struct ebt_entry_watcher) ||
left - sizeof(struct ebt_... | 307,251,952,053,309,200,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,602 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_cleanup_entry(struct ebt_entry *e, struct net *net, unsigned int *cnt)
{
struct xt_tgdtor_param par;
struct ebt_entry_target *t;
if (e->bitmask == 0)
return 0;
/* we're done */
if (cnt && (*cnt)-- == 0)
return 1;
EBT_WATCHER_ITERATE(e, ebt_cleanup_watcher, net, NULL);
EBT_MATCH_ITERATE(e, ebt_cleanup_ma... | 315,758,386,882,040,270,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,603 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_cleanup_match(struct ebt_entry_match *m, struct net *net, unsigned int *i)
{
struct xt_mtdtor_param par;
if (i && (*i)-- == 0)
return 1;
par.net = net;
par.match = m->u.match;
par.matchinfo = m->data;
par.family = NFPROTO_BRIDGE;
if (par.match->destroy != NULL)
par.match->destroy(&par);
m... | 308,321,748,295,522,950,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,604 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_cleanup_watcher(struct ebt_entry_watcher *w, struct net *net, unsigned int *i)
{
struct xt_tgdtor_param par;
if (i && (*i)-- == 0)
return 1;
par.net = net;
par.target = w->u.watcher;
par.targinfo = w->data;
par.family = NFPROTO_BRIDGE;
if (par.target->destroy != NULL)
par.target->destroy(&par)... | 16,276,708,502,811,230,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,605 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int ebt_compat_entry_padsize(void)
{
BUILD_BUG_ON(XT_ALIGN(sizeof(struct ebt_entry_match)) <
COMPAT_XT_ALIGN(sizeof(struct compat_ebt_entry_mwt)));
return (int) XT_ALIGN(sizeof(struct ebt_entry_match)) -
COMPAT_XT_ALIGN(sizeof(struct compat_ebt_entry_mwt));
}
| 314,632,605,942,379,080,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,606 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int ebt_compat_match_offset(const struct xt_match *match,
unsigned int userlen)
{
/*
* ebt_among needs special handling. The kernel .matchsize is
* set to -1 at registration time; at runtime an EBT_ALIGN()ed
* value is expected.
* Example: userspace sends 4500, ebt_among.c wants 4504.
*/
if (u... | 277,952,142,396,359,000,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,607 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_dev_check(const char *entry, const struct net_device *device)
{
int i = 0;
const char *devname;
if (*entry == '\0')
return 0;
if (!device)
return 1;
devname = device->name;
/* 1 is the wildcard token */
while (entry[i] != '\0' && entry[i] != 1 && entry[i] == devname[i])
i++;
return (devname[i] != ent... | 170,458,418,575,662,060,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,608 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | unsigned int ebt_do_table (unsigned int hook, struct sk_buff *skb,
const struct net_device *in, const struct net_device *out,
struct ebt_table *table)
{
int i, nentries;
struct ebt_entry *point;
struct ebt_counter *counter_base, *cb_base;
const struct ebt_entry_target *t;
int verdict, sp = 0;
struct ebt_cha... | 178,881,301,999,683,170,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,609 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static inline int ebt_make_matchname(const struct ebt_entry_match *m,
const char *base, char __user *ubase)
{
char __user *hlp = ubase + ((char *)m - base);
if (copy_to_user(hlp, m->u.match->name, EBT_FUNCTION_MAXNAMELEN))
return -EFAULT;
return 0;
}
| 328,887,731,999,872,870,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,610 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_make_names(struct ebt_entry *e, const char *base, char __user *ubase)
{
int ret;
char __user *hlp;
const struct ebt_entry_target *t;
if (e->bitmask == 0)
return 0;
hlp = ubase + (((char *)e + e->target_offset) - base);
t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);
ret = EBT_MATCH_ITER... | 286,695,475,725,568,200,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,611 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static inline int ebt_make_watchername(const struct ebt_entry_watcher *w,
const char *base, char __user *ubase)
{
char __user *hlp = ubase + ((char *)w - base);
if (copy_to_user(hlp , w->u.watcher->name, EBT_FUNCTION_MAXNAMELEN))
return -EFAULT;
return 0;
}
| 193,972,968,981,752,230,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,612 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | struct ebt_entry *ebt_next_entry(const struct ebt_entry *entry)
{
return (void *)entry + entry->next_offset;
}
| 200,338,687,588,601,270,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,613 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | ebt_register_table(struct net *net, const struct ebt_table *input_table)
{
struct ebt_table_info *newinfo;
struct ebt_table *t, *table;
struct ebt_replace_kernel *repl;
int ret, i, countersize;
void *p;
if (input_table == NULL || (repl = input_table->table) == NULL ||
repl->entries == NULL || repl->entries_... | 87,182,477,632,595,470,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,614 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int ebt_size_mwt(struct compat_ebt_entry_mwt *match32,
unsigned int size_left, enum compat_mwt type,
struct ebt_entries_buf_state *state, const void *base)
{
int growth = 0;
char *buf;
if (size_left == 0)
return 0;
buf = (char *) match32;
while (size_left >= sizeof(*match32)) {
struct ebt_entry... | 216,117,303,091,531,300,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,615 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static void ebt_standard_compat_from_user(void *dst, const void *src)
{
int v = *(compat_int_t *)src;
if (v >= 0)
v += xt_compat_calc_jump(NFPROTO_BRIDGE, v);
memcpy(dst, &v, sizeof(v));
}
| 39,889,252,890,986,000,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,616 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | void ebt_unregister_table(struct net *net, struct ebt_table *table)
{
int i;
if (!table) {
BUGPRINT("Request to unregister NULL table!!!\n");
return;
}
mutex_lock(&ebt_mutex);
list_del(&table->list);
mutex_unlock(&ebt_mutex);
EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size,
ebt_... | 148,703,509,398,341,620,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,617 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int ebt_verify_pointers(const struct ebt_replace *repl,
struct ebt_table_info *newinfo)
{
unsigned int limit = repl->entries_size;
unsigned int valid_hooks = repl->valid_hooks;
unsigned int offset = 0;
int i;
for (i = 0; i < NF_BR_NUMHOOKS; i++)
newinfo->hook_entry[i] = NULL;
newinfo->entries... | 246,267,646,926,598,620,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,618 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static void __exit ebtables_fini(void)
{
nf_unregister_sockopt(&ebt_sockopts);
xt_unregister_target(&ebt_standard_target);
printk(KERN_INFO "Ebtables v2.0 unregistered\n");
}
| 211,310,597,719,372,500,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,619 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int __init ebtables_init(void)
{
int ret;
ret = xt_register_target(&ebt_standard_target);
if (ret < 0)
return ret;
ret = nf_register_sockopt(&ebt_sockopts);
if (ret < 0) {
xt_unregister_target(&ebt_standard_target);
return ret;
}
printk(KERN_INFO "Ebtables v2.0 registered\n");
return 0;
}
| 66,924,430,564,930,840,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,620 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | find_inlist_lock(struct list_head *head, const char *name, const char *prefix,
int *error, struct mutex *mutex)
{
return try_then_request_module(
find_inlist_lock_noload(head, name, error, mutex),
"%s%s", prefix, name);
}
| 137,300,540,423,566,280,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,621 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | find_inlist_lock_noload(struct list_head *head, const char *name, int *error,
struct mutex *mutex)
{
struct {
struct list_head list;
char name[EBT_FUNCTION_MAXNAMELEN];
} *e;
*error = mutex_lock_interruptible(mutex);
if (*error != 0)
return NULL;
list_for_each_entry(e, head, list) {
if (strcmp(e->name... | 178,118,456,214,204,300,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,622 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | find_table_lock(struct net *net, const char *name, int *error,
struct mutex *mutex)
{
return find_inlist_lock(&net->xt.tables[NFPROTO_BRIDGE], name,
"ebtable_", error, mutex);
}
| 249,657,990,077,550,970,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,623 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static void get_counters(const struct ebt_counter *oldcounters,
struct ebt_counter *counters, unsigned int nentries)
{
int i, cpu;
struct ebt_counter *counter_base;
/* counters of cpu 0 */
memcpy(counters, oldcounters,
sizeof(struct ebt_counter) * nentries);
/* add other counters to those of cpu 0 */
... | 141,095,347,761,168,850,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,624 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int size_entry_mwt(struct ebt_entry *entry, const unsigned char *base,
unsigned int *total,
struct ebt_entries_buf_state *state)
{
unsigned int i, j, startoff, new_offset = 0;
/* stores match/watchers/targets & offset of next struct ebt_entry: */
unsigned int offsets[4];
unsigned int *offsets_updat... | 215,396,417,339,146,500,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,625 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 0 | static int translate_table(struct net *net, const char *name,
struct ebt_table_info *newinfo)
{
unsigned int i, j, k, udc_cnt;
int ret;
struct ebt_cl_stack *cl_s = NULL; /* used in the checking for chain loops */
i = 0;
while (i < NF_BR_NUMHOOKS && !newinfo->hook_entry[i])
i++;
if (i == NF_BR_NUMHOOKS) {... | 164,611,056,594,555,400,000,000,000,000,000,000,000 | ebtables.c | 113,570,915,128,802,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
29,626 | linux | 43629f8f5ea32a998d06d1bb41eefa0e821ff573 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573 | Bluetooth: bnep: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "device"
field is NULL terminated. This potentially leads to BUG() inside of
alloc_netdev_mqs() and/or information leak by creating a device with a name
made of contents of kernel stack.
Signed-off-by: Vasiliy Kul... | 0 | void __exit bnep_sock_cleanup(void)
{
if (bt_sock_unregister(BTPROTO_BNEP) < 0)
BT_ERR("Can't unregister BNEP socket");
proto_unregister(&bnep_proto);
}
| 248,763,422,332,007,850,000,000,000,000,000,000,000 | sock.c | 202,386,133,395,416,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1079 | The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN... | https://nvd.nist.gov/vuln/detail/CVE-2011-1079 |
29,627 | linux | 43629f8f5ea32a998d06d1bb41eefa0e821ff573 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573 | Bluetooth: bnep: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "device"
field is NULL terminated. This potentially leads to BUG() inside of
alloc_netdev_mqs() and/or information leak by creating a device with a name
made of contents of kernel stack.
Signed-off-by: Vasiliy Kul... | 0 | static int bnep_sock_compat_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
{
if (cmd == BNEPGETCONNLIST) {
struct bnep_connlist_req cl;
uint32_t uci;
int err;
if (get_user(cl.cnum, (uint32_t __user *) arg) ||
get_user(uci, (u32 __user *) (arg + 4)))
return -EFAULT;
cl.ci = compat_pt... | 48,089,961,195,765,160,000,000,000,000,000,000,000 | sock.c | 202,386,133,395,416,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1079 | The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN... | https://nvd.nist.gov/vuln/detail/CVE-2011-1079 |
29,628 | linux | 43629f8f5ea32a998d06d1bb41eefa0e821ff573 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573 | Bluetooth: bnep: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "device"
field is NULL terminated. This potentially leads to BUG() inside of
alloc_netdev_mqs() and/or information leak by creating a device with a name
made of contents of kernel stack.
Signed-off-by: Vasiliy Kul... | 0 | int __init bnep_sock_init(void)
{
int err;
err = proto_register(&bnep_proto, 0);
if (err < 0)
return err;
err = bt_sock_register(BTPROTO_BNEP, &bnep_sock_family_ops);
if (err < 0)
goto error;
return 0;
error:
BT_ERR("Can't register BNEP socket");
proto_unregister(&bnep_proto);
return err;
}
| 69,629,652,195,341,800,000,000,000,000,000,000,000 | sock.c | 202,386,133,395,416,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1079 | The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN... | https://nvd.nist.gov/vuln/detail/CVE-2011-1079 |
29,629 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void __sco_chan_add(struct sco_conn *conn, struct sock *sk, struct sock *parent)
{
BT_DBG("conn %p", conn);
sco_pi(sk)->conn = conn;
conn->sk = sk;
if (parent)
bt_accept_enqueue(parent, sk);
}
| 118,669,219,914,739,030,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,630 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static struct sock *__sco_get_sock_by_addr(bdaddr_t *ba)
{
struct sock *sk;
struct hlist_node *node;
sk_for_each(sk, node, &sco_sk_list.head)
if (!bacmp(&bt_sk(sk)->src, ba))
goto found;
sk = NULL;
found:
return sk;
}
| 82,927,569,774,889,450,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,631 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void __sco_sock_close(struct sock *sk)
{
BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
switch (sk->sk_state) {
case BT_LISTEN:
sco_sock_cleanup_listen(sk);
break;
case BT_CONNECTED:
case BT_CONFIG:
case BT_CONNECT:
case BT_DISCONN:
sco_chan_del(sk, ECONNRESET);
break;
de... | 72,473,851,270,617,660,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,632 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static inline int sco_chan_add(struct sco_conn *conn, struct sock *sk, struct sock *parent)
{
int err = 0;
sco_conn_lock(conn);
if (conn->sk)
err = -EBUSY;
else
__sco_chan_add(conn, sk, parent);
sco_conn_unlock(conn);
return err;
}
| 2,517,941,497,408,804,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,633 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_chan_del(struct sock *sk, int err)
{
struct sco_conn *conn;
conn = sco_pi(sk)->conn;
BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
if (conn) {
sco_conn_lock(conn);
conn->sk = NULL;
sco_pi(sk)->conn = NULL;
sco_conn_unlock(conn);
hci_conn_put(conn->hcon);
}
sk->sk_state = BT_CLOSED... | 173,971,586,832,202,260,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,634 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static inline struct sock *sco_chan_get(struct sco_conn *conn)
{
struct sock *sk = NULL;
sco_conn_lock(conn);
sk = conn->sk;
sco_conn_unlock(conn);
return sk;
}
| 130,881,911,386,106,570,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,635 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static struct sco_conn *sco_conn_add(struct hci_conn *hcon, __u8 status)
{
struct hci_dev *hdev = hcon->hdev;
struct sco_conn *conn = hcon->sco_data;
if (conn || status)
return conn;
conn = kzalloc(sizeof(struct sco_conn), GFP_ATOMIC);
if (!conn)
return NULL;
spin_lock_init(&conn->lock);
hcon->sco_data =... | 159,369,517,909,067,400,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,636 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_conn_ready(struct sco_conn *conn)
{
struct sock *parent;
struct sock *sk = conn->sk;
BT_DBG("conn %p", conn);
sco_conn_lock(conn);
if (sk) {
sco_sock_clear_timer(sk);
bh_lock_sock(sk);
sk->sk_state = BT_CONNECTED;
sk->sk_state_change(sk);
bh_unlock_sock(sk);
} else {
parent = sco_ge... | 308,343,065,013,860,870,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,637 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_connect(struct sock *sk)
{
bdaddr_t *src = &bt_sk(sk)->src;
bdaddr_t *dst = &bt_sk(sk)->dst;
struct sco_conn *conn;
struct hci_conn *hcon;
struct hci_dev *hdev;
int err, type;
BT_DBG("%s -> %s", batostr(src), batostr(dst));
hdev = hci_get_route(dst, src);
if (!hdev)
return -EHOSTUNREACH;
... | 199,323,351,768,102,400,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,638 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_connect_cfm(struct hci_conn *hcon, __u8 status)
{
BT_DBG("hcon %p bdaddr %s status %d", hcon, batostr(&hcon->dst), status);
if (hcon->type != SCO_LINK && hcon->type != ESCO_LINK)
return -EINVAL;
if (!status) {
struct sco_conn *conn;
conn = sco_conn_add(hcon, status);
if (conn)
sco_conn_r... | 260,315,807,527,100,560,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,639 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 type)
{
register struct sock *sk;
struct hlist_node *node;
int lm = 0;
if (type != SCO_LINK && type != ESCO_LINK)
return -EINVAL;
BT_DBG("hdev %s, bdaddr %s", hdev->name, batostr(bdaddr));
/* Find listening sockets */
read_lock(&sco_sk_... | 46,593,651,542,875,410,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,640 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_debugfs_open(struct inode *inode, struct file *file)
{
return single_open(file, sco_debugfs_show, inode->i_private);
}
| 201,805,521,614,707,820,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,641 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_debugfs_show(struct seq_file *f, void *p)
{
struct sock *sk;
struct hlist_node *node;
read_lock_bh(&sco_sk_list.lock);
sk_for_each(sk, node, &sco_sk_list.head) {
seq_printf(f, "%s %s %d\n", batostr(&bt_sk(sk)->src),
batostr(&bt_sk(sk)->dst), sk->sk_state);
}
read_unlock_bh(&sco_sk_list.loc... | 52,597,402,266,357,870,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,642 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_disconn_cfm(struct hci_conn *hcon, __u8 reason)
{
BT_DBG("hcon %p reason %d", hcon, reason);
if (hcon->type != SCO_LINK && hcon->type != ESCO_LINK)
return -EINVAL;
sco_conn_del(hcon, bt_err(reason));
return 0;
}
| 319,793,471,101,303,470,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,643 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void __exit sco_exit(void)
{
debugfs_remove(sco_debugfs);
if (bt_sock_unregister(BTPROTO_SCO) < 0)
BT_ERR("SCO socket unregistration failed");
if (hci_unregister_proto(&sco_hci_proto) < 0)
BT_ERR("SCO protocol unregistration failed");
proto_unregister(&sco_proto);
}
| 30,331,403,588,735,013,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,644 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static struct sock *sco_get_sock_listen(bdaddr_t *src)
{
struct sock *sk = NULL, *sk1 = NULL;
struct hlist_node *node;
read_lock(&sco_sk_list.lock);
sk_for_each(sk, node, &sco_sk_list.head) {
if (sk->sk_state != BT_LISTEN)
continue;
/* Exact match. */
if (!bacmp(&bt_sk(sk)->src, src))
break;
/* Cl... | 157,167,103,084,476,060,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,645 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int __init sco_init(void)
{
int err;
err = proto_register(&sco_proto, 0);
if (err < 0)
return err;
err = bt_sock_register(BTPROTO_SCO, &sco_sock_family_ops);
if (err < 0) {
BT_ERR("SCO socket registration failed");
goto error;
}
err = hci_register_proto(&sco_hci_proto);
if (err < 0) {
BT_ERR("... | 188,628,749,910,777,140,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,646 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static inline void sco_recv_frame(struct sco_conn *conn, struct sk_buff *skb)
{
struct sock *sk = sco_chan_get(conn);
if (!sk)
goto drop;
BT_DBG("sk %p len %d", sk, skb->len);
if (sk->sk_state != BT_CONNECTED)
goto drop;
if (!sock_queue_rcv_skb(sk, skb))
return;
drop:
kfree_skb(skb);
}
| 172,582,023,184,112,720,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,647 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_recv_scodata(struct hci_conn *hcon, struct sk_buff *skb)
{
struct sco_conn *conn = hcon->sco_data;
if (!conn)
goto drop;
BT_DBG("conn %p len %d", conn, skb->len);
if (skb->len) {
sco_recv_frame(conn, skb);
return 0;
}
drop:
kfree_skb(skb);
return 0;
}
| 203,880,707,162,430,730,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,648 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static inline int sco_send_frame(struct sock *sk, struct msghdr *msg, int len)
{
struct sco_conn *conn = sco_pi(sk)->conn;
struct sk_buff *skb;
int err, count;
/* Check outgoing MTU */
if (len > conn->mtu)
return -EINVAL;
BT_DBG("sk %p len %d", sk, len);
count = min_t(unsigned int, conn->mtu, len);
skb = b... | 337,615,966,143,013,100,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,649 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static struct sock *sco_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
{
struct sock *sk;
sk = sk_alloc(net, PF_BLUETOOTH, prio, &sco_proto);
if (!sk)
return NULL;
sock_init_data(sock, sk);
INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
sk->sk_destruct = sco_sock_destruct;
sk->sk_sndtimeo = ... | 297,590,426,076,992,800,000,000,000,000,000,000,000 | sco.c | 259,186,263,733,993,200,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,650 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
{
struct sockaddr_sco *sa = (struct sockaddr_sco *) addr;
struct sock *sk = sock->sk;
bdaddr_t *src = &sa->sco_bdaddr;
int err = 0;
BT_DBG("sk %p %s", sk, batostr(&sa->sco_bdaddr));
if (!addr || addr->sa_family != AF_BLUETOOTH)
... | 89,921,846,377,031,160,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,651 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_clear_timer(struct sock *sk)
{
BT_DBG("sock %p state %d", sk, sk->sk_state);
sk_stop_timer(sk, &sk->sk_timer);
}
| 107,875,280,703,160,330,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,652 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_close(struct sock *sk)
{
sco_sock_clear_timer(sk);
lock_sock(sk);
__sco_sock_close(sk);
release_sock(sk);
sco_sock_kill(sk);
}
| 94,105,855,787,441,620,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,653 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_create(struct net *net, struct socket *sock, int protocol,
int kern)
{
struct sock *sk;
BT_DBG("sock %p", sock);
sock->state = SS_UNCONNECTED;
if (sock->type != SOCK_SEQPACKET)
return -ESOCKTNOSUPPORT;
sock->ops = &sco_sock_ops;
sk = sco_sock_alloc(net, sock, protocol, GFP_ATOMIC)... | 30,254,968,374,222,580,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,654 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_destruct(struct sock *sk)
{
BT_DBG("sk %p", sk);
skb_queue_purge(&sk->sk_receive_queue);
skb_queue_purge(&sk->sk_write_queue);
}
| 88,223,350,931,283,480,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,655 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_sco *sa = (struct sockaddr_sco *) addr;
struct sock *sk = sock->sk;
BT_DBG("sock %p, sk %p", sock, sk);
addr->sa_family = AF_BLUETOOTH;
*len = sizeof(struct sockaddr_sco);
if (peer)
bacpy(&sa->sco_bd... | 240,510,448,533,291,100,000,000,000,000,000,000,000 | sco.c | 259,186,263,733,993,200,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,656 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_init(struct sock *sk, struct sock *parent)
{
BT_DBG("sk %p", sk);
if (parent)
sk->sk_type = parent->sk_type;
}
| 122,743,522,996,567,880,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,657 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_kill(struct sock *sk)
{
if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
return;
BT_DBG("sk %p state %d", sk, sk->sk_state);
/* Kill poor orphan */
bt_sock_unlink(&sco_sk_list, sk);
sock_set_flag(sk, SOCK_DEAD);
sock_put(sk);
}
| 267,792,617,219,460,850,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,658 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_listen(struct socket *sock, int backlog)
{
struct sock *sk = sock->sk;
int err = 0;
BT_DBG("sk %p backlog %d", sk, backlog);
lock_sock(sk);
if (sk->sk_state != BT_BOUND || sock->type != SOCK_SEQPACKET) {
err = -EBADFD;
goto done;
}
sk->sk_max_ack_backlog = backlog;
sk->sk_ack_backlog... | 189,695,014,406,271,800,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,659 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_release(struct socket *sock)
{
struct sock *sk = sock->sk;
int err = 0;
BT_DBG("sock %p, sk %p", sock, sk);
if (!sk)
return 0;
sco_sock_close(sk);
if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime) {
lock_sock(sk);
err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
relea... | 298,851,620,440,613,400,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,660 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
struct msghdr *msg, size_t len)
{
struct sock *sk = sock->sk;
int err;
BT_DBG("sock %p, sk %p", sock, sk);
err = sock_error(sk);
if (err)
return err;
if (msg->msg_flags & MSG_OOB)
return -EOPNOTSUPP;
lock_sock(sk);
if (sk->sk_s... | 289,232,381,263,741,100,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,661 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_set_timer(struct sock *sk, long timeout)
{
BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout);
sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
}
| 13,697,326,576,415,001,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,662 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
{
struct sock *sk = sock->sk;
int err = 0;
BT_DBG("sk %p", sk);
lock_sock(sk);
switch (optname) {
default:
err = -ENOPROTOOPT;
break;
}
release_sock(sk);
return err;
}
| 116,285,963,524,543,300,000,000,000,000,000,000,000 | sco.c | 188,977,212,689,375,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,663 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static int sco_sock_shutdown(struct socket *sock, int how)
{
struct sock *sk = sock->sk;
int err = 0;
BT_DBG("sock %p, sk %p", sock, sk);
if (!sk)
return 0;
lock_sock(sk);
if (!sk->sk_shutdown) {
sk->sk_shutdown = SHUTDOWN_MASK;
sco_sock_clear_timer(sk);
__sco_sock_close(sk);
if (sock_flag(sk, SOCK_... | 271,441,321,352,039,260,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,664 | linux | c4c896e1471aec3b004a693c689f60be3b17ac86 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c896e1471aec3b004a693c689f60be3b17ac86 | Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | 0 | static void sco_sock_timeout(unsigned long arg)
{
struct sock *sk = (struct sock *) arg;
BT_DBG("sock %p state %d", sk, sk->sk_state);
bh_lock_sock(sk);
sk->sk_err = ETIMEDOUT;
sk->sk_state_change(sk);
bh_unlock_sock(sk);
sco_sock_kill(sk);
sock_put(sk);
}
| 132,443,533,513,898,880,000,000,000,000,000,000,000 | sco.c | 130,640,662,370,797,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1078 | The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. | https://nvd.nist.gov/vuln/detail/CVE-2011-1078 |
29,685 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip)
{
return jhash_1word(mdb->secret, (__force u32)ip) & (mdb->max - 1);
}
| 74,583,332,016,577,430,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,686 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
const struct in6_addr *ip)
{
return jhash2((__force u32 *)ip->s6_addr32, 4, mdb->secret) & (mdb->max - 1);
}
| 330,326,989,591,428,250,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,687 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void __br_multicast_enable_port(struct net_bridge_port *port)
{
port->multicast_startup_queries_sent = 0;
if (try_to_del_timer_sync(&port->multicast_query_timer) >= 0 ||
del_timer(&port->multicast_query_timer))
mod_timer(&port->multicast_query_timer, jiffies);
}
| 193,656,881,358,125,080,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,688 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_ip4_multicast_add_group(struct net_bridge *br,
struct net_bridge_port *port,
__be32 group)
{
struct br_ip br_group;
if (ipv4_is_local_multicast(group))
return 0;
br_group.u.ip4 = group;
br_group.proto = htons(ETH_P_IP);
return br_multicast_add_group(br, port, &br_group);
}
| 2,159,779,507,039,751,700,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,689 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
__be32 group)
{
struct sk_buff *skb;
struct igmphdr *ih;
struct ethhdr *eth;
struct iphdr *iph;
skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
sizeof(*ih) + 4);
if (!skb)
goto out;
skb->protoco... | 41,510,545,874,499,153,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,690 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
struct net_bridge_port *port,
struct sk_buff *skb)
{
struct igmpv3_report *ih;
struct igmpv3_grec *grec;
int i;
int len;
int num;
int type;
int err = 0;
__be32 group;
if (!pskb_may_pull(skb, sizeof(*ih)))
return -EINVAL;
ih = igmp... | 155,639,526,314,967,320,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,691 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_ip4_multicast_leave_group(struct net_bridge *br,
struct net_bridge_port *port,
__be32 group)
{
struct br_ip br_group;
if (ipv4_is_local_multicast(group))
return;
br_group.u.ip4 = group;
br_group.proto = htons(ETH_P_IP);
br_multicast_leave_group(br, port, &br_group);
}
| 322,609,575,533,803,300,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,692 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_ip4_multicast_query(struct net_bridge *br,
struct net_bridge_port *port,
struct sk_buff *skb)
{
struct iphdr *iph = ip_hdr(skb);
struct igmphdr *ih = igmp_hdr(skb);
struct net_bridge_mdb_entry *mp;
struct igmpv3_query *ih3;
struct net_bridge_port_group *p;
struct net_bridge_port_group __... | 239,115,568,497,159,350,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,693 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_ip6_multicast_add_group(struct net_bridge *br,
struct net_bridge_port *port,
const struct in6_addr *group)
{
struct br_ip br_group;
if (ipv6_is_local_multicast(group))
return 0;
ipv6_addr_copy(&br_group.u.ip6, group);
br_group.proto = htons(ETH_P_IP);
return br_multicast_add_... | 250,431,617,756,856,000,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,694 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
struct in6_addr *group)
{
struct sk_buff *skb;
struct ipv6hdr *ip6h;
struct mld_msg *mldq;
struct ethhdr *eth;
u8 *hopopt;
unsigned long interval;
skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
8... | 328,539,686,406,513,500,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,695 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_ip6_multicast_mld2_report(struct net_bridge *br,
struct net_bridge_port *port,
struct sk_buff *skb)
{
struct icmp6hdr *icmp6h;
struct mld2_grec *grec;
int i;
int len;
int num;
int err = 0;
if (!pskb_may_pull(skb, sizeof(*icmp6h)))
return -EINVAL;
icmp6h = icmp6_hdr(skb);
num = ntohs... | 115,818,059,854,229,400,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,696 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
{
if (a->proto != b->proto)
return 0;
switch (a->proto) {
case htons(ETH_P_IP):
return a->u.ip4 == b->u.ip4;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
case htons(ETH_P_IPV6):
return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);... | 140,986,587,831,152,450,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,697 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
struct br_ip *ip)
{
switch (ip->proto) {
case htons(ETH_P_IP):
return __br_ip4_hash(mdb, ip->u.ip4);
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
case htons(ETH_P_IPV6):
return __br_ip6_hash(mdb, &ip->u.ip6);
#endif
}
return 0;
... | 229,817,123,562,345,170,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,698 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_mdb_copy(struct net_bridge_mdb_htable *new,
struct net_bridge_mdb_htable *old,
int elasticity)
{
struct net_bridge_mdb_entry *mp;
struct hlist_node *p;
int maxlen;
int len;
int i;
for (i = 0; i < old->max; i++)
hlist_for_each_entry(mp, p, &old->mhash[i], hlist[old->ver])
hlis... | 264,774,120,614,818,860,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,699 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_mdb_free(struct rcu_head *head)
{
struct net_bridge_mdb_htable *mdb =
container_of(head, struct net_bridge_mdb_htable, rcu);
struct net_bridge_mdb_htable *old = mdb->old;
mdb->old = NULL;
kfree(old->mhash);
kfree(old);
}
| 156,212,783,459,801,100,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,700 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
struct sk_buff *skb)
{
struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
struct br_ip ip;
if (br->multicast_disabled)
return NULL;
if (BR_INPUT_SKB_CB(skb)->igmp)
return NULL;
ip.proto = skb->protocol;
switch (skb->protocol) {... | 223,064,896,882,630,540,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,701 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct net_bridge_mdb_entry *br_mdb_ip4_get(
struct net_bridge_mdb_htable *mdb, __be32 dst)
{
struct br_ip br_dst;
br_dst.u.ip4 = dst;
br_dst.proto = htons(ETH_P_IP);
return br_mdb_ip_get(mdb, &br_dst);
}
| 297,301,049,432,491,800,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,702 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct net_bridge_mdb_entry *br_mdb_ip6_get(
struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst)
{
struct br_ip br_dst;
ipv6_addr_copy(&br_dst.u.ip6, dst);
br_dst.proto = htons(ETH_P_IPV6);
return br_mdb_ip_get(mdb, &br_dst);
}
| 57,093,382,691,971,320,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,703 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct net_bridge_mdb_entry *br_mdb_ip_get(
struct net_bridge_mdb_htable *mdb, struct br_ip *dst)
{
if (!mdb)
return NULL;
return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
}
| 223,167,319,092,981,670,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,704 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
int elasticity)
{
struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
struct net_bridge_mdb_htable *mdb;
int err;
mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
if (!mdb)
return -ENOMEM;
mdb->max = max;
mdb->old =... | 227,988,808,476,367,940,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.