idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
29,705 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | void br_multicast_add_port(struct net_bridge_port *port)
{
port->multicast_router = 1;
setup_timer(&port->multicast_router_timer, br_multicast_router_expired,
(unsigned long)port);
setup_timer(&port->multicast_query_timer,
br_multicast_port_query_expired, (unsigned long)port);
}
| 241,577,361,103,303,140,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,706 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_add_router(struct net_bridge *br,
struct net_bridge_port *port)
{
struct net_bridge_port *p;
struct hlist_node *n, *slot = NULL;
hlist_for_each_entry(p, n, &br->router_list, rlist) {
if ((unsigned long) port >= (unsigned long) p)
break;
slot = n;
}
if (slot)
hlist_add_af... | 313,141,644,787,691,600,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,707 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
struct br_ip *addr)
{
switch (addr->proto) {
case htons(ETH_P_IP):
return br_ip4_multicast_alloc_query(br, addr->u.ip4);
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
case htons(ETH_P_IPV6):
return br_ip6_multicast_alloc_query... | 26,022,228,929,390,460,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,708 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_del_pg(struct net_bridge *br,
struct net_bridge_port_group *pg)
{
struct net_bridge_mdb_htable *mdb;
struct net_bridge_mdb_entry *mp;
struct net_bridge_port_group *p;
struct net_bridge_port_group __rcu **pp;
mdb = mlock_dereference(br->mdb, br);
mp = br_mdb_ip_get(mdb, &pg->addr);
... | 216,327,379,263,743,500,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,709 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | void br_multicast_del_port(struct net_bridge_port *port)
{
del_timer_sync(&port->multicast_router_timer);
}
| 52,685,210,241,730,130,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,710 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | void br_multicast_disable_port(struct net_bridge_port *port)
{
struct net_bridge *br = port->br;
struct net_bridge_port_group *pg;
struct hlist_node *p, *n;
spin_lock(&br->multicast_lock);
hlist_for_each_entry_safe(pg, p, n, &port->mglist, mglist)
br_multicast_del_pg(br, pg);
if (!hlist_unhashed(&port->rlist)... | 136,952,350,556,143,300,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,711 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_free_group(struct rcu_head *head)
{
struct net_bridge_mdb_entry *mp =
container_of(head, struct net_bridge_mdb_entry, rcu);
kfree(mp);
}
| 31,878,878,557,517,680,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,712 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_free_pg(struct rcu_head *head)
{
struct net_bridge_port_group *p =
container_of(head, struct net_bridge_port_group, rcu);
kfree(p);
}
| 315,368,005,040,946,750,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,713 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct net_bridge_mdb_entry *br_multicast_get_group(
struct net_bridge *br, struct net_bridge_port *port,
struct br_ip *group, int hash)
{
struct net_bridge_mdb_htable *mdb;
struct net_bridge_mdb_entry *mp;
struct hlist_node *p;
unsigned count = 0;
unsigned max;
int elasticity;
int err;
mdb = rcu_dere... | 274,314,063,986,678,300,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,714 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_group_expired(unsigned long data)
{
struct net_bridge_mdb_entry *mp = (void *)data;
struct net_bridge *br = mp->br;
struct net_bridge_mdb_htable *mdb;
spin_lock(&br->multicast_lock);
if (!netif_running(br->dev) || timer_pending(&mp->timer))
goto out;
if (!hlist_unhashed(&mp->mglist))
... | 28,587,098,026,035,995,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,715 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_group_query_expired(unsigned long data)
{
struct net_bridge_mdb_entry *mp = (void *)data;
struct net_bridge *br = mp->br;
spin_lock(&br->multicast_lock);
if (!netif_running(br->dev) || hlist_unhashed(&mp->mglist) ||
mp->queries_sent >= br->multicast_last_member_count)
goto out;
br... | 24,237,157,105,563,880,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,716 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | void br_multicast_init(struct net_bridge *br)
{
br->hash_elasticity = 4;
br->hash_max = 512;
br->multicast_router = 1;
br->multicast_last_member_count = 2;
br->multicast_startup_query_count = 2;
br->multicast_last_member_interval = HZ;
br->multicast_query_response_interval = 10 * HZ;
br->multicast_startup_que... | 100,989,064,418,817,930,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,717 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_multicast_ipv4_rcv(struct net_bridge *br,
struct net_bridge_port *port,
struct sk_buff *skb)
{
struct sk_buff *skb2 = skb;
struct iphdr *iph;
struct igmphdr *ih;
unsigned len;
unsigned offset;
int err;
/* We treat OOM as packet loss for now. */
if (!pskb_may_pull(skb, sizeof(*iph)))
r... | 122,916,310,199,942,370,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,718 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static int br_multicast_ipv6_rcv(struct net_bridge *br,
struct net_bridge_port *port,
struct sk_buff *skb)
{
struct sk_buff *skb2;
struct ipv6hdr *ip6h;
struct icmp6hdr *icmp6h;
u8 nexthdr;
unsigned len;
int offset;
int err;
if (!pskb_may_pull(skb, sizeof(*ip6h)))
return -EINVAL;
ip6h = ipv6_hdr(... | 256,892,856,514,341,600,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,719 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_leave_group(struct net_bridge *br,
struct net_bridge_port *port,
struct br_ip *group)
{
struct net_bridge_mdb_htable *mdb;
struct net_bridge_mdb_entry *mp;
struct net_bridge_port_group *p;
unsigned long now;
unsigned long time;
spin_lock(&br->multicast_lock);
if (!neti... | 218,016,997,337,821,060,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,720 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_local_router_expired(unsigned long data)
{
}
| 314,319,071,023,109,750,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,721 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_mark_router(struct net_bridge *br,
struct net_bridge_port *port)
{
unsigned long now = jiffies;
if (!port) {
if (br->multicast_router == 1)
mod_timer(&br->multicast_router_timer,
now + br->multicast_querier_interval);
return;
}
if (port->multicast_router != 1)
retu... | 253,253,668,705,556,150,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,722 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static struct net_bridge_mdb_entry *br_multicast_new_group(
struct net_bridge *br, struct net_bridge_port *port,
struct br_ip *group)
{
struct net_bridge_mdb_htable *mdb;
struct net_bridge_mdb_entry *mp;
int hash;
int err;
mdb = rcu_dereference_protected(br->mdb, 1);
if (!mdb) {
err = br_mdb_rehash(&br->mdb,... | 16,540,849,060,878,740,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,723 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_port_group_query_expired(unsigned long data)
{
struct net_bridge_port_group *pg = (void *)data;
struct net_bridge_port *port = pg->port;
struct net_bridge *br = port->br;
spin_lock(&br->multicast_lock);
if (!netif_running(br->dev) || hlist_unhashed(&pg->mglist) ||
pg->queries_sent >=... | 23,137,884,441,964,230,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,724 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_port_query_expired(unsigned long data)
{
struct net_bridge_port *port = (void *)data;
struct net_bridge *br = port->br;
spin_lock(&br->multicast_lock);
if (port->state == BR_STATE_DISABLED ||
port->state == BR_STATE_BLOCKING)
goto out;
if (port->multicast_startup_queries_sent <
... | 683,271,452,516,203,600,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,725 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_query_expired(unsigned long data)
{
struct net_bridge *br = (void *)data;
spin_lock(&br->multicast_lock);
if (br->multicast_startup_queries_sent <
br->multicast_startup_query_count)
br->multicast_startup_queries_sent++;
br_multicast_send_query(br, NULL, br->multicast_startup_querie... | 183,375,407,830,531,400,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,726 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_router_expired(unsigned long data)
{
struct net_bridge_port *port = (void *)data;
struct net_bridge *br = port->br;
spin_lock(&br->multicast_lock);
if (port->multicast_router != 1 ||
timer_pending(&port->multicast_router_timer) ||
hlist_unhashed(&port->rlist))
goto out;
hlist... | 262,649,207,186,181,800,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,727 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_send_group_query(struct net_bridge_mdb_entry *mp)
{
struct net_bridge *br = mp->br;
struct sk_buff *skb;
skb = br_multicast_alloc_query(br, &mp->addr);
if (!skb)
goto timer;
netif_rx(skb);
timer:
if (++mp->queries_sent < br->multicast_last_member_count)
mod_timer(&mp->query_timer,
... | 337,713,783,579,091,280,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,728 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_send_port_group_query(struct net_bridge_port_group *pg)
{
struct net_bridge_port *port = pg->port;
struct net_bridge *br = port->br;
struct sk_buff *skb;
skb = br_multicast_alloc_query(br, &pg->addr);
if (!skb)
goto timer;
br_deliver(port, skb);
timer:
if (++pg->queries_sent < br->m... | 61,032,473,717,802,070,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,729 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static void br_multicast_send_query(struct net_bridge *br,
struct net_bridge_port *port, u32 sent)
{
unsigned long time;
struct br_ip br_group;
if (!netif_running(br->dev) || br->multicast_disabled ||
timer_pending(&br->multicast_querier_timer))
return;
memset(&br_group.u, 0, sizeof(br_group.u));
... | 144,864,136,994,641,960,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,730 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
{
int err = -ENOENT;
u32 old;
struct net_bridge_mdb_htable *mdb;
spin_lock(&br->multicast_lock);
if (!netif_running(br->dev))
goto unlock;
err = -EINVAL;
if (!is_power_of_2(val))
goto unlock;
mdb = mlock_dereference(br->mdb, br);
if... | 39,606,387,873,789,220,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,731 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val)
{
struct net_bridge *br = p->br;
int err = -ENOENT;
spin_lock(&br->multicast_lock);
if (!netif_running(br->dev) || p->state == BR_STATE_DISABLED)
goto unlock;
switch (val) {
case 0:
case 1:
case 2:
p->multicast_router = val;
... | 191,198,451,948,827,340,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,732 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | int br_multicast_set_router(struct net_bridge *br, unsigned long val)
{
int err = -ENOENT;
spin_lock_bh(&br->multicast_lock);
if (!netif_running(br->dev))
goto unlock;
switch (val) {
case 0:
case 2:
del_timer(&br->multicast_router_timer);
/* fall through */
case 1:
br->multicast_router = val;
err = 0... | 254,203,677,376,465,060,000,000,000,000,000,000,000 | br_multicast.c | 184,713,466,390,494,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,733 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | void br_multicast_stop(struct net_bridge *br)
{
struct net_bridge_mdb_htable *mdb;
struct net_bridge_mdb_entry *mp;
struct hlist_node *p, *n;
u32 ver;
int i;
del_timer_sync(&br->multicast_router_timer);
del_timer_sync(&br->multicast_querier_timer);
del_timer_sync(&br->multicast_query_timer);
spin_lock_bh(&br... | 140,434,433,377,666,260,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,734 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | int br_multicast_toggle(struct net_bridge *br, unsigned long val)
{
struct net_bridge_port *port;
int err = 0;
struct net_bridge_mdb_htable *mdb;
spin_lock(&br->multicast_lock);
if (br->multicast_disabled == !val)
goto unlock;
br->multicast_disabled = !val;
if (br->multicast_disabled)
goto unlock;
if (!n... | 76,074,737,434,781,180,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,735 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 0 | static inline int ipv6_is_local_multicast(const struct in6_addr *addr)
{
if (ipv6_addr_is_multicast(addr) &&
IPV6_ADDR_MC_SCOPE(addr) <= IPV6_ADDR_SCOPE_LINKLOCAL)
return 1;
return 0;
}
| 206,698,003,062,620,900,000,000,000,000,000,000,000 | br_multicast.c | 98,479,723,134,747,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
29,736 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | static int __init default_policy_setup(char *str)
{
ima_use_tcb = 1;
return 1;
}
| 107,764,945,693,465,900,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,737 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | void ima_delete_rules(void)
{
struct ima_measure_rule_entry *entry, *tmp;
mutex_lock(&ima_measure_mutex);
list_for_each_entry_safe(entry, tmp, &measure_policy_rules, list) {
list_del(&entry->list);
kfree(entry);
}
mutex_unlock(&ima_measure_mutex);
}
| 293,103,637,122,035,150,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,738 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | void __init ima_init_policy(void)
{
int i, entries;
/* if !ima_use_tcb set entries = 0 so we load NO default rules */
if (ima_use_tcb)
entries = ARRAY_SIZE(default_rules);
else
entries = 0;
for (i = 0; i < entries; i++)
list_add_tail(&default_rules[i].list, &measure_default_rules);
ima_measure = &measure_... | 182,266,742,986,244,700,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,739 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | static void ima_log_string(struct audit_buffer *ab, char *key, char *value)
{
audit_log_format(ab, "%s=", key);
audit_log_untrustedstring(ab, value);
audit_log_format(ab, " ");
}
| 134,267,718,111,749,070,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,740 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | int ima_match_policy(struct inode *inode, enum ima_hooks func, int mask)
{
struct ima_measure_rule_entry *entry;
list_for_each_entry(entry, ima_measure, list) {
bool rc;
rc = ima_match_rules(entry, inode, func, mask);
if (rc)
return entry->action;
}
return 0;
}
| 56,621,939,678,055,990,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,741 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | static bool ima_match_rules(struct ima_measure_rule_entry *rule,
struct inode *inode, enum ima_hooks func, int mask)
{
struct task_struct *tsk = current;
int i;
if ((rule->flags & IMA_FUNC) && rule->func != func)
return false;
if ((rule->flags & IMA_MASK) && rule->mask != mask)
return false;
if ((rule-... | 47,078,680,813,164,910,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,742 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | ssize_t ima_parse_add_rule(char *rule)
{
const char *op = "update_policy";
char *p;
struct ima_measure_rule_entry *entry;
ssize_t result, len;
int audit_info = 0;
/* Prevent installed policy from changing */
if (ima_measure != &measure_default_rules) {
integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL,
... | 302,157,237,160,781,030,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,743 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 0 | static int ima_parse_rule(char *rule, struct ima_measure_rule_entry *entry)
{
struct audit_buffer *ab;
char *p;
int result = 0;
ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
entry->uid = -1;
entry->action = UNKNOWN;
while ((p = strsep(&rule, " \t")) != NULL) {
substring_t args[MAX_OPT_ARGS];
... | 40,926,046,716,503,877,000,000,000,000,000,000,000 | ima_policy.c | 158,128,938,685,264,110,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
29,744 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int convert_fuse_file_lock(const struct fuse_file_lock *ffl,
struct file_lock *fl)
{
switch (ffl->type) {
case F_UNLCK:
break;
case F_RDLCK:
case F_WRLCK:
if (ffl->start > OFFSET_MAX || ffl->end > OFFSET_MAX ||
ffl->end < ffl->start)
return -EIO;
fl->fl_start = ffl->start;
fl->fl_end... | 129,531,753,594,001,400,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,745 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static sector_t fuse_bmap(struct address_space *mapping, sector_t block)
{
struct inode *inode = mapping->host;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_req *req;
struct fuse_bmap_in inarg;
struct fuse_bmap_out outarg;
int err;
if (!inode->i_sb->s_bdev || fc->no_bmap)
return 0;
req = fuse_ge... | 82,243,103,214,274,790,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,746 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_buffered_write(struct file *file, struct inode *inode,
loff_t pos, unsigned count, struct page *page)
{
int err;
size_t nres;
struct fuse_conn *fc = get_fuse_conn(inode);
unsigned offset = pos & (PAGE_CACHE_SIZE - 1);
struct fuse_req *req;
if (is_bad_inode(inode))
return -EIO;
/*
... | 143,141,570,769,168,330,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,747 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_copy_ioctl_iovec(struct iovec *dst, void *src,
size_t transferred, unsigned count,
bool is_compat)
{
#ifdef CONFIG_COMPAT
if (count * sizeof(struct compat_iovec) == transferred) {
struct compat_iovec *ciov = src;
unsigned i;
/*
* With this interface a 32bit server cannot support
... | 302,819,681,446,778,940,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,748 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | ssize_t fuse_direct_io(struct file *file, const char __user *buf,
size_t count, loff_t *ppos, int write)
{
struct fuse_file *ff = file->private_data;
struct fuse_conn *fc = ff->fc;
size_t nmax = write ? fc->max_write : fc->max_read;
loff_t pos = *ppos;
ssize_t res = 0;
struct fuse_req *req;
req = fuse_... | 45,711,862,458,436,570,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,749 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static ssize_t fuse_direct_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
struct inode *inode = file->f_path.dentry->d_inode;
ssize_t res;
if (is_bad_inode(inode))
return -EIO;
/* Don't allow parallel writes to the same file */
mutex_lock(&inode->i_mutex);
res = generic_wr... | 104,945,827,304,564,180,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,750 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static ssize_t fuse_file_aio_read(struct kiocb *iocb, const struct iovec *iov,
unsigned long nr_segs, loff_t pos)
{
struct inode *inode = iocb->ki_filp->f_mapping->host;
if (pos + iov_length(iov, nr_segs) > i_size_read(inode)) {
int err;
/*
* If trying to read past EOF, make sure the i_size
* attribu... | 17,763,222,424,244,568,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,751 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static ssize_t fuse_file_aio_write(struct kiocb *iocb, const struct iovec *iov,
unsigned long nr_segs, loff_t pos)
{
struct file *file = iocb->ki_filp;
struct address_space *mapping = file->f_mapping;
size_t count = 0;
ssize_t written = 0;
struct inode *inode = mapping->host;
ssize_t err;
struct iov_iter ... | 125,229,015,311,137,350,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,752 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static long fuse_file_compat_ioctl(struct file *file, unsigned int cmd,
unsigned long arg)
{
return fuse_file_ioctl_common(file, cmd, arg, FUSE_IOCTL_COMPAT);
}
| 297,144,828,644,063,140,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,753 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_file_flock(struct file *file, int cmd, struct file_lock *fl)
{
struct inode *inode = file->f_path.dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
int err;
if (fc->no_lock) {
err = flock_lock_file_wait(file, fl);
} else {
/* emulate flock with POSIX locks */
fl->fl_owner = (fl_o... | 304,287,113,752,979,970,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,754 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | void fuse_file_free(struct fuse_file *ff)
{
fuse_request_free(ff->reserved_req);
kfree(ff);
}
| 263,310,982,436,837,530,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,755 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | struct fuse_file *fuse_file_get(struct fuse_file *ff)
{
atomic_inc(&ff->count);
return ff;
}
| 94,961,784,044,881,080,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,756 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static long fuse_file_ioctl_common(struct file *file, unsigned int cmd,
unsigned long arg, unsigned int flags)
{
struct inode *inode = file->f_dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
if (!fuse_allow_task(fc, current))
return -EACCES;
if (is_bad_inode(inode))
return -EIO;
return ... | 291,586,928,095,863,570,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,757 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static loff_t fuse_file_llseek(struct file *file, loff_t offset, int origin)
{
loff_t retval;
struct inode *inode = file->f_path.dentry->d_inode;
mutex_lock(&inode->i_mutex);
switch (origin) {
case SEEK_END:
retval = fuse_update_attributes(inode, NULL, file, NULL);
if (retval)
goto exit;
offset += i_size... | 119,250,078,898,749,890,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,758 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_file_lock(struct file *file, int cmd, struct file_lock *fl)
{
struct inode *inode = file->f_path.dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
int err;
if (cmd == F_CANCELLK) {
err = 0;
} else if (cmd == F_GETLK) {
if (fc->no_lock) {
posix_test_lock(file, fl);
err = 0;
... | 258,478,925,811,484,270,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,759 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_file_mmap(struct file *file, struct vm_area_struct *vma)
{
if ((vma->vm_flags & VM_SHARED) && (vma->vm_flags & VM_MAYWRITE)) {
struct inode *inode = file->f_dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_inode *fi = get_fuse_inode(inode);
struct fuse_file *ff = file->... | 45,556,998,590,596,400,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,760 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_file_put(struct fuse_file *ff)
{
if (atomic_dec_and_test(&ff->count)) {
struct fuse_req *req = ff->reserved_req;
req->end = fuse_release_end;
fuse_request_send_background(ff->fc, req);
kfree(ff);
}
}
| 291,391,561,012,445,830,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,761 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static ssize_t fuse_fill_write_pages(struct fuse_req *req,
struct address_space *mapping,
struct iov_iter *ii, loff_t pos)
{
struct fuse_conn *fc = get_fuse_conn(mapping->host);
unsigned offset = pos & (PAGE_CACHE_SIZE - 1);
size_t count = 0;
int err;
req->in.argpages = 1;
req->page_offset = ... | 121,883,350,842,761,980,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,762 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | void fuse_finish_open(struct inode *inode, struct file *file)
{
struct fuse_file *ff = file->private_data;
struct fuse_conn *fc = get_fuse_conn(inode);
if (ff->open_flags & FOPEN_DIRECT_IO)
file->f_op = &fuse_direct_io_file_operations;
if (!(ff->open_flags & FOPEN_KEEP_CACHE))
invalidate_inode_pages2(inode->i_... | 224,193,490,222,426,270,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,763 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_fsync(struct file *file, int datasync)
{
return fuse_fsync_common(file, datasync, 0);
}
| 245,633,784,333,741,240,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,764 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | int fuse_fsync_common(struct file *file, int datasync, int isdir)
{
struct inode *inode = file->f_mapping->host;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_file *ff = file->private_data;
struct fuse_req *req;
struct fuse_fsync_in inarg;
int err;
if (is_bad_inode(inode))
return -EIO;
if ((!isdi... | 126,248,570,033,888,670,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,765 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_get_user_pages(struct fuse_req *req, const char __user *buf,
size_t *nbytesp, int write)
{
size_t nbytes = *nbytesp;
unsigned long user_addr = (unsigned long) buf;
unsigned offset = user_addr & ~PAGE_MASK;
int npages;
/* Special case for kernel I/O: can copy directly into the buffer */
... | 177,762,636,631,261,700,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,766 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_getlk(struct file *file, struct file_lock *fl)
{
struct inode *inode = file->f_path.dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_req *req;
struct fuse_lk_out outarg;
int err;
req = fuse_get_req(fc);
if (IS_ERR(req))
return PTR_ERR(req);
fuse_lk_fill(req, file, fl... | 135,261,908,359,944,620,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,767 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | void fuse_init_file_inode(struct inode *inode)
{
inode->i_fop = &fuse_file_operations;
inode->i_data.a_ops = &fuse_file_aops;
}
| 10,312,158,551,537,920,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,768 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_ioctl_copy_user(struct page **pages, struct iovec *iov,
unsigned int nr_segs, size_t bytes, bool to_user)
{
struct iov_iter ii;
int page_idx = 0;
if (!bytes)
return 0;
iov_iter_init(&ii, iov, nr_segs, bytes, 0);
while (iov_iter_count(&ii)) {
struct page *page = pages[page_idx++];
size_t... | 271,613,311,612,560,600,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,769 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_launder_page(struct page *page)
{
int err = 0;
if (clear_page_dirty_for_io(page)) {
struct inode *inode = page->mapping->host;
err = fuse_writepage_locked(page);
if (!err)
fuse_wait_on_page_writeback(inode, page->index);
}
return err;
}
| 88,284,925,229,485,370,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,770 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_lk_fill(struct fuse_req *req, struct file *file,
const struct file_lock *fl, int opcode, pid_t pid,
int flock)
{
struct inode *inode = file->f_path.dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_file *ff = file->private_data;
struct fuse_lk_in *arg = &req->misc.lk... | 191,921,582,822,873,400,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,771 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | int fuse_notify_poll_wakeup(struct fuse_conn *fc,
struct fuse_notify_poll_wakeup_out *outarg)
{
u64 kh = outarg->kh;
struct rb_node **link;
spin_lock(&fc->lock);
link = fuse_find_polled_node(fc, kh, NULL);
if (*link) {
struct fuse_file *ff;
ff = rb_entry(*link, struct fuse_file, polled_node);
wake_... | 18,410,111,818,595,078,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,772 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_open(struct inode *inode, struct file *file)
{
return fuse_open_common(inode, file, false);
}
| 109,416,090,761,091,070,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,773 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | int fuse_open_common(struct inode *inode, struct file *file, bool isdir)
{
struct fuse_conn *fc = get_fuse_conn(inode);
int err;
/* VFS checks this, but only _after_ ->open() */
if (file->f_flags & O_DIRECT)
return -EINVAL;
err = generic_file_open(inode, file);
if (err)
return err;
err = fuse_do_open(fc, ... | 272,951,706,373,494,060,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,774 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static bool fuse_page_is_writeback(struct inode *inode, pgoff_t index)
{
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_inode *fi = get_fuse_inode(inode);
struct fuse_req *req;
bool found = false;
spin_lock(&fc->lock);
list_for_each_entry(req, &fi->writepages, writepages_entry) {
pgoff_t curr_index;
... | 8,227,538,678,558,598,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,775 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf)
{
struct page *page = vmf->page;
/*
* Don't use page->mapping as it may become NULL from a
* concurrent truncate.
*/
struct inode *inode = vma->vm_file->f_mapping->host;
fuse_wait_on_page_writeback(inode, page->index);
return 0;
... | 266,921,039,420,468,220,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,776 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_prepare_release(struct fuse_file *ff, int flags, int opcode)
{
struct fuse_conn *fc = ff->fc;
struct fuse_req *req = ff->reserved_req;
struct fuse_release_in *inarg = &req->misc.release.in;
spin_lock(&fc->lock);
list_del(&ff->write_entry);
if (!RB_EMPTY_NODE(&ff->polled_node))
rb_erase(&ff->po... | 133,129,826,990,957,130,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,777 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_read_update_size(struct inode *inode, loff_t size,
u64 attr_ver)
{
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_inode *fi = get_fuse_inode(inode);
spin_lock(&fc->lock);
if (attr_ver == fi->attr_version && size < inode->i_size) {
fi->attr_version = ++fc->attr_version;
i_size_w... | 332,582,697,312,681,370,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,778 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_readpage(struct file *file, struct page *page)
{
struct inode *inode = page->mapping->host;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_req *req;
size_t num_read;
loff_t pos = page_offset(page);
size_t count = PAGE_CACHE_SIZE;
u64 attr_ver;
int err;
err = -EIO;
if (is_bad_inode(i... | 69,802,743,156,891,630,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,779 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_readpages(struct file *file, struct address_space *mapping,
struct list_head *pages, unsigned nr_pages)
{
struct inode *inode = mapping->host;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_fill_data data;
int err;
err = -EIO;
if (is_bad_inode(inode))
goto out;
data.file = file... | 53,788,676,121,948,585,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,780 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_readpages_end(struct fuse_conn *fc, struct fuse_req *req)
{
int i;
size_t count = req->misc.read.in.size;
size_t num_read = req->out.args[0].size;
struct address_space *mapping = NULL;
for (i = 0; mapping == NULL && i < req->num_pages; i++)
mapping = req->pages[i]->mapping;
if (mapping) {
s... | 253,676,968,635,239,570,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,781 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_readpages_fill(void *_data, struct page *page)
{
struct fuse_fill_data *data = _data;
struct fuse_req *req = data->req;
struct inode *inode = data->inode;
struct fuse_conn *fc = get_fuse_conn(inode);
fuse_wait_on_page_writeback(inode, page->index);
if (req->num_pages &&
(req->num_pages == F... | 79,871,617,807,873,980,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,782 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_register_polled_file(struct fuse_conn *fc,
struct fuse_file *ff)
{
spin_lock(&fc->lock);
if (RB_EMPTY_NODE(&ff->polled_node)) {
struct rb_node **link, *parent;
link = fuse_find_polled_node(fc, ff->kh, &parent);
BUG_ON(*link);
rb_link_node(&ff->polled_node, parent, link);
rb_inser... | 276,383,518,502,425,260,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,783 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | void fuse_release_common(struct file *file, int opcode)
{
struct fuse_file *ff;
struct fuse_req *req;
ff = file->private_data;
if (unlikely(!ff))
return;
req = ff->reserved_req;
fuse_prepare_release(ff, file->f_flags, opcode);
/* Hold vfsmount and dentry until release is finished */
path_get(&file->f_path)... | 20,628,736,554,318,503,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,784 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_release_end(struct fuse_conn *fc, struct fuse_req *req)
{
path_put(&req->misc.release.path);
}
| 283,682,252,684,561,440,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,785 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_release_user_pages(struct fuse_req *req, int write)
{
unsigned i;
for (i = 0; i < req->num_pages; i++) {
struct page *page = req->pages[i];
if (write)
set_page_dirty_lock(page);
put_page(page);
}
}
| 102,793,099,507,491,320,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,786 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static size_t fuse_send_read(struct fuse_req *req, struct file *file,
loff_t pos, size_t count, fl_owner_t owner)
{
struct fuse_file *ff = file->private_data;
struct fuse_conn *fc = ff->fc;
fuse_read_fill(req, file, pos, count, FUSE_READ);
if (owner != NULL) {
struct fuse_read_in *inarg = &req->misc.read... | 8,694,790,190,060,040,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,787 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_send_readpages(struct fuse_req *req, struct file *file)
{
struct fuse_file *ff = file->private_data;
struct fuse_conn *fc = ff->fc;
loff_t pos = page_offset(req->pages[0]);
size_t count = req->num_pages << PAGE_CACHE_SHIFT;
req->out.argpages = 1;
req->out.page_zeroing = 1;
req->out.page_replace... | 222,989,877,817,395,870,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,788 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static size_t fuse_send_write(struct fuse_req *req, struct file *file,
loff_t pos, size_t count, fl_owner_t owner)
{
struct fuse_file *ff = file->private_data;
struct fuse_conn *fc = ff->fc;
struct fuse_write_in *inarg = &req->misc.write.in;
fuse_write_fill(req, ff, pos, count);
inarg->flags = file->f_fl... | 23,833,976,228,111,344,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,789 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static size_t fuse_send_write_pages(struct fuse_req *req, struct file *file,
struct inode *inode, loff_t pos,
size_t count)
{
size_t res;
unsigned offset;
unsigned i;
for (i = 0; i < req->num_pages; i++)
fuse_wait_on_page_writeback(inode, req->pages[i]->index);
res = fuse_send_write(req, file, ... | 17,089,388,978,973,665,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,790 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_setlk(struct file *file, struct file_lock *fl, int flock)
{
struct inode *inode = file->f_path.dentry->d_inode;
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_req *req;
int opcode = (fl->fl_flags & FL_SLEEP) ? FUSE_SETLKW : FUSE_SETLK;
pid_t pid = fl->fl_type != F_UNLCK ? current->tgid : ... | 59,420,197,018,456,640,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,791 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_write_begin(struct file *file, struct address_space *mapping,
loff_t pos, unsigned len, unsigned flags,
struct page **pagep, void **fsdata)
{
pgoff_t index = pos >> PAGE_CACHE_SHIFT;
*pagep = grab_cache_page_write_begin(mapping, index, flags);
if (!*pagep)
return -ENOMEM;
return 0;
}
| 327,825,685,218,043,760,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,792 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_write_end(struct file *file, struct address_space *mapping,
loff_t pos, unsigned len, unsigned copied,
struct page *page, void *fsdata)
{
struct inode *inode = mapping->host;
int res = 0;
if (copied)
res = fuse_buffered_write(file, inode, pos, copied, page);
unlock_page(page);
page_cache_... | 231,392,007,191,677,460,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,793 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_write_fill(struct fuse_req *req, struct fuse_file *ff,
loff_t pos, size_t count)
{
struct fuse_write_in *inarg = &req->misc.write.in;
struct fuse_write_out *outarg = &req->misc.write.out;
inarg->fh = ff->fh;
inarg->offset = pos;
inarg->size = count;
req->in.h.opcode = FUSE_WRITE;
req->in... | 221,222,748,493,046,500,000,000,000,000,000,000,000 | file.c | 232,709,947,421,444,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,794 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | void fuse_write_update_size(struct inode *inode, loff_t pos)
{
struct fuse_conn *fc = get_fuse_conn(inode);
struct fuse_inode *fi = get_fuse_inode(inode);
spin_lock(&fc->lock);
fi->attr_version = ++fc->attr_version;
if (pos > inode->i_size)
i_size_write(inode, pos);
spin_unlock(&fc->lock);
}
| 267,505,548,694,466,940,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,795 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static int fuse_writepage(struct page *page, struct writeback_control *wbc)
{
int err;
err = fuse_writepage_locked(page);
unlock_page(page);
return err;
}
| 243,534,832,958,812,600,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,796 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_writepage_end(struct fuse_conn *fc, struct fuse_req *req)
{
struct inode *inode = req->inode;
struct fuse_inode *fi = get_fuse_inode(inode);
mapping_set_error(inode->i_mapping, req->out.h.error);
spin_lock(&fc->lock);
fi->writectr--;
fuse_writepage_finish(fc, req);
spin_unlock(&fc->lock);
fuse... | 251,602,211,970,765,060,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,797 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_writepage_finish(struct fuse_conn *fc, struct fuse_req *req)
{
struct inode *inode = req->inode;
struct fuse_inode *fi = get_fuse_inode(inode);
struct backing_dev_info *bdi = inode->i_mapping->backing_dev_info;
list_del(&req->writepages_entry);
dec_bdi_stat(bdi, BDI_WRITEBACK);
dec_zone_page_sta... | 208,304,730,614,400,600,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,798 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 0 | static void fuse_writepage_free(struct fuse_conn *fc, struct fuse_req *req)
{
__free_page(req->pages[0]);
fuse_file_put(req->ff);
}
| 150,063,371,020,296,700,000,000,000,000,000,000,000 | file.c | 316,485,230,383,673,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
29,799 | linux | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 | orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0 | static struct iw_statistics *orinoco_get_wireless_stats(struct net_device *dev)
{
struct orinoco_private *priv = ndev_priv(dev);
hermes_t *hw = &priv->hw;
struct iw_statistics *wstats = &priv->wstats;
int err;
unsigned long flags;
if (!netif_device_present(dev)) {
printk(KERN_WARNING "%s: get_wireless_stats() ... | 204,968,152,696,590,550,000,000,000,000,000,000,000 | wext.c | 296,574,077,048,389,160,000,000,000,000,000,000,000 | [
"NVD-CWE-noinfo"
] | CVE-2010-4648 | The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. | https://nvd.nist.gov/vuln/detail/CVE-2010-4648 |
29,800 | linux | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 | orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0 | static int orinoco_ioctl_commit(struct net_device *dev,
struct iw_request_info *info,
void *wrqu,
char *extra)
{
struct orinoco_private *priv = ndev_priv(dev);
unsigned long flags;
int err = 0;
if (!priv->open)
return 0;
if (orinoco_lock(priv, &flags) != 0)
return err;
err = orinoco_commit(priv... | 328,163,567,202,169,560,000,000,000,000,000,000,000 | wext.c | 296,574,077,048,389,160,000,000,000,000,000,000,000 | [
"NVD-CWE-noinfo"
] | CVE-2010-4648 | The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. | https://nvd.nist.gov/vuln/detail/CVE-2010-4648 |
29,801 | linux | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 | orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0 | static int orinoco_ioctl_get_auth(struct net_device *dev,
struct iw_request_info *info,
union iwreq_data *wrqu, char *extra)
{
struct orinoco_private *priv = ndev_priv(dev);
struct iw_param *param = &wrqu->param;
unsigned long flags;
int ret = 0;
if (orinoco_lock(priv, &flags) != 0)
return -EBUSY;
... | 23,093,748,433,253,350,000,000,000,000,000,000,000 | wext.c | 296,574,077,048,389,160,000,000,000,000,000,000,000 | [
"NVD-CWE-noinfo"
] | CVE-2010-4648 | The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. | https://nvd.nist.gov/vuln/detail/CVE-2010-4648 |
29,802 | linux | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 | orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0 | static int orinoco_ioctl_get_encodeext(struct net_device *dev,
struct iw_request_info *info,
union iwreq_data *wrqu,
char *extra)
{
struct orinoco_private *priv = ndev_priv(dev);
struct iw_point *encoding = &wrqu->encoding;
struct iw_encode_ext *ext = (struct iw_encode_ext *)extra;
... | 145,645,420,567,418,110,000,000,000,000,000,000,000 | wext.c | 296,574,077,048,389,160,000,000,000,000,000,000,000 | [
"NVD-CWE-noinfo"
] | CVE-2010-4648 | The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. | https://nvd.nist.gov/vuln/detail/CVE-2010-4648 |
29,803 | linux | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 | orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0 | static int orinoco_ioctl_get_genie(struct net_device *dev,
struct iw_request_info *info,
union iwreq_data *wrqu, char *extra)
{
struct orinoco_private *priv = ndev_priv(dev);
unsigned long flags;
int err = 0;
if (orinoco_lock(priv, &flags) != 0)
return -EBUSY;
if ((priv->wpa_ie_len == 0) || (priv... | 74,672,940,547,754,410,000,000,000,000,000,000,000 | wext.c | 296,574,077,048,389,160,000,000,000,000,000,000,000 | [
"NVD-CWE-noinfo"
] | CVE-2010-4648 | The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. | https://nvd.nist.gov/vuln/detail/CVE-2010-4648 |
29,804 | linux | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 | orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0 | static int orinoco_ioctl_getessid(struct net_device *dev,
struct iw_request_info *info,
struct iw_point *erq,
char *essidbuf)
{
struct orinoco_private *priv = ndev_priv(dev);
int active;
int err = 0;
unsigned long flags;
if (netif_running(dev)) {
err = orinoco_hw_get_essid(priv, &active, essid... | 31,537,839,181,185,953,000,000,000,000,000,000,000 | wext.c | 296,574,077,048,389,160,000,000,000,000,000,000,000 | [
"NVD-CWE-noinfo"
] | CVE-2010-4648 | The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. | https://nvd.nist.gov/vuln/detail/CVE-2010-4648 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.