idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
30,152
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static irqreturn_t uio_interrupt(int irq, void *dev_id) { struct uio_device *idev = (struct uio_device *)dev_id; irqreturn_t ret = idev->info->handler(irq, idev->info); if (ret == IRQ_HANDLED) uio_event_notify(idev->info); return ret; }
294,639,709,725,403,400,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,153
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void uio_major_cleanup(void) { unregister_chrdev_region(MKDEV(uio_major, 0), UIO_MAX_DEVICES); cdev_del(uio_cdev); }
325,029,190,206,020,360,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,154
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int uio_major_init(void) { static const char name[] = "uio"; struct cdev *cdev = NULL; dev_t uio_dev = 0; int result; result = alloc_chrdev_region(&uio_dev, 0, UIO_MAX_DEVICES, name); if (result) goto out; result = -ENOMEM; cdev = cdev_alloc(); if (!cdev) goto out_unregister; cdev->owner = THIS_...
275,813,845,133,471,130,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,155
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int uio_mmap(struct file *filep, struct vm_area_struct *vma) { struct uio_listener *listener = filep->private_data; struct uio_device *idev = listener->dev; int mi; unsigned long requested_pages, actual_pages; int ret = 0; if (vma->vm_end < vma->vm_start) return -EINVAL; vma->vm_private_data = idev; ...
222,855,825,804,952,500,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,156
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int uio_mmap_logical(struct vm_area_struct *vma) { vma->vm_flags |= VM_DONTEXPAND | VM_DONTDUMP; vma->vm_ops = &uio_logical_vm_ops; return 0; }
268,889,191,952,773,520,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,157
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int uio_open(struct inode *inode, struct file *filep) { struct uio_device *idev; struct uio_listener *listener; int ret = 0; mutex_lock(&minor_lock); idev = idr_find(&uio_idr, iminor(inode)); mutex_unlock(&minor_lock); if (!idev) { ret = -ENODEV; goto out; } if (!try_module_get(idev->owner)) { r...
32,207,990,327,115,770,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,158
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static unsigned int uio_poll(struct file *filep, poll_table *wait) { struct uio_listener *listener = filep->private_data; struct uio_device *idev = listener->dev; if (!idev->info->irq) return -EIO; poll_wait(filep, &idev->wait, wait); if (listener->event_count != atomic_read(&idev->event)) return POLLIN | PO...
40,582,007,203,248,850,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,159
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static ssize_t uio_read(struct file *filep, char __user *buf, size_t count, loff_t *ppos) { struct uio_listener *listener = filep->private_data; struct uio_device *idev = listener->dev; DECLARE_WAITQUEUE(wait, current); ssize_t retval; s32 event_count; if (!idev->info->irq) return -EIO; if (count != sizeo...
270,060,273,801,043,870,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,160
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int uio_release(struct inode *inode, struct file *filep) { int ret = 0; struct uio_listener *listener = filep->private_data; struct uio_device *idev = listener->dev; if (idev->info->release) ret = idev->info->release(idev->info, inode); module_put(idev->owner); kfree(listener); return ret; }
313,408,427,579,543,700,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,161
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static ssize_t uio_write(struct file *filep, const char __user *buf, size_t count, loff_t *ppos) { struct uio_listener *listener = filep->private_data; struct uio_device *idev = listener->dev; ssize_t retval; s32 irq_on; if (!idev->info->irq) return -EIO; if (count != sizeof(s32)) return -EINVAL; if (!...
264,073,967,755,211,970,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,162
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static ssize_t version_show(struct device *dev, struct device_attribute *attr, char *buf) { struct uio_device *idev = dev_get_drvdata(dev); return sprintf(buf, "%s\n", idev->info->version); }
121,131,709,112,196,500,000,000,000,000,000,000,000
uio.c
36,047,993,049,944,990,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,163
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1100fb_drv_probe(struct platform_device *dev) { struct au1100fb_device *fbdev = NULL; struct resource *regs_res; unsigned long page; u32 sys_clksrc; /* Allocate new device private */ fbdev = devm_kzalloc(&dev->dev, sizeof(struct au1100fb_device), GFP_KERNEL); if (!fbdev) { print_err("fail...
32,680,512,426,524,597,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,164
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
int au1100fb_drv_remove(struct platform_device *dev) { struct au1100fb_device *fbdev = NULL; if (!dev) return -ENODEV; fbdev = (struct au1100fb_device *) platform_get_drvdata(dev); #if !defined(CONFIG_FRAMEBUFFER_CONSOLE) && defined(CONFIG_LOGO) au1100fb_fb_blank(VESA_POWERDOWN, &fbdev->info); #endif fbdev->r...
283,430,169,613,593,060,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,165
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
int au1100fb_drv_resume(struct platform_device *dev) { struct au1100fb_device *fbdev = platform_get_drvdata(dev); if (!fbdev) return 0; memcpy(fbdev->regs, &fbregs, sizeof(struct au1100fb_regs)); /* Restart LCD clocking */ au_writel(sys_clksrc, SYS_CLKSRC); /* Unblank the LCD */ au1100fb_fb_blank(VESA_NO_B...
137,057,166,463,330,930,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,166
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1100fb_fb_blank(int blank_mode, struct fb_info *fbi) { struct au1100fb_device *fbdev = to_au1100fb_device(fbi); print_dbg("fb_blank %d %p", blank_mode, fbi); switch (blank_mode) { case VESA_NO_BLANKING: /* Turn on panel */ fbdev->regs->lcd_control |= LCD_CONTROL_GO; au_sync(); break; case ...
320,467,166,645,195,750,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,167
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
int au1100fb_fb_pan_display(struct fb_var_screeninfo *var, struct fb_info *fbi) { struct au1100fb_device *fbdev; int dy; fbdev = to_au1100fb_device(fbi); print_dbg("fb_pan_display %p %p", var, fbi); if (!var || !fbdev) { return -EINVAL; } if (var->xoffset - fbi->var.xoffset) { /* No support for X panning...
152,818,645,320,424,680,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,168
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
void au1100fb_fb_rotate(struct fb_info *fbi, int angle) { struct au1100fb_device *fbdev = to_au1100fb_device(fbi); print_dbg("fb_rotate %p %d", fbi, angle); if (fbdev && (angle > 0) && !(angle % 90)) { fbdev->regs->lcd_control &= ~LCD_CONTROL_GO; fbdev->regs->lcd_control &= ~(LCD_CONTROL_SM_MASK); fbdev->r...
285,338,082,491,359,200,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,169
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
int au1100fb_fb_setcolreg(unsigned regno, unsigned red, unsigned green, unsigned blue, unsigned transp, struct fb_info *fbi) { struct au1100fb_device *fbdev; u32 *palette; u32 value; fbdev = to_au1100fb_device(fbi); palette = fbdev->regs->lcd_pallettebase; if (regno > (AU1100_LCD_NBR_PALETTE_ENTRIES - 1)) ret...
48,670,128,843,528,240,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,170
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int __init au1100fb_load(void) { return platform_driver_register(&au1100fb_driver); }
109,607,692,044,402,470,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,171
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
int au1100fb_setmode(struct au1100fb_device *fbdev) { struct fb_info *info = &fbdev->info; u32 words; int index; if (!fbdev) return -EINVAL; /* Update var-dependent FB info */ if (panel_is_active(fbdev->panel) || panel_is_color(fbdev->panel)) { if (info->var.bits_per_pixel <= 8) { /* palettized */ inf...
139,652,636,220,035,830,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,172
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1100fb_setup(struct au1100fb_device *fbdev) { char *this_opt, *options; int num_panels = ARRAY_SIZE(known_lcd_panels); if (num_panels <= 0) { print_err("No LCD panels supported by driver!"); return -ENODEV; } if (fb_get_options(DRIVER_NAME, &options)) return -ENODEV; if (!options) return -E...
184,474,561,300,120,530,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,173
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void __exit au1100fb_unload(void) { platform_driver_unregister(&au1100fb_driver); }
280,202,390,024,154,660,000,000,000,000,000,000,000
au1100fb.c
77,902,258,379,140,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,174
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200_setlocation (struct au1200fb_device *fbdev, int plane, int xpos, int ypos) { uint32 winctrl0, winctrl1, winenable, fb_offset = 0; int xsz, ysz; /* FIX!!! NOT CHECKING FOR COMPLETE OFFSCREEN YET */ winctrl0 = lcd->window[plane].winctrl0; winctrl1 = lcd->window[plane].winctrl1; winctrl0 &= (LCD...
12,046,034,816,515,284,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,175
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void au1200_setmode(struct au1200fb_device *fbdev) { int plane = fbdev->plane; /* Window/plane setup */ lcd->window[plane].winctrl1 = ( 0 | LCD_WINCTRL1_PRI_N(plane) | win->w[plane].mode_winctrl1 /* FRM,CCO,PO,PIPE */ ) ; au1200_setlocation(fbdev, plane, win->w[plane].xpos, win->w[plane].ypos); lcd-...
180,721,843,647,361,800,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,176
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void au1200_setpanel(struct panel_settings *newpanel, struct au1200fb_platdata *pd) { /* * Perform global setup/init of LCD controller */ uint32 winenable; /* Make sure all windows disabled */ winenable = lcd->winenable; lcd->winenable = 0; au_sync(); /* * Ensure everything is disabled befor...
336,107,631,842,731,660,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,177
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void __exit au1200fb_cleanup(void) { platform_driver_unregister(&au1200fb_driver); }
89,595,450,227,652,280,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,178
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_drv_probe(struct platform_device *dev) { struct au1200fb_device *fbdev; struct au1200fb_platdata *pd; struct fb_info *fbi = NULL; unsigned long page; int bpp, plane, ret, irq; print_info("" DRIVER_DESC ""); pd = dev->dev.platform_data; if (!pd) return -ENODEV; /* Setup driver with opti...
10,066,004,594,280,637,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,179
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_drv_remove(struct platform_device *dev) { struct au1200fb_platdata *pd = platform_get_drvdata(dev); struct au1200fb_device *fbdev; struct fb_info *fbi; int plane; /* Turn off the panel */ au1200_setpanel(NULL, pd); for (plane = 0; plane < device_count; ++plane) { fbi = _au1200fb_infos[pla...
2,057,832,177,815,077,500,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,180
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_drv_suspend(struct device *dev) { struct au1200fb_platdata *pd = dev_get_drvdata(dev); au1200_setpanel(NULL, pd); lcd->outmask = 0; au_sync(); return 0; }
41,760,059,140,571,644,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,181
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_fb_blank(int blank_mode, struct fb_info *fbi) { struct au1200fb_device *fbdev = fbi->par; /* Short-circuit screen blanking */ if (noblanking) return 0; switch (blank_mode) { case FB_BLANK_UNBLANK: case FB_BLANK_NORMAL: /* printk("turn on panel\n"); */ au1200_setpanel(panel, fbdev->pd)...
282,835,464,696,877,440,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,182
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_fb_check_var(struct fb_var_screeninfo *var, struct fb_info *fbi) { struct au1200fb_device *fbdev = fbi->par; u32 pixclock; int screen_size, plane; plane = fbdev->plane; /* Make sure that the mode respect all LCD controller and * panel restrictions. */ var->xres = win->w[plane].xres; var-...
130,267,960,754,018,020,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,183
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_fb_setcolreg(unsigned regno, unsigned red, unsigned green, unsigned blue, unsigned transp, struct fb_info *fbi) { volatile u32 *palette = lcd->palette; u32 value; if (regno > (AU1200_LCD_NBR_PALETTE_ENTRIES - 1)) return -EINVAL; if (fbi->var.grayscale) { /* Convert color to grayscale */ ...
276,596,903,487,535,800,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,184
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static irqreturn_t au1200fb_handle_irq(int irq, void* dev_id) { /* Nothing to do for now, just clear any pending interrupt */ lcd->intstatus = lcd->intstatus; au_sync(); return IRQ_HANDLED; }
314,647,989,218,752,750,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,185
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int __init au1200fb_init(void) { return platform_driver_register(&au1200fb_driver); }
215,494,425,810,083,570,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,186
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_init_fbinfo(struct au1200fb_device *fbdev) { struct fb_info *fbi = fbdev->fb_info; int bpp; fbi->fbops = &au1200fb_fb_ops; bpp = winbpp(win->w[fbdev->plane].mode_winctrl1); /* Copy monitor specs from panel data */ /* fixme: we're setting up LCD controller windows, so these dont give a damn...
297,808,511,745,693,400,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,187
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_ioctl(struct fb_info *info, unsigned int cmd, unsigned long arg) { struct au1200fb_device *fbdev = info->par; int plane; int val; plane = fbinfo2index(info); print_dbg("au1200fb: ioctl %d on plane %d\n", cmd, plane); if (cmd == AU1200_LCD_FB_IOCTL) { struct au1200...
298,141,103,711,782,000,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,188
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int au1200fb_setup(struct au1200fb_platdata *pd) { char *options = NULL; char *this_opt, *endptr; int num_panels = ARRAY_SIZE(known_lcd_panels); int panel_idx = -1; fb_get_options(DRIVER_NAME, &options); if (!options) goto out; while ((this_opt = strsep(&options, ",")) != NULL) { /* Panel option - ...
74,752,676,420,650,040,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,189
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void au1200fb_update_fbinfo(struct fb_info *fbi) { /* FIX!!!! This also needs to take the window pixel format into account!!! */ /* Update var-dependent FB info */ if (panel_is_color(panel)) { if (fbi->var.bits_per_pixel <= 8) { /* palettized */ fbi->fix.visual = FB_VISUAL_PSEUDOCOLOR; fbi->fix.li...
326,608,643,283,593,600,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,190
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int fbinfo2index (struct fb_info *fb_info) { int i; for (i = 0; i < device_count; ++i) { if (fb_info == _au1200fb_infos[i]) return i; } printk("au1200fb: ERROR: fbinfo2index failed!\n"); return -1; }
200,683,608,182,200,950,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,191
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void get_global(u_int cmd, struct au1200_lcd_global_regs_t *pdata) { unsigned int hi1, divider; pdata->xsize = ((lcd->screen & LCD_SCREEN_SX) >> 19) + 1; pdata->ysize = ((lcd->screen & LCD_SCREEN_SY) >> 8) + 1; pdata->backcolor = lcd->backcolor; pdata->colorkey = lcd->colorkey; pdata->mask = lcd->colorke...
88,692,348,252,969,120,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,192
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static void set_window(unsigned int plane, struct au1200_lcd_window_regs_t *pdata) { unsigned int val, bpp; /* Window control register 0 */ if (pdata->flags & WIN_POSITION) { val = lcd->window[plane].winctrl0 & ~(LCD_WINCTRL0_OX | LCD_WINCTRL0_OY); val |= ((pdata->xpos << 21) & LCD_WINCTRL0_OX); val |= (...
288,817,768,145,511,100,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,193
linux
7314e613d5ff9f0934f7a0f74ed7973b903315d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7314e613d5ff9f0934f7a0f74ed7973b903315d1
Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to continue to use remap_pfn_range(), ...
0
static int winbpp (unsigned int winctrl1) { int bits = 0; /* how many bits are needed for each pixel format */ switch (winctrl1 & LCD_WINCTRL1_FRM) { case LCD_WINCTRL1_FRM_1BPP: bits = 1; break; case LCD_WINCTRL1_FRM_2BPP: bits = 2; break; case LCD_WINCTRL1_FRM_4BPP: bits = 4; break; case LCD_WINCTR...
251,547,000,285,338,130,000,000,000,000,000,000,000
au1200fb.c
40,760,652,179,933,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6763
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
https://nvd.nist.gov/vuln/detail/CVE-2013-6763
30,194
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void inet_get_ping_group_range_net(struct net *net, kgid_t *low, kgid_t *high) { kgid_t *data = net->ipv4.sysctl_ping_group_range; unsigned int seq; do { seq = read_seqbegin(&net->ipv4.sysctl_local_ports.lock); *low = data[0]; *high = data[1]; } while (read_seqretry(&net->ipv4.sysctl_local_por...
202,859,174,130,791,500,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,195
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_bind(struct sock *sk, struct sockaddr *uaddr, int addr_len) { struct inet_sock *isk = inet_sk(sk); unsigned short snum; int err; int dif = sk->sk_bound_dev_if; err = ping_check_bind_addr(sk, isk, uaddr, addr_len); if (err) return err; lock_sock(sk); err = -EINVAL; if (isk->inet_num != 0) goto o...
95,308,420,414,105,850,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,196
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ping_check_bind_addr(struct sock *sk, struct inet_sock *isk, struct sockaddr *uaddr, int addr_len) { struct net *net = sock_net(sk); if (sk->sk_family == AF_INET) { struct sockaddr_in *addr = (struct sockaddr_in *) uaddr; int chk_addr_ret; if (addr_len < sizeof(*addr)) return -EINVAL; pr_d...
226,341,194,652,475,200,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,197
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void ping_clear_saddr(struct sock *sk, int dif) { sk->sk_bound_dev_if = dif; if (sk->sk_family == AF_INET) { struct inet_sock *isk = inet_sk(sk); isk->inet_rcv_saddr = isk->inet_saddr = 0; #if IS_ENABLED(CONFIG_IPV6) } else if (sk->sk_family == AF_INET6) { struct ipv6_pinfo *np = inet6_sk(sk); memset(...
212,326,069,531,925,600,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,198
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ping_close(struct sock *sk, long timeout) { pr_debug("ping_close(sk=%p,sk->num=%u)\n", inet_sk(sk), inet_sk(sk)->inet_num); pr_debug("isk->refcnt = %d\n", sk->sk_refcnt.counter); sk_common_release(sk); }
96,193,168,130,669,010,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,199
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_common_sendmsg(int family, struct msghdr *msg, size_t len, void *user_icmph, size_t icmph_len) { u8 type, code; if (len > 0xFFFF) return -EMSGSIZE; /* * Check the flags. */ /* Mirror BSD error message compatibility */ if (msg->msg_flags & MSG_OOB) return -EOPNOTSUPP; /* * Fetch the ICMP ...
312,479,610,211,287,360,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,200
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ping_err(struct sk_buff *skb, int offset, u32 info) { int family; struct icmphdr *icmph; struct inet_sock *inet_sock; int type; int code; struct net *net = dev_net(skb->dev); struct sock *sk; int harderr; int err; if (skb->protocol == htons(ETH_P_IP)) { family = AF_INET; type = icmp_hdr(skb)->type; ...
175,393,826,836,439,300,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,201
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static struct sock *ping_get_first(struct seq_file *seq, int start) { struct sock *sk; struct ping_iter_state *state = seq->private; struct net *net = seq_file_net(seq); for (state->bucket = start; state->bucket < PING_HTABLE_SIZE; ++state->bucket) { struct hlist_nulls_node *node; struct hlist_nulls_head...
112,909,504,534,412,050,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,202
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static struct sock *ping_get_idx(struct seq_file *seq, loff_t pos) { struct sock *sk = ping_get_first(seq, 0); if (sk) while (pos && (sk = ping_get_next(seq, sk)) != NULL) --pos; return pos ? NULL : sk; }
44,657,116,330,792,360,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,203
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static struct sock *ping_get_next(struct seq_file *seq, struct sock *sk) { struct ping_iter_state *state = seq->private; struct net *net = seq_file_net(seq); do { sk = sk_nulls_next(sk); } while (sk && (!net_eq(sock_net(sk), net))); if (!sk) return ping_get_first(seq, state->bucket + 1); return sk; }
61,108,443,413,540,670,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,204
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_get_port(struct sock *sk, unsigned short ident) { struct hlist_nulls_node *node; struct hlist_nulls_head *hlist; struct inet_sock *isk, *isk2; struct sock *sk2 = NULL; isk = inet_sk(sk); write_lock_bh(&ping_table.lock); if (ident == 0) { u32 i; u16 result = ping_port_rover + 1; for (i = 0; i < (...
311,702,710,554,597,030,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,205
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_getfrag(void *from, char *to, int offset, int fraglen, int odd, struct sk_buff *skb) { struct pingfakehdr *pfh = (struct pingfakehdr *)from; if (offset == 0) { if (fraglen < sizeof(struct icmphdr)) BUG(); if (csum_partial_copy_fromiovecend(to + sizeof(struct icmphdr), pfh->iov, 0, fraglen -...
204,220,205,312,976,640,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,206
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ping_hash(struct sock *sk) { pr_debug("ping_hash(sk->port=%u)\n", inet_sk(sk)->inet_num); BUG(); /* "Please do not press this button again." */ }
27,126,609,815,394,250,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,207
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline int ping_hashfn(struct net *net, unsigned int num, unsigned int mask) { int res = (num + net_hash_mix(net)) & mask; pr_debug("hash(%d) = %d\n", num, res); return res; }
215,477,166,599,418,750,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,208
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline struct hlist_nulls_head *ping_hashslot(struct ping_table *table, struct net *net, unsigned int num) { return &table->hash[ping_hashfn(net, num, PING_HTABLE_MASK)]; }
262,403,509,362,180,830,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,209
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void __init ping_init(void) { int i; for (i = 0; i < PING_HTABLE_SIZE; i++) INIT_HLIST_NULLS_HEAD(&ping_table.hash[i], i); rwlock_init(&ping_table.lock); }
12,406,720,346,080,865,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,210
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_init_sock(struct sock *sk) { struct net *net = sock_net(sk); kgid_t group = current_egid(); struct group_info *group_info = get_current_groups(); int i, j, count = group_info->ngroups; kgid_t low, high; inet_get_ping_group_range_net(net, &low, &high); if (gid_lte(low, group) && gid_lte(group, high)) ...
5,269,612,735,390,377,600,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,211
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static struct sock *ping_lookup(struct net *net, struct sk_buff *skb, u16 ident) { struct hlist_nulls_head *hslot = ping_hashslot(&ping_table, net, ident); struct sock *sk = NULL; struct inet_sock *isk; struct hlist_nulls_node *hnode; int dif = skb->dev->ifindex; if (skb->protocol == htons(ETH_P_IP)) { pr_debu...
284,114,515,888,788,740,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,212
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ping_proc_exit(void) { unregister_pernet_subsys(&ping_v4_net_ops); }
20,270,734,314,950,970,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,213
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int __init ping_proc_init(void) { return register_pernet_subsys(&ping_v4_net_ops); }
331,643,000,925,835,960,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,214
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_proc_register(struct net *net, struct ping_seq_afinfo *afinfo) { struct proc_dir_entry *p; p = proc_create_data(afinfo->name, S_IRUGO, net->proc_net, afinfo->seq_fops, afinfo); if (!p) return -ENOMEM; return 0; }
22,028,447,410,850,270,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,215
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ping_proc_unregister(struct net *net, struct ping_seq_afinfo *afinfo) { remove_proc_entry(afinfo->name, net->proc_net); }
137,153,012,541,971,000,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,216
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_queue_rcv_skb(struct sock *sk, struct sk_buff *skb) { pr_debug("ping_queue_rcv_skb(sk=%p,sk->num=%d,skb=%p)\n", inet_sk(sk), inet_sk(sk)->inet_num, skb); if (sock_queue_rcv_skb(sk, skb) < 0) { kfree_skb(skb); pr_debug("ping_queue_rcv_skb -> failed\n"); return -1; } return 0; }
207,896,131,857,238,060,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,217
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ping_rcv(struct sk_buff *skb) { struct sock *sk; struct net *net = dev_net(skb->dev); struct icmphdr *icmph = icmp_hdr(skb); /* We assume the packet has already been checked by icmp_rcv */ pr_debug("ping_rcv(skb=%p,id=%04x,seq=%04x)\n", skb, ntohs(icmph->un.echo.id), ntohs(icmph->un.echo.sequence)); /*...
65,885,769,385,580,820,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,218
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void *ping_seq_next(struct seq_file *seq, void *v, loff_t *pos) { struct sock *sk; if (v == SEQ_START_TOKEN) sk = ping_get_idx(seq, 0); else sk = ping_get_next(seq, v); ++*pos; return sk; }
40,406,040,229,569,514,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,219
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ping_seq_open(struct inode *inode, struct file *file) { struct ping_seq_afinfo *afinfo = PDE_DATA(inode); return seq_open_net(inode, file, &afinfo->seq_ops, sizeof(struct ping_iter_state)); }
259,284,326,740,156,660,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,220
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void *ping_seq_start(struct seq_file *seq, loff_t *pos, sa_family_t family) { struct ping_iter_state *state = seq->private; state->bucket = 0; state->family = family; read_lock_bh(&ping_table.lock); return *pos ? ping_get_idx(seq, *pos-1) : SEQ_START_TOKEN; }
73,166,815,578,282,385,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,221
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void ping_set_saddr(struct sock *sk, struct sockaddr *saddr) { if (saddr->sa_family == AF_INET) { struct inet_sock *isk = inet_sk(sk); struct sockaddr_in *addr = (struct sockaddr_in *) saddr; isk->inet_rcv_saddr = isk->inet_saddr = addr->sin_addr.s_addr; #if IS_ENABLED(CONFIG_IPV6) } else if (saddr->sa_f...
262,462,919,260,924,540,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,222
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline int ping_supported(int family, int type, int code) { return (family == AF_INET && type == ICMP_ECHO && code == 0) || (family == AF_INET6 && type == ICMPV6_ECHO_REQUEST && code == 0); }
211,883,916,367,154,800,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,223
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void ping_v4_format_sock(struct sock *sp, struct seq_file *f, int bucket, int *len) { struct inet_sock *inet = inet_sk(sp); __be32 dest = inet->inet_daddr; __be32 src = inet->inet_rcv_saddr; __u16 destp = ntohs(inet->inet_dport); __u16 srcp = ntohs(inet->inet_sport); seq_printf(f, "%5d: %08X:%04X %08X:%...
95,080,878,833,468,250,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,224
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int __net_init ping_v4_proc_init_net(struct net *net) { return ping_proc_register(net, &ping_v4_seq_afinfo); }
61,634,259,152,129,090,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,225
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ping_v4_push_pending_frames(struct sock *sk, struct pingfakehdr *pfh, struct flowi4 *fl4) { struct sk_buff *skb = skb_peek(&sk->sk_write_queue); pfh->wcheck = csum_partial((char *)&pfh->icmph, sizeof(struct icmphdr), pfh->wcheck); pfh->icmph.checksum = csum_fold(pfh->wcheck); memcpy(icmp_hd...
164,090,267,797,006,700,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,226
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ping_v4_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, size_t len) { struct net *net = sock_net(sk); struct flowi4 fl4; struct inet_sock *inet = inet_sk(sk); struct ipcm_cookie ipc; struct icmphdr user_icmph; struct pingfakehdr pfh; struct rtable *rt = NULL; struct ip_options_data op...
251,888,870,272,419,850,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,227
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ping_v4_seq_show(struct seq_file *seq, void *v) { if (v == SEQ_START_TOKEN) seq_printf(seq, "%-127s\n", " sl local_address rem_address st tx_queue " "rx_queue tr tm->when retrnsmt uid timeout " "inode ref pointer drops"); else { struct ping_iter_state *state = seq->private; i...
65,389,545,117,122,260,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,228
linux
cf970c002d270c36202bd5b9c2804d3097a52da0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
ping: prevent NULL pointer dereference on write to msg_name A plain read() on a socket does set msg->msg_name to NULL. So check for NULL pointer first. Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void *ping_v4_seq_start(struct seq_file *seq, loff_t *pos) { return ping_seq_start(seq, pos, AF_INET); }
86,354,999,619,277,880,000,000,000,000,000,000,000
ping.c
208,150,909,002,443,060,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-6432
30,229
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static __inline__ __be32 addr_bit_set(const void *token, int fn_bit) { const __be32 *addr = token; /* * Here, * 1 << ((~fn_bit ^ BITOP_BE32_SWIZZLE) & 0x1f) * is optimized version of * htonl(1 << ((~fn_bit)&0x1F)) * See include/asm-generic/bitops/le.h. */ return (__force __be32)(1 << ((~fn_bit ^ BITOP_B...
332,318,880,323,246,700,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,230
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static struct fib6_node *fib6_add_1(struct fib6_node *root, struct in6_addr *addr, int plen, int offset, int allow_create, int replace_required) { struct fib6_node *fn, *in, *ln; struct fib6_node *pn = NULL; struct rt6key *key; int bit; __be32 dir = 0; __u32 sernum = fib6_new_sernum(); ...
79,359,217,041,784,300,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,231
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_add_rt2node(struct fib6_node *fn, struct rt6_info *rt, struct nl_info *info) { struct rt6_info *iter = NULL; struct rt6_info **ins; int replace = (info->nlh && (info->nlh->nlmsg_flags & NLM_F_REPLACE)); int add = (!info->nlh || (info->nlh->nlmsg_flags & NLM_F_CREATE)); int foun...
178,373,253,648,973,030,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,232
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_age(struct rt6_info *rt, void *arg) { unsigned long now = jiffies; /* * check addrconf expiration here. * Routes are expired even if they are in use. * * Also age clones. Note, that clones are aged out * only if they are not in use now. */ if (rt->rt6i_flags & RTF_EXPIRES && rt->dst.exp...
100,542,959,720,696,190,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,233
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static struct fib6_table *fib6_alloc_table(struct net *net, u32 id) { struct fib6_table *table; table = kzalloc(sizeof(*table), GFP_ATOMIC); if (table) { table->tb6_id = id; table->tb6_root.leaf = net->ipv6.ip6_null_entry; table->tb6_root.fn_flags = RTN_ROOT | RTN_TL_ROOT | RTN_RTINFO; inet_peer_base_init(&...
241,369,893,835,571,260,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,234
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
void fib6_clean_all(struct net *net, int (*func)(struct rt6_info *, void *arg), int prune, void *arg) { struct fib6_table *table; struct hlist_head *head; unsigned int h; rcu_read_lock(); for (h = 0; h < FIB6_TABLE_HASHSZ; h++) { head = &net->ipv6.fib_table_hash[h]; hlist_for_each_entry_rcu(table, head,...
165,835,613,970,993,920,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,235
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
void fib6_clean_all_ro(struct net *net, int (*func)(struct rt6_info *, void *arg), int prune, void *arg) { struct fib6_table *table; struct hlist_head *head; unsigned int h; rcu_read_lock(); for (h = 0; h < FIB6_TABLE_HASHSZ; h++) { head = &net->ipv6.fib_table_hash[h]; hlist_for_each_entry_rcu(table, he...
27,942,902,347,099,146,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,236
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void fib6_clean_tree(struct net *net, struct fib6_node *root, int (*func)(struct rt6_info *, void *arg), int prune, void *arg) { struct fib6_cleaner_t c; c.w.root = root; c.w.func = fib6_clean_node; c.w.prune = prune; c.w.count = 0; c.w.skip = 0; c.func = func; c.arg = arg; c.net = net; ...
73,470,516,976,458,280,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,237
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
int fib6_del(struct rt6_info *rt, struct nl_info *info) { struct net *net = info->nl_net; struct fib6_node *fn = rt->rt6i_node; struct rt6_info **rtp; #if RT6_DEBUG >= 2 if (rt->dst.obsolete>0) { WARN_ON(fn != NULL); return -ENOENT; } #endif if (!fn || rt == net->ipv6.ip6_null_entry) return -ENOENT; WARN...
261,960,033,169,474,850,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,238
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void fib6_del_route(struct fib6_node *fn, struct rt6_info **rtp, struct nl_info *info) { struct fib6_walker_t *w; struct rt6_info *rt = *rtp; struct net *net = info->nl_net; RT6_TRACE("fib6_del_route\n"); /* Unlink it */ *rtp = rt->dst.rt6_next; rt->rt6i_node = NULL; net->ipv6.rt6_stats->fib_rt_e...
257,038,407,215,644,260,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,239
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_dump_done(struct netlink_callback *cb) { fib6_dump_end(cb); return cb->done ? cb->done(cb) : 0; }
103,960,439,545,410,080,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,240
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_dump_node(struct fib6_walker_t *w) { int res; struct rt6_info *rt; for (rt = w->leaf; rt; rt = rt->dst.rt6_next) { res = rt6_dump_route(rt, w->args); if (res < 0) { /* Frame is full, suspend walking */ w->leaf = rt; return 1; } WARN_ON(res == 0); } w->leaf = NULL; return 0; }
240,214,334,268,122,230,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,241
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_dump_table(struct fib6_table *table, struct sk_buff *skb, struct netlink_callback *cb) { struct fib6_walker_t *w; int res; w = (void *)cb->args[2]; w->root = &table->tb6_root; if (cb->args[4] == 0) { w->count = 0; w->skip = 0; read_lock_bh(&table->tb6_lock); res = fib6_walk(w); r...
91,910,221,470,655,530,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,242
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static struct rt6_info *fib6_find_prefix(struct net *net, struct fib6_node *fn) { if (fn->fn_flags & RTN_ROOT) return net->ipv6.ip6_null_entry; while (fn) { if (fn->left) return fn->left->leaf; if (fn->right) return fn->right->leaf; fn = FIB6_SUBTREE(fn); } return NULL; }
27,745,920,621,853,960,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,243
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
void fib6_force_start_gc(struct net *net) { if (!timer_pending(&net->ipv6.ip6_fib_timer)) mod_timer(&net->ipv6.ip6_fib_timer, jiffies + net->ipv6.sysctl.ip6_rt_gc_interval); }
162,027,776,342,427,270,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,244
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void fib6_gc_timer_cb(unsigned long arg) { fib6_run_gc(0, (struct net *)arg, true); }
97,186,780,571,915,420,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,245
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
struct fib6_table *fib6_get_table(struct net *net, u32 id) { struct fib6_table *tb; struct hlist_head *head; unsigned int h; if (id == 0) id = RT6_TABLE_MAIN; h = id & (FIB6_TABLE_HASHSZ - 1); rcu_read_lock(); head = &net->ipv6.fib_table_hash[h]; hlist_for_each_entry_rcu(tb, head, tb6_hlist) { if (tb->tb6_...
207,969,251,084,951,650,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,246
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
struct fib6_table *fib6_get_table(struct net *net, u32 id) { return net->ipv6.fib6_main_tbl; }
12,248,714,065,864,942,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,247
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void fib6_link_table(struct net *net, struct fib6_table *tb) { unsigned int h; /* * Initialize table lock at a single place to give lockdep a key, * tables aren't visible prior to being linked to the list. */ rwlock_init(&tb->tb6_lock); h = tb->tb6_id & (FIB6_TABLE_HASHSZ - 1); /* * No protection...
1,640,977,733,951,326,800,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,248
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
struct fib6_node * fib6_locate(struct fib6_node *root, const struct in6_addr *daddr, int dst_len, const struct in6_addr *saddr, int src_len) { struct fib6_node *fn; fn = fib6_locate_1(root, daddr, dst_len, offsetof(struct rt6_info, rt6i_dst)); #ifdef CONFIG_IPV6_SUBTREES if (src_len) { ...
224,613,291,479,238,420,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,249
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static struct fib6_node * fib6_locate_1(struct fib6_node *root, const struct in6_addr *addr, int plen, int offset) { struct fib6_node *fn; for (fn = root; fn ; ) { struct rt6key *key = (struct rt6key *)((u8 *)fn->leaf + offset); /* * Prefix match */ if (plen < fn->fn_bit || !ipv6_prefix_...
147,474,382,541,568,970,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,250
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
struct fib6_node * fib6_lookup(struct fib6_node *root, const struct in6_addr *daddr, const struct in6_addr *saddr) { struct fib6_node *fn; struct lookup_args args[] = { { .offset = offsetof(struct rt6_info, rt6i_dst), .addr = daddr, }, #ifdef CONFIG_IPV6_SUBTREES { .offset = offsetof(struct r...
49,757,581,590,135,790,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,251
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static struct fib6_node * fib6_lookup_1(struct fib6_node *root, struct lookup_args *args) { struct fib6_node *fn; __be32 dir; if (unlikely(args->offset == 0)) return NULL; /* * Descend on a tree */ fn = root; for (;;) { struct fib6_node *next; dir = addr_bit_set(args->addr, fn->fn_bit); nex...
158,049,382,599,838,340,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431