idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
30,252
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void fib6_net_exit(struct net *net) { rt6_ifdown(net, NULL); del_timer_sync(&net->ipv6.ip6_fib_timer); #ifdef CONFIG_IPV6_MULTIPLE_TABLES inetpeer_invalidate_tree(&net->ipv6.fib6_local_tbl->tb6_peers); kfree(net->ipv6.fib6_local_tbl); #endif inetpeer_invalidate_tree(&net->ipv6.fib6_main_tbl->tb6_peers); k...
229,200,752,634,890,750,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,253
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static __inline__ u32 fib6_new_sernum(void) { u32 n = ++rt_sernum; if ((__s32)n <= 0) rt_sernum = n = 1; return n; }
31,019,466,304,668,996,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,254
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
struct fib6_table *fib6_new_table(struct net *net, u32 id) { return fib6_get_table(net, id); }
290,245,119,747,461,400,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,255
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_prune_clone(struct rt6_info *rt, void *arg) { if (rt->rt6i_flags & RTF_CACHE) { RT6_TRACE("pruning clone %p\n", rt); return -1; } return 0; }
316,604,417,246,875,550,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,256
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void fib6_prune_clones(struct net *net, struct fib6_node *fn, struct rt6_info *rt) { fib6_clean_tree(net, fn, fib6_prune_clone, 1, rt); }
214,670,205,853,130,160,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,257
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
struct dst_entry *fib6_rule_lookup(struct net *net, struct flowi6 *fl6, int flags, pol_lookup_t lookup) { return (struct dst_entry *) lookup(net, net->ipv6.fib6_main_tbl, fl6, flags); }
248,332,865,669,721,950,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,258
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
void fib6_run_gc(unsigned long expires, struct net *net, bool force) { unsigned long now; if (force) { spin_lock_bh(&fib6_gc_lock); } else if (!spin_trylock_bh(&fib6_gc_lock)) { mod_timer(&net->ipv6.ip6_fib_timer, jiffies + HZ); return; } gc_args.timeout = expires ? (int)expires : net->ipv6.sysctl.ip6_...
233,802,186,896,604,320,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,259
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static __inline__ void fib6_start_gc(struct net *net, struct rt6_info *rt) { if (!timer_pending(&net->ipv6.ip6_fib_timer) && (rt->rt6i_flags & (RTF_EXPIRES | RTF_CACHE))) mod_timer(&net->ipv6.ip6_fib_timer, jiffies + net->ipv6.sysctl.ip6_rt_gc_interval); }
15,611,357,412,277,835,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,260
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void __net_init fib6_tables_init(struct net *net) { fib6_link_table(net, net->ipv6.fib6_main_tbl); fib6_link_table(net, net->ipv6.fib6_local_tbl); }
115,600,158,640,355,240,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,261
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static void __net_init fib6_tables_init(struct net *net) { fib6_link_table(net, net->ipv6.fib6_main_tbl); }
325,005,253,663,303,950,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,262
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_walk(struct fib6_walker_t *w) { int res; w->state = FWS_INIT; w->node = w->root; fib6_walker_link(w); res = fib6_walk_continue(w); if (res <= 0) fib6_walker_unlink(w); return res; }
113,786,152,699,888,230,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,263
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int fib6_walk_continue(struct fib6_walker_t *w) { struct fib6_node *fn, *pn; for (;;) { fn = w->node; if (!fn) return 0; if (w->prune && fn != w->root && fn->fn_flags & RTN_RTINFO && w->state < FWS_C) { w->state = FWS_C; w->leaf = fn->leaf; } switch (w->state) { #ifdef CONFIG_IPV6_SU...
152,505,681,772,163,300,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,264
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static inline void fib6_walker_link(struct fib6_walker_t *w) { write_lock_bh(&fib6_walker_lock); list_add(&w->lh, &fib6_walkers); write_unlock_bh(&fib6_walker_lock); }
124,273,781,946,770,840,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,265
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static inline void fib6_walker_unlink(struct fib6_walker_t *w) { write_lock_bh(&fib6_walker_lock); list_del(&w->lh); write_unlock_bh(&fib6_walker_lock); }
307,533,093,945,853,700,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,266
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static int inet6_dump_fib(struct sk_buff *skb, struct netlink_callback *cb) { struct net *net = sock_net(skb->sk); unsigned int h, s_h; unsigned int e = 0, s_e; struct rt6_rtnl_dump_arg arg; struct fib6_walker_t *w; struct fib6_table *tb; struct hlist_head *head; int res = 0; s_h = cb->args[0]; s_e = cb->arg...
166,979,903,323,430,340,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,267
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static __inline__ struct fib6_node * node_alloc(void) { struct fib6_node *fn; fn = kmem_cache_zalloc(fib6_node_kmem, GFP_ATOMIC); return fn; }
74,054,656,462,517,580,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,268
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static __inline__ void node_free(struct fib6_node * fn) { kmem_cache_free(fib6_node_kmem, fn); }
7,527,066,624,608,855,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,269
linux
ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
net: fib: fib6_add: fix potential NULL pointer dereference When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return with an error in fn = fib6_add_1(), then error codes are encoded into the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we write the error code into err and jump to out, hence ...
0
static __inline__ void rt6_release(struct rt6_info *rt) { if (atomic_dec_and_test(&rt->rt6i_ref)) dst_free(&rt->dst); }
264,259,570,521,334,300,000,000,000,000,000,000,000
ip6_fib.c
272,150,802,320,780,800,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6431
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6431
30,270
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static void __aac_shutdown(struct aac_dev * aac) { if (aac->aif_thread) { int i; /* Clear out events first */ for (i = 0; i < (aac->scsi_host_ptr->can_queue + AAC_NUM_MGT_FIB); i++) { struct fib *fib = &aac->fibs[i]; if (!(fib->hw_fib_va->header.XferState & cpu_to_le32(NoResponseExpected | Async)) && ...
224,965,611,476,775,280,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,271
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_biosparm(struct scsi_device *sdev, struct block_device *bdev, sector_t capacity, int *geom) { struct diskparm *param = (struct diskparm *)geom; unsigned char *buf; dprintk((KERN_DEBUG "aac_biosparm.\n")); /* * Assuming extended translation is enabled - #REVISIT# */ if (capacity >= 2 * 1024 ...
73,578,216,203,303,020,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,272
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static long aac_cfg_ioctl(struct file *file, unsigned int cmd, unsigned long arg) { int ret; if (!capable(CAP_SYS_RAWIO)) return -EPERM; mutex_lock(&aac_mutex); ret = aac_do_ioctl(file->private_data, cmd, (void __user *)arg); mutex_unlock(&aac_mutex); return ret; }
160,464,273,876,265,500,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,273
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_cfg_open(struct inode *inode, struct file *file) { struct aac_dev *aac; unsigned minor_number = iminor(inode); int err = -ENODEV; mutex_lock(&aac_mutex); /* BKL pushdown: nothing else protects this list */ list_for_each_entry(aac, &aac_devices, entry) { if (aac->id == minor_number) { file->pr...
215,508,164,436,414,770,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,274
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static long aac_compat_cfg_ioctl(struct file *file, unsigned cmd, unsigned long arg) { if (!capable(CAP_SYS_RAWIO)) return -EPERM; return aac_compat_do_ioctl(file->private_data, cmd, arg); }
91,161,324,605,513,060,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,275
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static long aac_compat_do_ioctl(struct aac_dev *dev, unsigned cmd, unsigned long arg) { long ret; mutex_lock(&aac_mutex); switch (cmd) { case FSACTL_MINIPORT_REV_CHECK: case FSACTL_SENDFIB: case FSACTL_OPEN_GET_ADAPTER_FIB: case FSACTL_CLOSE_GET_ADAPTER_FIB: case FSACTL_SEND_RAW_SRB: case FSACTL_GET_PCI_INFO: ...
145,520,455,037,830,570,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,276
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_eh_abort(struct scsi_cmnd* cmd) { struct scsi_device * dev = cmd->device; struct Scsi_Host * host = dev->host; struct aac_dev * aac = (struct aac_dev *)host->hostdata; int count; int ret = FAILED; printk(KERN_ERR "%s: Host adapter abort request (%d,%d,%d,%d)\n", AAC_DRIVERNAME, host->host_no, ...
191,647,599,217,138,970,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,277
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_eh_reset(struct scsi_cmnd* cmd) { struct scsi_device * dev = cmd->device; struct Scsi_Host * host = dev->host; struct scsi_cmnd * command; int count; struct aac_dev * aac = (struct aac_dev *)host->hostdata; unsigned long flags; /* Mark the associated FIB to not complete, eh handler does this */ ...
107,756,458,410,075,870,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,278
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static void __exit aac_exit(void) { if (aac_cfg_major > -1) unregister_chrdev(aac_cfg_major, "aac"); pci_unregister_driver(&aac_pci_driver); }
170,416,038,916,602,600,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,279
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
struct aac_driver_ident* aac_get_driver_ident(int devtype) { return &aac_drivers[devtype]; }
93,479,210,536,395,080,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,280
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
ssize_t aac_get_serial_number(struct device *device, char *buf) { return aac_show_serial_number(device, &aac_serial_number, buf); }
124,289,600,708,366,400,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,281
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static const char *aac_info(struct Scsi_Host *shost) { struct aac_dev *dev = (struct aac_dev *)shost->hostdata; return aac_drivers[dev->cardtype].name; }
121,445,756,837,690,970,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,282
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int __init aac_init(void) { int error; printk(KERN_INFO "Adaptec %s driver %s\n", AAC_DRIVERNAME, aac_driver_version); error = pci_register_driver(&aac_pci_driver); if (error < 0) return error; aac_cfg_major = register_chrdev( 0, "aac", &aac_cfg_fops); if (aac_cfg_major < 0) { printk(KERN_WARNING...
93,273,297,966,448,550,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,283
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_ioctl(struct scsi_device *sdev, int cmd, void __user * arg) { struct aac_dev *dev = (struct aac_dev *)sdev->host->hostdata; if (!capable(CAP_SYS_RAWIO)) return -EPERM; return aac_do_ioctl(dev, cmd, arg); }
314,570,350,618,061,740,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,284
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_probe_one(struct pci_dev *pdev, const struct pci_device_id *id) { unsigned index = id->driver_data; struct Scsi_Host *shost; struct aac_dev *aac; struct list_head *insert = &aac_devices; int error = -ENODEV; int unique_id = 0; u64 dmamask; extern int aac_sync_mode; list_for_each_entry(aac, &aac...
28,994,236,768,767,620,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,285
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_queuecommand_lck(struct scsi_cmnd *cmd, void (*done)(struct scsi_cmnd *)) { struct Scsi_Host *host = cmd->device->host; struct aac_dev *dev = (struct aac_dev *)host->hostdata; u32 count = 0; cmd->scsi_done = done; for (; count < (host->can_queue + AAC_NUM_MGT_FIB); ++count) { struct fib * fib = &d...
295,630,831,268,631,500,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,286
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_show_bios_version(struct device *device, struct device_attribute *attr, char *buf) { struct aac_dev *dev = (struct aac_dev*)class_to_shost(device)->hostdata; int len, tmp; tmp = le32_to_cpu(dev->adapter_info.biosrev); len = snprintf(buf, PAGE_SIZE, "%d.%d-%d[%d]\n", tmp >> 2...
234,657,611,924,044,600,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,287
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_show_kernel_version(struct device *device, struct device_attribute *attr, char *buf) { struct aac_dev *dev = (struct aac_dev*)class_to_shost(device)->hostdata; int len, tmp; tmp = le32_to_cpu(dev->adapter_info.kernelrev); len = snprintf(buf, PAGE_SIZE, "%d.%d-%d[%d]\n", ...
58,931,026,647,625,830,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,288
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_show_max_channel(struct device *device, struct device_attribute *attr, char *buf) { return snprintf(buf, PAGE_SIZE, "%d\n", class_to_shost(device)->max_channel); }
312,600,596,606,107,600,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,289
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_show_max_id(struct device *device, struct device_attribute *attr, char *buf) { return snprintf(buf, PAGE_SIZE, "%d\n", class_to_shost(device)->max_id); }
150,712,068,346,955,550,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,290
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_show_raid_level(struct device *dev, struct device_attribute *attr, char *buf) { struct scsi_device *sdev = to_scsi_device(dev); struct aac_dev *aac = (struct aac_dev *)(sdev->host->hostdata); if (sdev_channel(sdev) != CONTAINER_CHANNEL) return snprintf(buf, PAGE_SIZE, sdev->no_uld_attach ? "...
204,832,775,770,584,780,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,291
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_show_vendor(struct device *device, struct device_attribute *attr, char *buf) { struct aac_dev *dev = (struct aac_dev*)class_to_shost(device)->hostdata; int len; if (dev->supplement_adapter_info.AdapterTypeText[0]) { char * cp = dev->supplement_adapter_info.AdapterTypeText; while (*c...
58,403,737,187,285,280,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,292
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static void aac_shutdown(struct pci_dev *dev) { struct Scsi_Host *shost = pci_get_drvdata(dev); scsi_block_requests(shost); __aac_shutdown((struct aac_dev *)shost->hostdata); }
121,111,464,792,433,220,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,293
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static int aac_slave_configure(struct scsi_device *sdev) { struct aac_dev *aac = (struct aac_dev *)sdev->host->hostdata; if (aac->jbod && (sdev->type == TYPE_DISK)) sdev->removable = 1; if ((sdev->type == TYPE_DISK) && (sdev_channel(sdev) != CONTAINER_CHANNEL) && (!aac->jbod || sdev->inq_periph_qual) && (...
260,222,798,866,312,000,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,294
linux
f856567b930dfcdbc3323261bf77240ccdde01f5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
aacraid: missing capable() check in compat ioctl In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the check as well. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torv...
0
static ssize_t aac_store_reset_adapter(struct device *device, struct device_attribute *attr, const char *buf, size_t count) { int retval = -EACCES; if (!capable(CAP_SYS_ADMIN)) return retval; retval = aac_reset_adapter((struct aac_dev*)class_to_shost(device)->hostdata, buf[0] == '!'); if (r...
307,136,746,374,514,920,000,000,000,000,000,000,000
linit.c
174,196,362,056,113,520,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2013-6383
30,295
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static long __qeth_check_irb_error(struct ccw_device *cdev, unsigned long intparm, struct irb *irb) { struct qeth_card *card; card = CARD_FROM_CDEV(cdev); if (!IS_ERR(irb)) return 0; switch (PTR_ERR(irb)) { case -EIO: QETH_DBF_MESSAGE(2, "%s i/o-error on device\n", dev_name(&cdev->dev)); QETH_CARD_TE...
39,691,863,565,590,265,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,296
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int __qeth_do_run_thread(struct qeth_card *card, unsigned long thread) { unsigned long flags; int rc = 0; spin_lock_irqsave(&card->thread_mask_lock, flags); if (card->thread_start_mask & thread) { if ((card->thread_allowed_mask & thread) && !(card->thread_running_mask & thread)) { rc = 1; card...
192,800,975,959,922,340,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,297
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline void __qeth_fill_buffer(struct sk_buff *skb, struct qdio_buffer *buffer, int is_tso, int *next_element_to_fill, int offset) { int length = skb->len - skb->data_len; int length_here; int element; char *data; int first_lap, cnt; struct skb_frag_struct *frag; element = *next_element_to_fill; data ...
91,639,878,168,751,720,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,298
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static struct qeth_cmd_buffer *__qeth_get_buffer(struct qeth_channel *channel) { __u8 index; QETH_CARD_TEXT(CARD_FROM_CDEV(channel->ccwdev), 6, "getbuff"); index = channel->io_buf_no; do { if (channel->iob[index].state == BUF_STATE_FREE) { channel->iob[index].state = BUF_STATE_LOCKED; channel->io_buf_no = ...
335,341,093,857,750,050,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,299
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_add_dbf_entry(struct qeth_card *card, char *name) { struct qeth_dbf_entry *new_entry; card->debug = debug_register(name, 2, 1, 8); if (!card->debug) { QETH_DBF_TEXT_(SETUP, 2, "%s", "qcdbf"); goto err; } if (debug_register_view(card->debug, &debug_hex_ascii_view)) goto err_dbg; new_entry = ...
91,582,992,574,025,220,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,300
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_alloc_buffer_pool(struct qeth_card *card) { struct qeth_buffer_pool_entry *pool_entry; void *ptr; int i, j; QETH_CARD_TEXT(card, 5, "alocpool"); for (i = 0; i < card->qdio.init_pool.buf_count; ++i) { pool_entry = kzalloc(sizeof(*pool_entry), GFP_KERNEL); if (!pool_entry) { qeth_free_buffer_...
220,308,054,452,602,520,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,301
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static struct qeth_card *qeth_alloc_card(void) { struct qeth_card *card; QETH_DBF_TEXT(SETUP, 2, "alloccrd"); card = kzalloc(sizeof(struct qeth_card), GFP_DMA|GFP_KERNEL); if (!card) goto out; QETH_DBF_HEX(SETUP, 2, &card, sizeof(void *)); card->ip_tbd_list = kzalloc(sizeof(struct list_head), GFP_KERNEL); if ...
338,784,509,738,573,000,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,302
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_alloc_cq(struct qeth_card *card) { int rc; if (card->options.cq == QETH_CQ_ENABLED) { int i; struct qdio_outbuf_state *outbuf_states; QETH_DBF_TEXT(SETUP, 2, "cqon"); card->qdio.c_q = kzalloc(sizeof(struct qeth_qdio_q), GFP_KERNEL); if (!card->qdio.c_q) { rc = -1; goto k...
128,692,986,940,378,140,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,303
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_alloc_qdio_buffers(struct qeth_card *card) { int i, j; QETH_DBF_TEXT(SETUP, 2, "allcqdbf"); if (atomic_cmpxchg(&card->qdio.state, QETH_QDIO_UNINITIALIZED, QETH_QDIO_ALLOCATED) != QETH_QDIO_UNINITIALIZED) return 0; card->qdio.in_q = kzalloc(sizeof(struct qeth_qdio_q), GFP_KERNEL); if (...
48,472,827,877,800,270,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,304
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static struct qeth_reply *qeth_alloc_reply(struct qeth_card *card) { struct qeth_reply *reply; reply = kzalloc(sizeof(struct qeth_reply), GFP_ATOMIC); if (reply) { atomic_set(&reply->refcnt, 1); atomic_set(&reply->received, 0); reply->card = card; } return reply; }
222,348,127,162,388,520,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,305
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_buffer_reclaim_work(struct work_struct *work) { struct qeth_card *card = container_of(work, struct qeth_card, buffer_reclaim_work.work); QETH_CARD_TEXT_(card, 2, "brw:%x", card->reclaim_index); qeth_queue_input_buffer(card, card->reclaim_index); }
265,482,763,450,925,040,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,306
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_change_mtu(struct net_device *dev, int new_mtu) { struct qeth_card *card; char dbf_text[15]; card = dev->ml_priv; QETH_CARD_TEXT(card, 4, "chgmtu"); sprintf(dbf_text, "%8x", new_mtu); QETH_CARD_TEXT(card, 4, dbf_text); if (new_mtu < 64) return -EINVAL; if (new_mtu > 65535) return -EINVAL; if ((...
21,463,012,734,416,700,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,307
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_check_idx_response(struct qeth_card *card, unsigned char *buffer) { if (!buffer) return 0; QETH_DBF_HEX(CTRL, 2, buffer, QETH_DBF_CTRL_LEN); if ((buffer[2] & 0xc0) == 0xc0) { QETH_DBF_MESSAGE(2, "received an IDX TERMINATE " "with cause code 0x%02x%s\n", buffer[4], ((buffer[4] ...
82,299,441,015,983,885,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,308
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static struct qeth_ipa_cmd *qeth_check_ipa_data(struct qeth_card *card, struct qeth_cmd_buffer *iob) { struct qeth_ipa_cmd *cmd = NULL; QETH_CARD_TEXT(card, 5, "chkipad"); if (IS_IPA(iob->data)) { cmd = (struct qeth_ipa_cmd *) PDU_ENCAPSULATION(iob->data); if (IS_IPA_REPLY(cmd)) { if (cmd->hdr.command != I...
268,733,477,220,509,230,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,309
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_check_outbound_queue(struct qeth_qdio_out_q *queue) { int index; int flush_cnt = 0; int q_was_packing = 0; /* * check if weed have to switch to non-packing mode or if * we have to get a pci flag out on the queue */ if ((atomic_read(&queue->used_buffers) <= QETH_LOW_WATERMARK_PACK) || !...
259,848,613,286,690,180,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,310
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_check_qdio_errors(struct qeth_card *card, struct qdio_buffer *buf, unsigned int qdio_error, const char *dbftext) { if (qdio_error) { QETH_CARD_TEXT(card, 2, dbftext); QETH_CARD_TEXT_(card, 2, " F15=%02X", buf->element[15].sflags); QETH_CARD_TEXT_(card, 2, " F14=%02X", buf->element[...
49,545,422,029,565,330,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,311
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_clean_channel(struct qeth_channel *channel) { int cnt; QETH_DBF_TEXT(SETUP, 2, "freech"); for (cnt = 0; cnt < QETH_CMD_BUFFER_NO; cnt++) kfree(channel->iob[cnt].data); }
75,310,581,593,104,250,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,312
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline void qeth_cleanup_handled_pending(struct qeth_qdio_out_q *q, int bidx, int forced_cleanup) { if (q->card->options.cq != QETH_CQ_ENABLED) return; if (q->bufs[bidx]->next_pending != NULL) { struct qeth_qdio_out_buffer *head = q->bufs[bidx]; struct qeth_qdio_out_buffer *c = q->bufs[bidx]->next_pend...
307,309,443,422,346,200,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,313
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_clear_channel(struct qeth_channel *channel) { unsigned long flags; struct qeth_card *card; int rc; card = CARD_FROM_CDEV(channel->ccwdev); QETH_CARD_TEXT(card, 3, "clearch"); spin_lock_irqsave(get_ccwdev_lock(channel->ccwdev), flags); rc = ccw_device_clear(channel->ccwdev, QETH_CLEAR_CHANNEL_PAR...
120,112,261,035,007,040,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,314
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_clear_channels(struct qeth_card *card) { int rc1 = 0, rc2 = 0, rc3 = 0; QETH_CARD_TEXT(card, 3, "clearchs"); rc1 = qeth_clear_channel(&card->read); rc2 = qeth_clear_channel(&card->write); rc3 = qeth_clear_channel(&card->data); if (rc1) return rc1; if (rc2) return rc2; return rc3; }
76,477,945,249,476,540,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,315
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_cmd_buffers(struct qeth_channel *channel) { int cnt; for (cnt = 0; cnt < QETH_CMD_BUFFER_NO; cnt++) qeth_release_buffer(channel, &channel->iob[cnt]); channel->buf_no = 0; channel->io_buf_no = 0; }
236,921,226,125,651,300,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,316
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_clear_dbf_list(void) { struct qeth_dbf_entry *entry, *tmp; mutex_lock(&qeth_dbf_list_mutex); list_for_each_entry_safe(entry, tmp, &qeth_dbf_list, dbf_list) { list_del(&entry->dbf_list); debug_unregister(entry->dbf_info); kfree(entry); } mutex_unlock(&qeth_dbf_list_mutex); }
301,148,811,077,147,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,317
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_ipacmd_list(struct qeth_card *card) { struct qeth_reply *reply, *r; unsigned long flags; QETH_CARD_TEXT(card, 4, "clipalst"); spin_lock_irqsave(&card->lock, flags); list_for_each_entry_safe(reply, r, &card->cmd_waiter_list, list) { qeth_get_reply(reply); reply->rc = -EIO; atomic_inc(&reply-...
328,242,462,504,402,950,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,318
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_clear_output_buffer(struct qeth_qdio_out_q *queue, struct qeth_qdio_out_buffer *buf, enum qeth_qdio_buffer_states newbufstate) { int i; /* is PCI flag set on buffer? */ if (buf->buffer->element[0].sflags & SBAL_SFLAGS0_PCI_REQ) atomic_dec(&queue->set_pci_flags_count); if (newbufstate == QET...
152,995,027,678,572,060,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,319
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_clear_outq_buffers(struct qeth_qdio_out_q *q, int free) { int j; for (j = 0; j < QDIO_MAX_BUFFERS_PER_Q; ++j) { if (!q->bufs[j]) continue; qeth_cleanup_handled_pending(q, j, 1); qeth_clear_output_buffer(q, q->bufs[j], QETH_QDIO_BUF_EMPTY); if (free) { kmem_cache_free(qeth_qdio_outbuf_c...
333,175,492,042,885,670,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,320
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_qdio_buffers(struct qeth_card *card) { int i; QETH_CARD_TEXT(card, 2, "clearqdbf"); /* clear outbound buffers to free skbs */ for (i = 0; i < card->qdio.no_out_queues; ++i) { if (card->qdio.out_qs[i]) { qeth_clear_outq_buffers(card->qdio.out_qs[i], 0); } } }
265,654,578,125,542,600,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,321
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_recovery_task(struct qeth_card *card) { card->recovery_task = NULL; }
49,123,529,121,137,510,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,322
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_thread_running_bit(struct qeth_card *card, unsigned long thread) { unsigned long flags; spin_lock_irqsave(&card->thread_mask_lock, flags); card->thread_running_mask &= ~thread; spin_unlock_irqrestore(&card->thread_mask_lock, flags); wake_up(&card->wait_q); }
256,338,380,907,098,040,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,323
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_thread_start_bit(struct qeth_card *card, unsigned long thread) { unsigned long flags; spin_lock_irqsave(&card->thread_mask_lock, flags); card->thread_start_mask &= ~thread; spin_unlock_irqrestore(&card->thread_mask_lock, flags); wake_up(&card->wait_q); }
196,706,848,396,262,960,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,324
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_clear_working_pool_list(struct qeth_card *card) { struct qeth_buffer_pool_entry *pool_entry, *tmp; QETH_CARD_TEXT(card, 5, "clwrklst"); list_for_each_entry_safe(pool_entry, tmp, &card->qdio.in_buf_pool.entry_list, list){ list_del(&pool_entry->list); } }
283,268,792,257,991,120,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,325
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_close_dev(struct qeth_card *card) { QETH_CARD_TEXT(card, 2, "cldevsubm"); queue_work(qeth_wq, &card->close_dev_work); }
9,331,992,008,855,159,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,326
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_close_dev_handler(struct work_struct *work) { struct qeth_card *card; card = container_of(work, struct qeth_card, close_dev_work); QETH_CARD_TEXT(card, 2, "cldevhdl"); rtnl_lock(); dev_close(card->dev); rtnl_unlock(); ccwgroup_set_offline(card->gdev); }
59,932,957,558,542,460,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,327
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_cm_enable(struct qeth_card *card) { int rc; struct qeth_cmd_buffer *iob; QETH_DBF_TEXT(SETUP, 2, "cmenable"); iob = qeth_wait_for_buffer(&card->write); memcpy(iob->data, CM_ENABLE, CM_ENABLE_SIZE); memcpy(QETH_CM_ENABLE_ISSUER_RM_TOKEN(iob->data), &card->token.issuer_rm_r, QETH_MPC_TOKEN...
2,116,630,186,426,775,400,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,328
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_cm_enable_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_cmd_buffer *iob; QETH_DBF_TEXT(SETUP, 2, "cmenblcb"); iob = (struct qeth_cmd_buffer *) data; memcpy(&card->token.cm_filter_r, QETH_CM_ENABLE_RESP_FILTER_TOKEN(iob->data), QETH_MPC_TOK...
330,723,092,795,501,000,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,329
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_cm_setup(struct qeth_card *card) { int rc; struct qeth_cmd_buffer *iob; QETH_DBF_TEXT(SETUP, 2, "cmsetup"); iob = qeth_wait_for_buffer(&card->write); memcpy(iob->data, CM_SETUP, CM_SETUP_SIZE); memcpy(QETH_CM_SETUP_DEST_ADDR(iob->data), &card->token.issuer_rm_r, QETH_MPC_TOKEN_LENGTH); ...
89,255,690,036,075,060,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,330
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_cm_setup_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_cmd_buffer *iob; QETH_DBF_TEXT(SETUP, 2, "cmsetpcb"); iob = (struct qeth_cmd_buffer *) data; memcpy(&card->token.cm_connection_r, QETH_CM_SETUP_RESP_DEST_ADDR(iob->data), QETH_MPC_TOK...
41,505,698,025,871,873,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,331
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline enum iucv_tx_notify qeth_compute_cq_notification(int sbalf15, int delayed) { enum iucv_tx_notify n; switch (sbalf15) { case 0: n = delayed ? TX_NOTIFY_DELAYED_OK : TX_NOTIFY_OK; break; case 4: case 16: case 17: case 18: n = delayed ? TX_NOTIFY_DELAYED_UNREACHABLE : TX_NOTIFY_UNREACHABLE;...
40,173,177,874,372,460,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,332
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_configure_blkt_default(struct qeth_card *card, char *prcd) { QETH_DBF_TEXT(SETUP, 2, "cfgblkt"); if (prcd[74] == 0xF0 && prcd[75] == 0xF0 && prcd[76] >= 0xF1 && prcd[76] <= 0xF4) { card->info.blkt.time_total = 0; card->info.blkt.inter_packet = 0; card->info.blkt.inter_packet_jumbo = 0; }...
328,945,655,579,837,840,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,333
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_configure_cq(struct qeth_card *card, enum qeth_cq cq) { int rc; if (card->options.cq == QETH_CQ_NOTAVAILABLE) { rc = -1; goto out; } else { if (card->options.cq == cq) { rc = 0; goto out; } if (card->state != CARD_STATE_DOWN && card->state != CARD_STATE_RECOVER) { rc = -1; got...
217,357,067,882,978,370,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,334
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_configure_unitaddr(struct qeth_card *card, char *prcd) { QETH_DBF_TEXT(SETUP, 2, "cfgunit"); card->info.chpid = prcd[30]; card->info.unit_addr2 = prcd[31]; card->info.cula = prcd[63]; card->info.guestlan = ((prcd[0x10] == _ascebc['V']) && (prcd[0x11] == _ascebc['M'])); }
281,866,770,766,117,120,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,335
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static ssize_t qeth_core_driver_group_store(struct device_driver *ddrv, const char *buf, size_t count) { int err; err = ccwgroup_create_dev(qeth_core_root_dev, &qeth_core_ccwgroup_driver, 3, buf); return err ? err : count; }
242,530,704,049,087,500,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,336
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_core_ethtool_get_settings(struct net_device *netdev, struct ethtool_cmd *ecmd) { struct qeth_card *card = netdev->ml_priv; enum qeth_link_types link_type; if ((card->info.type == QETH_CARD_TYPE_IQD) || (card->info.guestlan)) link_type = QETH_LINK_TYPE_10GBIT_ETH; else link_type = card->info.link_...
12,797,156,461,111,136,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,337
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_core_free_card(struct qeth_card *card) { QETH_DBF_TEXT(SETUP, 2, "freecrd"); QETH_DBF_HEX(SETUP, 2, &card, sizeof(void *)); qeth_clean_channel(&card->read); qeth_clean_channel(&card->write); if (card->dev) free_netdev(card->dev); kfree(card->ip_tbd_list); qeth_free_qdio_buffers(card); unregi...
203,012,763,317,906,570,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,338
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_core_free_discipline(struct qeth_card *card) { if (card->options.layer2) symbol_put(qeth_l2_discipline); else symbol_put(qeth_l3_discipline); card->discipline = NULL; }
264,259,815,553,749,580,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,339
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_core_freeze(struct ccwgroup_device *gdev) { struct qeth_card *card = dev_get_drvdata(&gdev->dev); if (card->discipline && card->discipline->freeze) return card->discipline->freeze(gdev); return 0; }
72,751,385,897,414,000,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,340
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_core_get_drvinfo(struct net_device *dev, struct ethtool_drvinfo *info) { struct qeth_card *card = dev->ml_priv; strlcpy(info->driver, card->options.layer2 ? "qeth_l2" : "qeth_l3", sizeof(info->driver)); strlcpy(info->version, "1.0", sizeof(info->version)); strlcpy(info->fw_version, card->info.mcl_lev...
62,951,076,927,046,160,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,341
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
struct sk_buff *qeth_core_get_next_skb(struct qeth_card *card, struct qeth_qdio_buffer *qethbuffer, struct qdio_buffer_element **__element, int *__offset, struct qeth_hdr **hdr) { struct qdio_buffer_element *element = *__element; struct qdio_buffer *buffer = qethbuffer->buffer; int offset = *__offset; struct ...
128,932,928,066,819,760,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,342
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_core_get_sset_count(struct net_device *dev, int stringset) { switch (stringset) { case ETH_SS_STATS: return (sizeof(qeth_ethtool_stats_keys) / ETH_GSTRING_LEN); default: return -EINVAL; } }
251,921,937,576,717,760,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,343
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_core_get_strings(struct net_device *dev, u32 stringset, u8 *data) { switch (stringset) { case ETH_SS_STATS: memcpy(data, &qeth_ethtool_stats_keys, sizeof(qeth_ethtool_stats_keys)); break; default: WARN_ON(1); break; } }
173,124,194,293,055,620,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,344
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_core_hardsetup_card(struct qeth_card *card) { int retries = 3; int rc; QETH_DBF_TEXT(SETUP, 2, "hrdsetup"); atomic_set(&card->force_alloc_skb, 0); qeth_update_from_chp_desc(card); retry: if (retries < 3) QETH_DBF_MESSAGE(2, "%s Retrying to do IDX activates.\n", dev_name(&card->gdev->dev)); ccw_dev...
113,661,846,428,807,070,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,345
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_core_probe_device(struct ccwgroup_device *gdev) { struct qeth_card *card; struct device *dev; int rc; unsigned long flags; char dbf_name[DBF_NAME_LEN]; QETH_DBF_TEXT(SETUP, 2, "probedev"); dev = &gdev->dev; if (!get_device(dev)) return -ENODEV; QETH_DBF_TEXT_(SETUP, 2, "%s", dev_name(&gdev...
269,772,068,647,801,800,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,346
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_core_remove_device(struct ccwgroup_device *gdev) { unsigned long flags; struct qeth_card *card = dev_get_drvdata(&gdev->dev); QETH_DBF_TEXT(SETUP, 2, "removedv"); if (card->discipline) { card->discipline->remove(gdev); qeth_core_free_discipline(card); } write_lock_irqsave(&qeth_core_card_l...
312,227,184,398,198,800,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,347
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_core_restore(struct ccwgroup_device *gdev) { struct qeth_card *card = dev_get_drvdata(&gdev->dev); if (card->discipline && card->discipline->restore) return card->discipline->restore(gdev); return 0; }
77,492,801,270,857,140,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,348
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_core_set_offline(struct ccwgroup_device *gdev) { struct qeth_card *card = dev_get_drvdata(&gdev->dev); return card->discipline->set_offline(gdev); }
86,283,047,769,534,170,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,349
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_core_set_online(struct ccwgroup_device *gdev) { struct qeth_card *card = dev_get_drvdata(&gdev->dev); int rc = 0; int def_discipline; if (!card->discipline) { if (card->info.type == QETH_CARD_TYPE_IQD) def_discipline = QETH_DISCIPLINE_LAYER3; else def_discipline = QETH_DISCIPLINE_LAYER2; ...
186,936,756,170,587,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,350
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_core_shutdown(struct ccwgroup_device *gdev) { struct qeth_card *card = dev_get_drvdata(&gdev->dev); if (card->discipline && card->discipline->shutdown) card->discipline->shutdown(gdev); }
217,666,578,296,986,940,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,351
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_core_sl_print(struct seq_file *m, struct service_level *slr) { struct qeth_card *card = container_of(slr, struct qeth_card, qeth_service_level); if (card->info.mcl_level[0]) seq_printf(m, "qeth: %s firmware level %s\n", CARD_BUS_ID(card), card->info.mcl_level); }
332,473,386,918,876,500,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381