idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
30,352
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_core_thaw(struct ccwgroup_device *gdev) { struct qeth_card *card = dev_get_drvdata(&gdev->dev); if (card->discipline && card->discipline->thaw) return card->discipline->thaw(gdev); return 0; }
217,154,908,194,360,100,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,353
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_cq_init(struct qeth_card *card) { int rc; if (card->options.cq == QETH_CQ_ENABLED) { QETH_DBF_TEXT(SETUP, 2, "cqinit"); memset(card->qdio.c_q->qdio_bufs, 0, QDIO_MAX_BUFFERS_PER_Q * sizeof(struct qdio_buffer)); card->qdio.c_q->next_buf_to_init = 127; rc = do_QDIO(CARD_DDEV(car...
320,243,620,914,269,960,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,354
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_create_qib_param_field(struct qeth_card *card, char *param_field) { param_field[0] = _ascebc['P']; param_field[1] = _ascebc['C']; param_field[2] = _ascebc['I']; param_field[3] = _ascebc['T']; *((unsigned int *) (&param_field[4])) = QETH_PCI_THRESHOLD_A(card); *((unsigned int *) (&param_field[8...
330,548,952,916,247,500,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,355
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_create_qib_param_field_blkt(struct qeth_card *card, char *param_field) { param_field[16] = _ascebc['B']; param_field[17] = _ascebc['L']; param_field[18] = _ascebc['K']; param_field[19] = _ascebc['T']; *((unsigned int *) (&param_field[20])) = card->info.blkt.time_total; *((unsigned int *) (&para...
114,004,346,354,500,910,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,356
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_create_skb_frag(struct qeth_qdio_buffer *qethbuffer, struct qdio_buffer_element *element, struct sk_buff **pskb, int offset, int *pfrag, int data_len) { struct page *page = virt_to_page(element->addr); if (*pskb == NULL) { if (qethbuffer->rx_skb) { /* only if qeth_card.options.cq == QE...
18,087,121,176,642,668,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,357
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_dbf_longtext(debug_info_t *id, int level, char *fmt, ...) { char dbf_txt_buf[32]; va_list args; if (level > id->level) return; va_start(args, fmt); vsnprintf(dbf_txt_buf, sizeof(dbf_txt_buf), fmt, args); va_end(args); debug_text_event(id, level, dbf_txt_buf); }
6,452,355,708,559,555,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,358
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_default_setadapterparms_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; QETH_CARD_TEXT(card, 4, "defadpcb"); cmd = (struct qeth_ipa_cmd *) data; if (cmd->hdr.return_code == 0) cmd->hdr.return_code = cmd->data.setadapterparms.hdr.return_co...
337,207,874,706,434,650,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,359
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_determine_capabilities(struct qeth_card *card) { int rc; int length; char *prcd; struct ccw_device *ddev; int ddev_offline = 0; QETH_DBF_TEXT(SETUP, 2, "detcapab"); ddev = CARD_DDEV(card); if (!ddev->online) { ddev_offline = 1; rc = ccw_device_set_online(ddev); if (rc) { QETH_DBF_TEXT...
102,511,196,038,430,770,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,360
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_determine_card_type(struct qeth_card *card) { int i = 0; QETH_DBF_TEXT(SETUP, 2, "detcdtyp"); card->qdio.do_prio_queueing = QETH_PRIOQ_DEFAULT; card->qdio.default_out_queue = QETH_DEFAULT_QUEUE; while (known_devices[i][QETH_DEV_MODEL_IND]) { if ((CARD_RDEV(card)->id.dev_type == known_device...
172,248,117,819,398,800,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,361
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_do_run_thread(struct qeth_card *card, unsigned long thread) { int rc = 0; wait_event(card->wait_q, (rc = __qeth_do_run_thread(card, thread)) >= 0); return rc; }
9,264,061,318,527,245,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,362
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_do_send_packet(struct qeth_card *card, struct qeth_qdio_out_q *queue, struct sk_buff *skb, struct qeth_hdr *hdr, int elements_needed) { struct qeth_qdio_out_buffer *buffer; int start_index; int flush_count = 0; int do_pack = 0; int tmp; int rc = 0; /* spin until we get the queue ... */ while (atom...
132,453,742,886,285,240,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,363
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_do_send_packet_fast(struct qeth_card *card, struct qeth_qdio_out_q *queue, struct sk_buff *skb, struct qeth_hdr *hdr, int elements_needed, int offset, int hd_len) { struct qeth_qdio_out_buffer *buffer; int index; /* spin until we get the queue ... */ while (atomic_cmpxchg(&queue->state, QETH_OUT_Q_U...
101,564,251,008,892,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,364
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_do_start_thread(struct qeth_card *card, unsigned long thread) { unsigned long flags; int rc = 0; spin_lock_irqsave(&card->thread_mask_lock, flags); QETH_CARD_TEXT_(card, 4, " %02x%02x%02x", (u8) card->thread_start_mask, (u8) card->thread_allowed_mask, (u8) card->thread_running_mask); rc ...
336,450,836,841,163,140,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,365
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_fill_ipacmd_header(struct qeth_card *card, struct qeth_ipa_cmd *cmd, __u8 command, enum qeth_prot_versions prot) { memset(cmd, 0, sizeof(struct qeth_ipa_cmd)); cmd->hdr.command = command; cmd->hdr.initiator = IPA_CMD_INITIATOR_HOST; cmd->hdr.seqno = card->seqno.ipa; cmd->hdr.adapter_type = qet...
186,559,724,697,696,600,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,366
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline struct qeth_buffer_pool_entry *qeth_find_free_buffer_pool_entry( struct qeth_card *card) { struct list_head *plh; struct qeth_buffer_pool_entry *entry; int i, free; struct page *page; if (list_empty(&card->qdio.in_buf_pool.entry_list)) return NULL; list_for_each(plh, &card->qdio.in_buf_pool.en...
85,534,800,195,342,170,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,367
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_flush_buffers(struct qeth_qdio_out_q *queue, int index, int count) { struct qeth_qdio_out_buffer *buf; int rc; int i; unsigned int qdio_flags; for (i = index; i < index + count; ++i) { int bidx = i % QDIO_MAX_BUFFERS_PER_Q; buf = queue->bufs[bidx]; buf->buffer->element[buf->next_e...
98,322,289,945,213,330,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,368
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_flush_buffers_on_no_pci(struct qeth_qdio_out_q *queue) { struct qeth_qdio_out_buffer *buffer; buffer = queue->bufs[queue->next_buf_to_fill]; if ((atomic_read(&buffer->state) == QETH_QDIO_BUF_EMPTY) && (buffer->next_element_to_fill > 0)) { /* it's a packing buffer */ atomic_set(&buffer->state...
33,248,803,783,666,467,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,369
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_free_buffer_pool(struct qeth_card *card) { struct qeth_buffer_pool_entry *pool_entry, *tmp; int i = 0; list_for_each_entry_safe(pool_entry, tmp, &card->qdio.init_pool.entry_list, init_list){ for (i = 0; i < QETH_MAX_BUFFER_ELEMENTS(card); ++i) free_page((unsigned long)pool_entry->elements[...
298,199,505,163,240,970,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,370
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline void qeth_free_cq(struct qeth_card *card) { if (card->qdio.c_q) { --card->qdio.no_in_queues; kfree(card->qdio.c_q); card->qdio.c_q = NULL; } kfree(card->qdio.out_bufstates); card->qdio.out_bufstates = NULL; }
69,713,326,814,738,090,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,371
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_free_qdio_buffers(struct qeth_card *card) { int i, j; if (atomic_xchg(&card->qdio.state, QETH_QDIO_UNINITIALIZED) == QETH_QDIO_UNINITIALIZED) return; qeth_free_cq(card); cancel_delayed_work_sync(&card->buffer_reclaim_work); for (j = 0; j < QDIO_MAX_BUFFERS_PER_Q; ++j) { if (card->qdio.in_q...
304,967,501,899,259,530,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,372
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static struct qeth_cmd_buffer *qeth_get_adapter_cmd(struct qeth_card *card, __u32 command, __u32 cmdlen) { struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; iob = qeth_get_ipacmd_buffer(card, IPA_CMD_SETADAPTERPARMS, QETH_PROT_IPV4); cmd = (struct qeth_ipa_cmd *)(iob->data+IPA_PDU_HEADER_SIZE); cm...
46,284,240,800,441,030,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,373
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static struct qeth_cmd_buffer *qeth_get_buffer(struct qeth_channel *channel) { struct qeth_cmd_buffer *buffer = NULL; unsigned long flags; spin_lock_irqsave(&channel->iob_lock, flags); buffer = __qeth_get_buffer(channel); spin_unlock_irqrestore(&channel->iob_lock, flags); return buffer; }
48,675,624,334,124,000,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,374
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline const char *qeth_get_cardname(struct qeth_card *card) { if (card->info.guestlan) { switch (card->info.type) { case QETH_CARD_TYPE_OSD: return " Virtual NIC QDIO"; case QETH_CARD_TYPE_IQD: return " Virtual NIC Hiper"; case QETH_CARD_TYPE_OSM: return " Virtual NIC QDIO - OSM"; case QETH_...
39,414,981,928,897,250,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,375
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
const char *qeth_get_cardname_short(struct qeth_card *card) { if (card->info.guestlan) { switch (card->info.type) { case QETH_CARD_TYPE_OSD: return "Virt.NIC QDIO"; case QETH_CARD_TYPE_IQD: return "Virt.NIC Hiper"; case QETH_CARD_TYPE_OSM: return "Virt.NIC OSM"; case QETH_CARD_TYPE_OSX: return "V...
327,761,242,173,732,000,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,376
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static debug_info_t *qeth_get_dbf_entry(char *name) { struct qeth_dbf_entry *entry; debug_info_t *rc = NULL; mutex_lock(&qeth_dbf_list_mutex); list_for_each_entry(entry, &qeth_dbf_list, dbf_list) { if (strcmp(entry->dbf_name, name) == 0) { rc = entry->dbf_info; break; } } mutex_unlock(&qeth_dbf_list_mu...
238,560,127,559,588,200,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,377
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_get_elements_for_frags(struct sk_buff *skb) { int cnt, length, e, elements = 0; struct skb_frag_struct *frag; char *data; for (cnt = 0; cnt < skb_shinfo(skb)->nr_frags; cnt++) { frag = &skb_shinfo(skb)->frags[cnt]; data = (char *)page_to_phys(skb_frag_page(frag)) + frag->page_offset; length = fra...
33,531,719,354,833,078,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,378
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_get_elements_no(struct qeth_card *card, struct sk_buff *skb, int elems) { int dlen = skb->len - skb->data_len; int elements_needed = PFN_UP((unsigned long)skb->data + dlen - 1) - PFN_DOWN((unsigned long)skb->data); elements_needed += qeth_get_elements_for_frags(skb); if ((elements_needed + elems...
297,476,281,086,407,600,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,379
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_get_initial_mtu_for_card(struct qeth_card *card) { switch (card->info.type) { case QETH_CARD_TYPE_UNKNOWN: return 1500; case QETH_CARD_TYPE_IQD: return card->info.max_mtu; case QETH_CARD_TYPE_OSD: switch (card->info.link_type) { case QETH_LINK_TYPE_HSTR: case QETH_LINK_TYPE_LANE_TR:...
296,724,323,440,727,240,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,380
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline __u8 qeth_get_ipa_adp_type(enum qeth_link_types link_type) { switch (link_type) { case QETH_LINK_TYPE_HSTR: return 2; default: return 1; } }
247,287,270,945,952,450,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,381
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
struct qeth_cmd_buffer *qeth_get_ipacmd_buffer(struct qeth_card *card, enum qeth_ipa_cmds ipacmd, enum qeth_prot_versions prot) { struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; iob = qeth_wait_for_buffer(&card->write); cmd = (struct qeth_ipa_cmd *)(iob->data+IPA_PDU_HEADER_SIZE); qeth_fill_ipacmd_header...
85,847,431,914,616,370,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,382
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_get_mtu_outof_framesize(int framesize) { switch (framesize) { case 0x4000: return 8192; case 0x6000: return 16384; case 0xa000: return 32768; case 0xffff: return 57344; default: return 0; } }
112,631,391,365,792,300,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,383
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_get_priority_queue(struct qeth_card *card, struct sk_buff *skb, int ipv, int cast_type) { if (!ipv && (card->info.type == QETH_CARD_TYPE_OSD || card->info.type == QETH_CARD_TYPE_OSX)) return card->qdio.default_out_queue; switch (card->qdio.no_out_queues) { case 4: if (cast_type && card->info.i...
14,139,459,062,705,804,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,384
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_get_problem(struct ccw_device *cdev, struct irb *irb) { int dstat, cstat; char *sense; struct qeth_card *card; sense = (char *) irb->ecw; cstat = irb->scsw.cmd.cstat; dstat = irb->scsw.cmd.dstat; card = CARD_FROM_CDEV(cdev); if (cstat & (SCHN_STAT_CHN_CTRL_CHK | SCHN_STAT_INTF_CTRL_CHK | ...
327,819,839,750,491,060,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,385
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_get_qdio_q_format(struct qeth_card *card) { switch (card->info.type) { case QETH_CARD_TYPE_IQD: return 2; default: return 0; } }
322,537,375,664,517,360,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,386
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_get_reply(struct qeth_reply *reply) { WARN_ON(atomic_read(&reply->refcnt) <= 0); atomic_inc(&reply->refcnt); }
13,413,023,011,624,400,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,387
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
struct net_device_stats *qeth_get_stats(struct net_device *dev) { struct qeth_card *card; card = dev->ml_priv; QETH_CARD_TEXT(card, 5, "getstat"); return &card->stats; }
128,313,791,779,610,730,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,388
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_halt_channel(struct qeth_channel *channel) { unsigned long flags; struct qeth_card *card; int rc; card = CARD_FROM_CDEV(channel->ccwdev); QETH_CARD_TEXT(card, 3, "haltch"); spin_lock_irqsave(get_ccwdev_lock(channel->ccwdev), flags); rc = ccw_device_halt(channel->ccwdev, QETH_HALT_CHANNEL_PARM); ...
195,701,667,635,755,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,389
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_halt_channels(struct qeth_card *card) { int rc1 = 0, rc2 = 0, rc3 = 0; QETH_CARD_TEXT(card, 3, "haltchs"); rc1 = qeth_halt_channel(&card->read); rc2 = qeth_halt_channel(&card->write); rc3 = qeth_halt_channel(&card->data); if (rc1) return rc1; if (rc2) return rc2; return rc3; }
223,424,682,628,449,650,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,390
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_hdr_chk_and_bounce(struct sk_buff *skb, struct qeth_hdr **hdr, int len) { int hroom, inpage, rest; if (((unsigned long)skb->data & PAGE_MASK) != (((unsigned long)skb->data + len - 1) & PAGE_MASK)) { hroom = skb_headroom(skb); inpage = PAGE_SIZE - ((unsigned long) skb->data % PAGE_SIZE); rest = le...
123,042,449,506,603,680,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,391
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_hw_trap(struct qeth_card *card, enum qeth_diags_trap_action action) { struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; QETH_DBF_TEXT(SETUP, 2, "diagtrap"); iob = qeth_get_ipacmd_buffer(card, IPA_CMD_SET_DIAG_ASS, 0); cmd = (struct qeth_ipa_cmd *)(iob->data+IPA_PDU_HEADER_SIZE); cmd->data.diagass.s...
136,301,284,399,761,470,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,392
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_hw_trap_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; __u16 rc; cmd = (struct qeth_ipa_cmd *)data; rc = cmd->hdr.return_code; if (rc) QETH_CARD_TEXT_(card, 2, "trapc:%x", rc); return 0; }
297,388,080,981,903,700,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,393
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_idx_activate_channel(struct qeth_channel *channel, void (*idx_reply_cb)(struct qeth_channel *, struct qeth_cmd_buffer *)) { struct qeth_card *card; struct qeth_cmd_buffer *iob; unsigned long flags; __u16 temp; __u8 tmp; int rc; struct ccw_dev_id temp_devid; card = CARD_FROM_CDEV(channel->c...
195,082,960,733,482,000,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,394
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_idx_activate_get_answer(struct qeth_channel *channel, void (*idx_reply_cb)(struct qeth_channel *, struct qeth_cmd_buffer *)) { struct qeth_cmd_buffer *iob; unsigned long flags; int rc; struct qeth_card *card; QETH_DBF_TEXT(SETUP, 2, "idxanswr"); card = CARD_FROM_CDEV(channel->ccwdev); iob =...
238,565,876,975,455,470,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,395
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_idx_read_cb(struct qeth_channel *channel, struct qeth_cmd_buffer *iob) { struct qeth_card *card; __u16 temp; QETH_DBF_TEXT(SETUP , 2, "idxrdcb"); if (channel->state == CH_STATE_DOWN) { channel->state = CH_STATE_ACTIVATING; goto out; } card = CARD_FROM_CDEV(channel->ccwdev); if (qeth_chec...
124,972,147,806,352,250,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,396
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_idx_write_cb(struct qeth_channel *channel, struct qeth_cmd_buffer *iob) { struct qeth_card *card; __u16 temp; QETH_DBF_TEXT(SETUP , 2, "idxwrcb"); if (channel->state == CH_STATE_DOWN) { channel->state = CH_STATE_ACTIVATING; goto out; } card = CARD_FROM_CDEV(channel->ccwdev); if (!(QETH_...
305,726,404,355,113,150,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,397
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_init_func_level(struct qeth_card *card) { switch (card->info.type) { case QETH_CARD_TYPE_IQD: card->info.func_level = QETH_IDX_FUNC_LEVEL_IQD; break; case QETH_CARD_TYPE_OSD: case QETH_CARD_TYPE_OSN: card->info.func_level = QETH_IDX_FUNC_LEVEL_OSD; break; default: break; } }
260,750,484,724,052,200,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,398
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_init_input_buffer(struct qeth_card *card, struct qeth_qdio_buffer *buf) { struct qeth_buffer_pool_entry *pool_entry; int i; if ((card->options.cq == QETH_CQ_ENABLED) && (!buf->rx_skb)) { buf->rx_skb = dev_alloc_skb(QETH_RX_PULL_LEN + ETH_HLEN); if (!buf->rx_skb) return 1; } pool_entry = ...
312,055,072,384,953,260,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,399
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_init_qdio_info(struct qeth_card *card) { QETH_DBF_TEXT(SETUP, 4, "intqdinf"); atomic_set(&card->qdio.state, QETH_QDIO_UNINITIALIZED); /* inbound */ card->qdio.in_buf_size = QETH_IN_BUF_SIZE_DEFAULT; if (card->info.type == QETH_CARD_TYPE_IQD) card->qdio.init_pool.buf_count = QETH_IN_BUF_COUNT_HSD...
229,582,441,111,561,120,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,400
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_init_qdio_out_buf(struct qeth_qdio_out_q *q, int bidx) { int rc; struct qeth_qdio_out_buffer *newbuf; rc = 0; newbuf = kmem_cache_zalloc(qeth_qdio_outbuf_cache, GFP_ATOMIC); if (!newbuf) { rc = -ENOMEM; goto out; } newbuf->buffer = &q->qdio_bufs[bidx]; skb_queue_head_init(&newbuf->skb_list)...
229,821,738,077,812,320,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,401
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_init_qdio_queues(struct qeth_card *card) { int i, j; int rc; QETH_DBF_TEXT(SETUP, 2, "initqdqs"); /* inbound queue */ memset(card->qdio.in_q->qdio_bufs, 0, QDIO_MAX_BUFFERS_PER_Q * sizeof(struct qdio_buffer)); qeth_initialize_working_pool_list(card); /*give only as many buffers to hardware as ...
281,318,234,099,737,840,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,402
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_init_tokens(struct qeth_card *card) { card->token.issuer_rm_w = 0x00010103UL; card->token.cm_filter_w = 0x00010108UL; card->token.cm_connection_w = 0x0001010aUL; card->token.ulp_filter_w = 0x0001010bUL; card->token.ulp_connection_w = 0x0001010dUL; }
147,993,153,987,102,370,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,403
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_initialize_working_pool_list(struct qeth_card *card) { struct qeth_buffer_pool_entry *entry; QETH_CARD_TEXT(card, 5, "inwrklst"); list_for_each_entry(entry, &card->qdio.init_pool.entry_list, init_list) { qeth_put_buffer_pool_entry(card, entry); } }
107,688,821,256,921,130,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,404
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_irq(struct ccw_device *cdev, unsigned long intparm, struct irb *irb) { int rc; int cstat, dstat; struct qeth_cmd_buffer *buffer; struct qeth_channel *channel; struct qeth_card *card; struct qeth_cmd_buffer *iob; __u8 index; if (__qeth_check_irb_error(cdev, intparm, irb)) return; cstat = i...
87,795,242,405,428,800,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,405
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline int qeth_is_cq(struct qeth_card *card, unsigned int queue) { return card->options.cq == QETH_CQ_ENABLED && card->qdio.c_q != NULL && queue != 0 && queue == card->qdio.no_in_queues - 1; }
189,592,363,893,134,250,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,406
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_issue_ipa_msg(struct qeth_ipa_cmd *cmd, int rc, struct qeth_card *card) { char *ipa_name; int com = cmd->hdr.command; ipa_name = qeth_get_ipa_cmd_name(com); if (rc) QETH_DBF_MESSAGE(2, "IPA: %s(x%X) for %s/%s returned " "x%X \"%s\"\n", ipa_name, com, dev_name(&card->gdev->dev), QETH...
269,631,436,558,941,800,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,407
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_issue_next_read(struct qeth_card *card) { int rc; struct qeth_cmd_buffer *iob; QETH_CARD_TEXT(card, 5, "issnxrd"); if (card->read.state != CH_STATE_UP) return -EIO; iob = qeth_get_buffer(&card->read); if (!iob) { dev_warn(&card->gdev->dev, "The qeth device driver " "failed to recover an er...
93,233,968,856,160,030,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,408
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_mdio_read(struct net_device *dev, int phy_id, int regnum) { struct qeth_card *card = dev->ml_priv; int rc = 0; switch (regnum) { case MII_BMCR: /* Basic mode control register */ rc = BMCR_FULLDPLX; if ((card->info.link_type != QETH_LINK_TYPE_GBIT_ETH) && (card->info.link_type != QETH_LINK_TYPE_O...
43,364,328,735,004,660,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,409
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_mpc_initialize(struct qeth_card *card) { int rc; QETH_DBF_TEXT(SETUP, 2, "mpcinit"); rc = qeth_issue_next_read(card); if (rc) { QETH_DBF_TEXT_(SETUP, 2, "1err%d", rc); return rc; } rc = qeth_cm_enable(card); if (rc) { QETH_DBF_TEXT_(SETUP, 2, "2err%d", rc); goto out_qdio; } rc = qeth_...
65,956,761,069,800,870,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,410
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_notify_skbs(struct qeth_qdio_out_q *q, struct qeth_qdio_out_buffer *buf, enum iucv_tx_notify notification) { struct sk_buff *skb; if (skb_queue_empty(&buf->skb_list)) goto out; skb = skb_peek(&buf->skb_list); while (skb) { QETH_CARD_TEXT_(q->card, 5, "skbn%d", notification); QETH_CARD_TE...
286,049,297,564,199,140,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,411
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_prepare_control_data(struct qeth_card *card, int len, struct qeth_cmd_buffer *iob) { qeth_setup_ccw(&card->write, iob->data, len); iob->callback = qeth_release_buffer; memcpy(QETH_TRANSPORT_HEADER_SEQ_NO(iob->data), &card->seqno.trans_hdr, QETH_SEQ_NO_LENGTH); card->seqno.trans_hdr++; memcpy(Q...
72,572,871,512,863,710,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,412
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_prepare_ipa_cmd(struct qeth_card *card, struct qeth_cmd_buffer *iob, char prot_type) { memcpy(iob->data, IPA_PDU_HEADER, IPA_PDU_HEADER_SIZE); memcpy(QETH_IPA_CMD_PROT_TYPE(iob->data), &prot_type, 1); memcpy(QETH_IPA_CMD_DEST_ADDR(iob->data), &card->token.ulp_connection_r, QETH_MPC_TOKEN_LENGTH);...
93,217,342,463,808,800,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,413
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_print_status_message(struct qeth_card *card) { switch (card->info.type) { case QETH_CARD_TYPE_OSD: case QETH_CARD_TYPE_OSM: case QETH_CARD_TYPE_OSX: /* VM will use a non-zero first character * to indicate a HiperSockets like reporting * of the level OSA sets the first character to zero * */ i...
73,879,274,393,610,570,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,414
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_print_status_no_portname(struct qeth_card *card) { if (card->info.portname[0]) dev_info(&card->gdev->dev, "Device is a%s " "card%s%s%s\nwith link type %s " "(no portname needed by interface).\n", qeth_get_cardname(card), (card->info.mcl_level[0]) ? " (level: " : "...
93,520,260,621,955,380,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,415
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_print_status_with_portname(struct qeth_card *card) { char dbf_text[15]; int i; sprintf(dbf_text, "%s", card->info.portname + 1); for (i = 0; i < 8; i++) dbf_text[i] = (char) _ebcasc[(__u8) dbf_text[i]]; dbf_text[8] = 0; dev_info(&card->gdev->dev, "Device is a%s card%s%s%s\n" "with l...
180,159,116,309,966,580,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,416
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_put_reply(struct qeth_reply *reply) { WARN_ON(atomic_read(&reply->refcnt) <= 0); if (atomic_dec_and_test(&reply->refcnt)) kfree(reply); }
253,166,340,806,266,430,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,417
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_qdio_activate(struct qeth_card *card) { QETH_DBF_TEXT(SETUP, 3, "qdioact"); return qdio_activate(CARD_DDEV(card)); }
247,808,224,451,621,040,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,418
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_qdio_clear_card(struct qeth_card *card, int use_halt) { int rc = 0; QETH_CARD_TEXT(card, 3, "qdioclr"); switch (atomic_cmpxchg(&card->qdio.state, QETH_QDIO_ESTABLISHED, QETH_QDIO_CLEANING)) { case QETH_QDIO_ESTABLISHED: if (card->info.type == QETH_CARD_TYPE_IQD) rc = qdio_shutdown(CARD_DDEV(card), ...
72,594,228,927,558,600,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,419
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_qdio_cq_handler(struct qeth_card *card, unsigned int qdio_err, unsigned int queue, int first_element, int count) { struct qeth_qdio_q *cq = card->qdio.c_q; int i; int rc; if (!qeth_is_cq(card, queue)) goto out; QETH_CARD_TEXT_(card, 5, "qcqhe%d", first_element); QETH_CARD_TEXT_(card, 5, "...
119,006,411,567,048,360,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,420
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_qdio_establish(struct qeth_card *card) { struct qdio_initialize init_data; char *qib_param_field; struct qdio_buffer **in_sbal_ptrs; void (**queue_start_poll) (struct ccw_device *, int, unsigned long); struct qdio_buffer **out_sbal_ptrs; int i, j, k; int rc = 0; QETH_DBF_TEXT(SETUP, 2, "qdioest...
279,952,568,823,462,600,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,421
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline void qeth_qdio_establish_cq(struct qeth_card *card, struct qdio_buffer **in_sbal_ptrs, void (**queue_start_poll) (struct ccw_device *, int, unsigned long)) { int i; if (card->options.cq == QETH_CQ_ENABLED) { int offset = QDIO_MAX_BUFFERS_PER_Q * (card->qdio.no_in_queues - 1); i = QDIO_MAX...
313,870,316,726,041,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,422
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static inline void qeth_qdio_handle_aob(struct qeth_card *card, unsigned long phys_aob_addr) { struct qaob *aob; struct qeth_qdio_out_buffer *buffer; enum iucv_tx_notify notification; aob = (struct qaob *) phys_to_virt(phys_aob_addr); QETH_CARD_TEXT(card, 5, "haob"); QETH_CARD_TEXT_(card, 5, "%lx", phys_aob_ad...
244,690,083,485,866,570,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,423
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_qdio_input_handler(struct ccw_device *ccwdev, unsigned int qdio_err, unsigned int queue, int first_elem, int count, unsigned long card_ptr) { struct qeth_card *card = (struct qeth_card *)card_ptr; QETH_CARD_TEXT_(card, 2, "qihq%d", queue); QETH_CARD_TEXT_(card, 2, "qiec%d", qdio_err); if (qeth_is_cq...
9,362,059,143,386,661,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,424
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_qdio_output_handler(struct ccw_device *ccwdev, unsigned int qdio_error, int __queue, int first_element, int count, unsigned long card_ptr) { struct qeth_card *card = (struct qeth_card *) card_ptr; struct qeth_qdio_out_q *queue = card->qdio.out_qs[__queue]; struct qeth_qdio_out_buffer *buffer; i...
220,520,229,067,934,680,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,425
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_query_ipassists(struct qeth_card *card, enum qeth_prot_versions prot) { int rc; struct qeth_cmd_buffer *iob; QETH_DBF_TEXT_(SETUP, 2, "qipassi%i", prot); iob = qeth_get_ipacmd_buffer(card, IPA_CMD_QIPASSIST, prot); rc = qeth_send_ipa_cmd(card, iob, qeth_query_ipassists_cb, NULL); return rc; }
43,067,167,325,359,110,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,426
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_query_ipassists_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; QETH_DBF_TEXT(SETUP, 2, "qipasscb"); cmd = (struct qeth_ipa_cmd *) data; switch (cmd->hdr.return_code) { case IPA_RC_NOTSUPP: case IPA_RC_L2_UNSUPPORTED_CMD: QETH_DBF_TEXT(SE...
51,300,516,647,586,430,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,427
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_query_setadapterparms(struct qeth_card *card) { int rc; struct qeth_cmd_buffer *iob; QETH_CARD_TEXT(card, 3, "queryadp"); iob = qeth_get_adapter_cmd(card, IPA_SETADP_QUERY_COMMANDS_SUPPORTED, sizeof(struct qeth_ipacmd_setadpparms)); rc = qeth_send_ipa_cmd(card, iob, qeth_query_setadapterparms_cb, ...
134,106,603,070,524,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,428
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_query_setdiagass(struct qeth_card *card) { struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; QETH_DBF_TEXT(SETUP, 2, "qdiagass"); iob = qeth_get_ipacmd_buffer(card, IPA_CMD_SET_DIAG_ASS, 0); cmd = (struct qeth_ipa_cmd *)(iob->data+IPA_PDU_HEADER_SIZE); cmd->data.diagass.subcmd_len = 16; ...
116,052,977,900,305,610,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,429
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_query_setdiagass_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; __u16 rc; cmd = (struct qeth_ipa_cmd *)data; rc = cmd->hdr.return_code; if (rc) QETH_CARD_TEXT_(card, 2, "diagq:%x", rc); else card->info.diagass_support = cmd->data.diagass...
130,547,028,297,934,080,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,430
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_queue_input_buffer(struct qeth_card *card, int index) { struct qeth_qdio_q *queue = card->qdio.in_q; struct list_head *lh; int count; int i; int rc; int newcount = 0; count = (index < queue->next_buf_to_init)? card->qdio.in_buf_pool.buf_count - (queue->next_buf_to_init - index) : card->qdio.in_b...
332,344,623,517,926,730,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,431
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_read_conf_data(struct qeth_card *card, void **buffer, int *length) { struct ciw *ciw; char *rcd_buf; int ret; struct qeth_channel *channel = &card->data; unsigned long flags; /* * scan for RCD command in extended SenseID data */ ciw = ccw_device_get_ciw(channel->ccwdev, CIW_TYPE_RC...
27,328,089,327,320,440,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,432
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_realloc_buffer_pool(struct qeth_card *card, int bufcnt) { QETH_CARD_TEXT(card, 2, "realcbp"); if ((card->state != CARD_STATE_DOWN) && (card->state != CARD_STATE_RECOVER)) return -EPERM; /* TODO: steel/add buffers from/to a running card's buffer pool (?) */ qeth_clear_working_pool_list(card); qeth...
131,345,508,694,777,160,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,433
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_register_dbf_views(void) { int ret; int x; for (x = 0; x < QETH_DBF_INFOS; x++) { /* register the areas */ qeth_dbf[x].id = debug_register(qeth_dbf[x].name, qeth_dbf[x].pages, qeth_dbf[x].areas, qeth_dbf[x].len); if (qeth_dbf[x].id == NULL) { qeth_unregister_dbf_views(); ...
93,548,535,146,108,120,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,434
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_release_buffer(struct qeth_channel *channel, struct qeth_cmd_buffer *iob) { unsigned long flags; QETH_CARD_TEXT(CARD_FROM_CDEV(channel->ccwdev), 6, "relbuff"); spin_lock_irqsave(&channel->iob_lock, flags); memset(iob->data, 0, QETH_BUFSIZE); iob->state = BUF_STATE_FREE; iob->callback = qeth_send_cont...
94,527,812,963,157,940,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,435
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_release_skbs(struct qeth_qdio_out_buffer *buf) { struct sk_buff *skb; struct iucv_sock *iucv; int notify_general_error = 0; if (atomic_read(&buf->state) == QETH_QDIO_BUF_PENDING) notify_general_error = 1; /* release may never happen from within CQ tasklet scope */ WARN_ON_ONCE(atomic_read(&bu...
100,047,727,985,307,020,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,436
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_send_control_data(struct qeth_card *card, int len, struct qeth_cmd_buffer *iob, int (*reply_cb)(struct qeth_card *, struct qeth_reply *, unsigned long), void *reply_param) { int rc; unsigned long flags; struct qeth_reply *reply = NULL; unsigned long timeout, event_timeout; struct qeth_ipa_cmd *cm...
303,536,041,061,749,230,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,437
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_send_control_data_cb(struct qeth_channel *channel, struct qeth_cmd_buffer *iob) { struct qeth_card *card; struct qeth_reply *reply, *r; struct qeth_ipa_cmd *cmd; unsigned long flags; int keep_reply; int rc = 0; card = CARD_FROM_CDEV(channel->ccwdev); QETH_CARD_TEXT(card, 4, "sndctlcb"); r...
42,232,502,568,010,753,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,438
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_send_ipa_cmd(struct qeth_card *card, struct qeth_cmd_buffer *iob, int (*reply_cb)(struct qeth_card *, struct qeth_reply*, unsigned long), void *reply_param) { int rc; char prot_type; QETH_CARD_TEXT(card, 4, "sendipa"); if (card->options.layer2) if (card->info.type == QETH_CARD_TYPE_OSN) prot_...
99,639,483,444,918,450,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,439
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_send_ipa_snmp_cmd(struct qeth_card *card, struct qeth_cmd_buffer *iob, int len, int (*reply_cb)(struct qeth_card *, struct qeth_reply *, unsigned long), void *reply_param) { u16 s1, s2; QETH_CARD_TEXT(card, 4, "sendsnmp"); memcpy(iob->data, IPA_PDU_HEADER, IPA_PDU_HEADER_SIZE); memcpy(QET...
313,450,511,579,094,700,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,440
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_send_startlan(struct qeth_card *card) { int rc; struct qeth_cmd_buffer *iob; QETH_DBF_TEXT(SETUP, 2, "strtlan"); iob = qeth_get_ipacmd_buffer(card, IPA_CMD_STARTLAN, 0); rc = qeth_send_ipa_cmd(card, iob, NULL, NULL); return rc; }
261,938,741,262,977,700,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,441
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_set_access_ctrl_online(struct qeth_card *card, int fallback) { int rc = 0; QETH_CARD_TEXT(card, 4, "setactlo"); if ((card->info.type == QETH_CARD_TYPE_OSD || card->info.type == QETH_CARD_TYPE_OSX) && qeth_adp_supported(card, IPA_SETADP_SET_ACCESS_CONTROL)) { rc = qeth_setadpparms_set_access_...
20,285,668,639,575,590,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,442
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_set_allowed_threads(struct qeth_card *card, unsigned long threads, int clear_start_mask) { unsigned long flags; spin_lock_irqsave(&card->thread_mask_lock, flags); card->thread_allowed_mask = threads; if (clear_start_mask) card->thread_start_mask &= threads; spin_unlock_irqrestore(&card->thread_mas...
143,873,929,637,210,860,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,443
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_set_intial_options(struct qeth_card *card) { card->options.route4.type = NO_ROUTER; card->options.route6.type = NO_ROUTER; card->options.fake_broadcast = 0; card->options.add_hhlen = DEFAULT_ADD_HHLEN; card->options.performance_stats = 0; card->options.rx_sg_cb = QETH_RX_SG_CB; card->options.iso...
299,240,102,024,174,650,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,444
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_set_multiple_write_queues(struct qeth_card *card) { if ((atomic_read(&card->qdio.state) != QETH_QDIO_UNINITIALIZED) && (card->qdio.no_out_queues == 1)) { qeth_free_qdio_buffers(card); card->qdio.default_out_queue = 2; } card->qdio.no_out_queues = 4; }
142,135,233,771,342,920,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,445
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_set_recovery_task(struct qeth_card *card) { card->recovery_task = current; }
129,296,025,015,997,730,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,446
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static void qeth_set_single_write_queues(struct qeth_card *card) { if ((atomic_read(&card->qdio.state) != QETH_QDIO_UNINITIALIZED) && (card->qdio.no_out_queues == 4)) qeth_free_qdio_buffers(card); card->qdio.no_out_queues = 1; if (card->qdio.default_out_queue != 0) dev_info(&card->gdev->dev, "Priority Queu...
109,932,458,833,706,620,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,447
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_set_thread_start_bit(struct qeth_card *card, unsigned long thread) { unsigned long flags; spin_lock_irqsave(&card->thread_mask_lock, flags); if (!(card->thread_allowed_mask & thread) || (card->thread_start_mask & thread)) { spin_unlock_irqrestore(&card->thread_mask_lock, flags); return ...
172,726,534,300,442,900,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,448
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
void qeth_setadp_promisc_mode(struct qeth_card *card) { enum qeth_ipa_promisc_modes mode; struct net_device *dev = card->dev; struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; QETH_CARD_TEXT(card, 4, "setprom"); if (((dev->flags & IFF_PROMISC) && (card->info.promisc_mode == SET_PROMISC_MODE_ON)) || ...
146,590,025,167,077,380,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,449
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_setadp_promisc_mode_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; struct qeth_ipacmd_setadpparms *setparms; QETH_CARD_TEXT(card, 4, "prmadpcb"); cmd = (struct qeth_ipa_cmd *) data; setparms = &(cmd->data.setadapterparms); qeth_default_set...
302,811,076,661,137,600,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,450
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
int qeth_setadpparms_change_macaddr(struct qeth_card *card) { int rc; struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; QETH_CARD_TEXT(card, 4, "chgmac"); iob = qeth_get_adapter_cmd(card, IPA_SETADP_ALTER_MAC_ADDRESS, sizeof(struct qeth_ipacmd_setadpparms)); cmd = (struct qeth_ipa_cmd *)(iob->data+I...
112,589,993,394,573,270,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381
30,451
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
static int qeth_setadpparms_change_macaddr_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; QETH_CARD_TEXT(card, 4, "chgmaccb"); cmd = (struct qeth_ipa_cmd *) data; if (!card->options.layer2 || !(card->info.mac_bits & QETH_LAYER2_MAC_READ)) { memcpy(car...
226,691,363,887,966,100,000,000,000,000,000,000,000
qeth_core_main.c
172,045,772,512,734,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
https://nvd.nist.gov/vuln/detail/CVE-2013-6381