idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
30,808 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static int check_memory_region_flags(struct kvm_userspace_memory_region *mem)
{
u32 valid_flags = KVM_MEM_LOG_DIRTY_PAGES;
#ifdef KVM_CAP_READONLY_MEM
valid_flags |= KVM_MEM_READONLY;
#endif
if (mem->flags & ~valid_flags)
return -EINVAL;
return 0;
}
| 119,230,240,547,792,200,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,809 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static unsigned long gfn_to_hva_many(struct kvm_memory_slot *slot, gfn_t gfn,
gfn_t *nr_pages)
{
return __gfn_to_hva_many(slot, gfn, nr_pages, true);
}
| 229,249,325,182,481,120,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,810 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | unsigned long gfn_to_hva_memslot(struct kvm_memory_slot *slot,
gfn_t gfn)
{
return gfn_to_hva_many(slot, gfn, NULL);
}
| 323,899,747,797,028,100,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,811 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static unsigned long gfn_to_hva_read(struct kvm *kvm, gfn_t gfn)
{
return __gfn_to_hva_many(gfn_to_memslot(kvm, gfn), gfn, NULL, false);
}
| 293,798,555,471,504,100,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,812 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn)
{
pfn_t pfn;
pfn = gfn_to_pfn(kvm, gfn);
return kvm_pfn_to_page(pfn);
}
| 264,508,440,964,694,220,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,813 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | pfn_t gfn_to_pfn_memslot(struct kvm_memory_slot *slot, gfn_t gfn)
{
return __gfn_to_pfn_memslot(slot, gfn, false, NULL, true, NULL);
}
| 10,124,888,299,740,731,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,814 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | pfn_t gfn_to_pfn_memslot_atomic(struct kvm_memory_slot *slot, gfn_t gfn)
{
return __gfn_to_pfn_memslot(slot, gfn, true, NULL, true, NULL);
}
| 126,166,840,870,878,830,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,815 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static pfn_t hva_to_pfn(unsigned long addr, bool atomic, bool *async,
bool write_fault, bool *writable)
{
struct vm_area_struct *vma;
pfn_t pfn = 0;
int npages;
/* we can do it either atomically or asynchronously, not both */
BUG_ON(atomic && async);
if (hva_to_pfn_fast(addr, atomic, async, write_fault, writ... | 125,234,237,148,434,400,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,816 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static bool hva_to_pfn_fast(unsigned long addr, bool atomic, bool *async,
bool write_fault, bool *writable, pfn_t *pfn)
{
struct page *page[1];
int npages;
if (!(async || atomic))
return false;
/*
* Fast pin a writable pfn only if it is a write fault request
* or the caller allows to map a writable p... | 263,042,555,641,550,370,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,817 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static int hva_to_pfn_slow(unsigned long addr, bool *async, bool write_fault,
bool *writable, pfn_t *pfn)
{
struct page *page[1];
int npages = 0;
might_sleep();
if (writable)
*writable = write_fault;
if (async) {
down_read(¤t->mm->mmap_sem);
npages = get_user_page_nowait(current, current->mm,
... | 300,611,507,413,785,000,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,818 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static int kvm_create_dirty_bitmap(struct kvm_memory_slot *memslot)
{
#ifndef CONFIG_S390
unsigned long dirty_bytes = 2 * kvm_dirty_bitmap_bytes(memslot);
memslot->dirty_bitmap = kvm_kvzalloc(dirty_bytes);
if (!memslot->dirty_bitmap)
return -ENOMEM;
#endif /* !CONFIG_S390 */
return 0;
}
| 75,319,088,892,590,790,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,819 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static struct kvm *kvm_create_vm(unsigned long type)
{
int r, i;
struct kvm *kvm = kvm_arch_alloc_vm();
if (!kvm)
return ERR_PTR(-ENOMEM);
r = kvm_arch_init_vm(kvm, type);
if (r)
goto out_err_nodisable;
r = hardware_enable_all();
if (r)
goto out_err_nodisable;
#ifdef CONFIG_HAVE_KVM_IRQCHIP
INIT_HLIST... | 12,658,378,956,016,503,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,820 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static void kvm_destroy_dirty_bitmap(struct kvm_memory_slot *memslot)
{
if (!memslot->dirty_bitmap)
return;
kvm_kvfree(memslot->dirty_bitmap);
memslot->dirty_bitmap = NULL;
}
| 7,403,853,718,585,959,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,821 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static void kvm_destroy_vm(struct kvm *kvm)
{
int i;
struct mm_struct *mm = kvm->mm;
kvm_arch_sync_events(kvm);
raw_spin_lock(&kvm_lock);
list_del(&kvm->vm_list);
raw_spin_unlock(&kvm_lock);
kvm_free_irq_routing(kvm);
for (i = 0; i < KVM_NR_BUSES; i++)
kvm_io_bus_destroy(kvm->buses[i]);
kvm_coalesced_mmio_f... | 193,040,330,062,232,900,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,822 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static long kvm_dev_ioctl(struct file *filp,
unsigned int ioctl, unsigned long arg)
{
long r = -EINVAL;
switch (ioctl) {
case KVM_GET_API_VERSION:
r = -EINVAL;
if (arg)
goto out;
r = KVM_API_VERSION;
break;
case KVM_CREATE_VM:
r = kvm_dev_ioctl_create_vm(arg);
break;
case KVM_CHECK_EXTENSION:
... | 172,580,047,373,729,640,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,823 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_exit(void)
{
kvm_exit_debug();
misc_deregister(&kvm_dev);
kmem_cache_destroy(kvm_vcpu_cache);
kvm_async_pf_deinit();
unregister_syscore_ops(&kvm_syscore_ops);
unregister_reboot_notifier(&kvm_reboot_notifier);
unregister_cpu_notifier(&kvm_cpu_notifier);
on_each_cpu(hardware_disable_nolock, NULL, 1);
kv... | 73,007,729,367,930,550,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,824 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_flush_remote_tlbs(struct kvm *kvm)
{
long dirty_count = kvm->tlbs_dirty;
smp_mb();
if (make_all_cpus_request(kvm, KVM_REQ_TLB_FLUSH))
++kvm->stat.remote_tlb_flush;
cmpxchg(&kvm->tlbs_dirty, dirty_count, 0);
}
| 164,640,991,672,494,870,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,825 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_gfn_to_hva_cache_init(struct kvm *kvm, struct gfn_to_hva_cache *ghc,
gpa_t gpa)
{
struct kvm_memslots *slots = kvm_memslots(kvm);
int offset = offset_in_page(gpa);
gfn_t gfn = gpa >> PAGE_SHIFT;
ghc->gpa = gpa;
ghc->generation = slots->generation;
ghc->memslot = gfn_to_memslot(kvm, gfn);
ghc->h... | 301,470,843,470,165,000,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,826 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_init(void *opaque, unsigned vcpu_size, unsigned vcpu_align,
struct module *module)
{
int r;
int cpu;
r = kvm_arch_init(opaque);
if (r)
goto out_fail;
if (!zalloc_cpumask_var(&cpus_hardware_enabled, GFP_KERNEL)) {
r = -ENOMEM;
goto out_free_0;
}
r = kvm_arch_hardware_setup();
if (r < 0)
go... | 302,112,329,434,066,350,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,827 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_io_bus_insert_dev(struct kvm_io_bus *bus, struct kvm_io_device *dev,
gpa_t addr, int len)
{
bus->range[bus->dev_count++] = (struct kvm_io_range) {
.addr = addr,
.len = len,
.dev = dev,
};
sort(bus->range, bus->dev_count, sizeof(struct kvm_io_range),
kvm_io_bus_sort_cmp, NULL);
return 0;
}
| 73,408,250,253,412,620,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,828 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_io_bus_register_dev(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr,
int len, struct kvm_io_device *dev)
{
struct kvm_io_bus *new_bus, *bus;
bus = kvm->buses[bus_idx];
if (bus->dev_count > NR_IOBUS_DEVS - 1)
return -ENOSPC;
new_bus = kzalloc(sizeof(*bus) + ((bus->dev_count + 1) *
sizeof(st... | 218,297,980,232,250,300,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,829 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_io_bus_unregister_dev(struct kvm *kvm, enum kvm_bus bus_idx,
struct kvm_io_device *dev)
{
int i, r;
struct kvm_io_bus *new_bus, *bus;
bus = kvm->buses[bus_idx];
r = -ENOENT;
for (i = 0; i < bus->dev_count; i++)
if (bus->range[i].dev == dev) {
r = 0;
break;
}
if (r)
return r;
new_b... | 36,570,563,808,806,160,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,830 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | bool kvm_is_mmio_pfn(pfn_t pfn)
{
if (pfn_valid(pfn)) {
int reserved;
struct page *tail = pfn_to_page(pfn);
struct page *head = compound_trans_head(tail);
reserved = PageReserved(head);
if (head != tail) {
/*
* "head" is not a dangling pointer
* (compound_trans_head takes care of that)
* but t... | 176,539,900,278,194,420,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,831 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void *kvm_kvzalloc(unsigned long size)
{
if (size > PAGE_SIZE)
return vzalloc(size);
else
return kzalloc(size, GFP_KERNEL);
}
| 244,788,258,671,469,600,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,832 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | bool kvm_largepages_enabled(void)
{
return largepages_enabled;
}
| 265,104,445,467,688,900,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,833 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static void kvm_mmu_notifier_invalidate_range_end(struct mmu_notifier *mn,
struct mm_struct *mm,
unsigned long start,
unsigned long end)
{
struct kvm *kvm = mmu_notifier_to_kvm(mn);
spin_lock(&kvm->mmu_lock);
/*
* This sequence increase will notify the kvm page fault that
* the page that... | 255,672,913,227,547,700,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,834 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static void kvm_mmu_notifier_invalidate_range_start(struct mmu_notifier *mn,
struct mm_struct *mm,
unsigned long start,
unsigned long end)
{
struct kvm *kvm = mmu_notifier_to_kvm(mn);
int need_tlb_flush = 0, idx;
idx = srcu_read_lock(&kvm->srcu);
spin_lock(&kvm->mmu_lock);
/*
* The... | 253,293,995,241,587,770,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,835 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static void kvm_mmu_notifier_release(struct mmu_notifier *mn,
struct mm_struct *mm)
{
struct kvm *kvm = mmu_notifier_to_kvm(mn);
int idx;
idx = srcu_read_lock(&kvm->srcu);
kvm_arch_flush_shadow_all(kvm);
srcu_read_unlock(&kvm->srcu, idx);
}
| 88,525,980,093,981,970,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,836 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static struct page *kvm_pfn_to_page(pfn_t pfn)
{
if (is_error_pfn(pfn))
return KVM_ERR_PTR_BAD_PAGE;
if (kvm_is_mmio_pfn(pfn)) {
WARN_ON(1);
return KVM_ERR_PTR_BAD_PAGE;
}
return pfn_to_page(pfn);
}
| 95,325,022,939,327,900,000,000,000,000,000,000,000 | kvm_main.c | 6,339,372,324,102,888,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,837 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset,
int len)
{
int r;
unsigned long addr;
addr = gfn_to_hva_read(kvm, gfn);
if (kvm_is_error_hva(addr))
return -EFAULT;
r = kvm_read_hva(data, (void __user *)addr + offset, len);
if (r)
return -EFAULT;
return 0;
}
| 309,134,066,634,860,750,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,838 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_release_page_clean(struct page *page)
{
WARN_ON(is_error_page(page));
kvm_release_pfn_clean(page_to_pfn(page));
}
| 125,796,730,191,961,680,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,839 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_release_page_dirty(struct page *page)
{
WARN_ON(is_error_page(page));
kvm_release_pfn_dirty(page_to_pfn(page));
}
| 267,712,802,142,397,930,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,840 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_release_pfn_clean(pfn_t pfn)
{
WARN_ON(is_error_pfn(pfn));
if (!kvm_is_mmio_pfn(pfn))
put_page(pfn_to_page(pfn));
}
| 251,263,568,071,627,330,000,000,000,000,000,000,000 | kvm_main.c | 6,339,372,324,102,888,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,841 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | bool kvm_vcpu_eligible_for_directed_yield(struct kvm_vcpu *vcpu)
{
bool eligible;
eligible = !vcpu->spin_loop.in_spin_loop ||
(vcpu->spin_loop.in_spin_loop &&
vcpu->spin_loop.dy_eligible);
if (vcpu->spin_loop.in_spin_loop)
kvm_vcpu_set_dy_eligible(vcpu, !vcpu->spin_loop.dy_eligible);
return eligible;
}
| 33,338,105,874,517,280,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,842 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static int kvm_vcpu_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
{
struct kvm_vcpu *vcpu = vma->vm_file->private_data;
struct page *page;
if (vmf->pgoff == 0)
page = virt_to_page(vcpu->run);
#ifdef CONFIG_X86
else if (vmf->pgoff == KVM_PIO_PAGE_OFFSET)
page = virt_to_page(vcpu->arch.pio_data);
#endi... | 57,004,212,495,106,575,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,843 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
{
struct page *page;
int r;
mutex_init(&vcpu->mutex);
vcpu->cpu = -1;
vcpu->kvm = kvm;
vcpu->vcpu_id = id;
vcpu->pid = NULL;
init_waitqueue_head(&vcpu->wq);
kvm_async_pf_vcpu_init(vcpu);
page = alloc_page(GFP_KERNEL | __GFP_ZERO);
if (!... | 193,460,033,950,741,340,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,844 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_vcpu_kick(struct kvm_vcpu *vcpu)
{
int me;
int cpu = vcpu->cpu;
wait_queue_head_t *wqp;
wqp = kvm_arch_vcpu_wq(vcpu);
if (waitqueue_active(wqp)) {
wake_up_interruptible(wqp);
++vcpu->stat.halt_wakeup;
}
me = get_cpu();
if (cpu != me && (unsigned)cpu < nr_cpu_ids && cpu_online(cpu))
if (kvm_arch... | 332,469,172,014,472,900,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,845 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void kvm_vcpu_on_spin(struct kvm_vcpu *me)
{
struct kvm *kvm = me->kvm;
struct kvm_vcpu *vcpu;
int last_boosted_vcpu = me->kvm->last_boosted_vcpu;
int yielded = 0;
int pass;
int i;
kvm_vcpu_set_in_spin_loop(me, true);
/*
* We boost the priority of a VCPU that is runnable but not
* currently running, becaus... | 292,851,310,037,529,960,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,846 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static int kvm_vm_ioctl_create_vcpu(struct kvm *kvm, u32 id)
{
int r;
struct kvm_vcpu *vcpu, *v;
vcpu = kvm_arch_vcpu_create(kvm, id);
if (IS_ERR(vcpu))
return PTR_ERR(vcpu);
preempt_notifier_init(&vcpu->preempt_notifier, &kvm_preempt_ops);
r = kvm_arch_vcpu_setup(vcpu);
if (r)
goto vcpu_destroy;
mutex_... | 141,066,586,768,684,740,000,000,000,000,000,000,000 | kvm_main.c | 6,339,372,324,102,888,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,847 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | void mark_page_dirty_in_slot(struct kvm *kvm, struct kvm_memory_slot *memslot,
gfn_t gfn)
{
if (memslot && memslot->dirty_bitmap) {
unsigned long rel_gfn = gfn - memslot->base_gfn;
/* TODO: introduce set_bit_le() and use it */
test_and_set_bit_le(rel_gfn, memslot->dirty_bitmap);
}
}
| 113,090,726,265,293,200,000,000,000,000,000,000,000 | kvm_main.c | 6,339,372,324,102,888,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,848 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static bool memslot_is_readonly(struct kvm_memory_slot *slot)
{
return slot->flags & KVM_MEM_READONLY;
}
| 124,588,536,085,899,370,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,849 | linux | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static bool vma_is_valid(struct vm_area_struct *vma, bool write_fault)
{
if (unlikely(!(vma->vm_flags & VM_READ)))
return false;
if (write_fault && (unlikely(!(vma->vm_flags & VM_WRITE))))
return false;
return true;
}
| 108,787,576,871,544,560,000,000,000,000,000,000,000 | kvm_main.c | 79,123,672,423,445,420,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
30,850 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs41_test_stateid(struct nfs_server *server, nfs4_stateid *stateid)
{
int status;
struct nfs41_test_stateid_args args = {
.stateid = stateid,
};
struct nfs41_test_stateid_res res;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_TEST_STATEID],
.rpc_argp = &args,
.rpc_resp ... | 181,308,613,307,504,400,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,851 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_do_open(struct inode *dir,
struct dentry *dentry,
fmode_t fmode,
int flags,
struct iattr *sattr,
struct rpc_cred *cred,
struct nfs4_state **res,
struct nfs4_threshold **ctx_th)
{
struct nfs4_state_owner *sp;
struct nfs4_state *state = NULL;
struct nfs_server *server =... | 148,937,758,438,865,700,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,852 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
struct nfs_fattr *fattr, struct iattr *sattr,
struct nfs4_state *state)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs_setattrargs arg = {
.fh = NFS_FH(inode),
.iap ... | 33,553,161,970,350,766,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,853 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_free_stateid(struct nfs_server *server, nfs4_stateid *stateid)
{
struct nfs41_free_stateid_args args = {
.stateid = stateid,
};
struct nfs41_free_stateid_res res;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FREE_STATEID],
.rpc_argp = &args,
.rpc_resp = &res,
};
i... | 217,212,112,419,192,150,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,854 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | _nfs4_opendata_reclaim_to_nfs4_state(struct nfs4_opendata *data)
{
struct inode *inode = data->state->inode;
struct nfs4_state *state = data->state;
int ret;
if (!data->rpc_done) {
ret = data->rpc_status;
goto err;
}
ret = -ESTALE;
if (!(data->f_attr.valid & NFS_ATTR_FATTR_TYPE) ||
!(data->f_attr.vali... | 133,077,137,452,722,500,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,855 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | _nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
{
struct inode *inode;
struct nfs4_state *state = NULL;
int ret;
if (!data->rpc_done) {
state = nfs4_try_open_cached(data);
goto out;
}
ret = -EAGAIN;
if (!(data->f_attr.valid & NFS_ATTR_FATTR))
goto err;
inode = nfs_fhget(data->dir->d_sb, &data->... | 131,709,830,090,624,460,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,856 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs4_accessargs args = {
.fh = NFS_FH(inode),
.bitmask = server->cache_consistency_bitmask,
};
struct nfs4_accessres res = {
.server = server,
};
struct rpc_message msg =... | 287,704,401,582,060,230,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,857 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_create_session(struct nfs_client *clp,
struct rpc_cred *cred)
{
struct nfs4_session *session = clp->cl_session;
struct nfs41_create_session_args args = {
.client = clp,
.cb_program = NFS4_CALLBACK,
};
struct nfs41_create_session_res res = {
.client = clp,
};
struct rpc_message msg = ... | 260,557,042,075,348,800,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,858 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
{
struct nfs4_delegreturndata *data;
struct nfs_server *server = NFS_SERVER(inode);
struct rpc_task *task;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
.r... | 279,343,109,193,497,700,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,859 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_destroy_clientid(struct nfs_client *clp,
struct rpc_cred *cred)
{
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_CLIENTID],
.rpc_argp = clp,
.rpc_cred = cred,
};
int status;
status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
if (status)
... | 152,804,598,331,431,200,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,860 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_fs_locations(struct rpc_clnt *client, struct inode *dir,
const struct qstr *name,
struct nfs4_fs_locations *fs_locations,
struct page *page)
{
struct nfs_server *server = NFS_SERVER(dir);
u32 bitmask[2] = {
[0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
};
struct n... | 90,446,383,250,530,840,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,861 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs4_link_arg arg = {
.fh = NFS_FH(inode),
.dir_fh = NFS_FH(dir),
.name = name,
.bitmask = server->attr_bitmask,
};
struct nfs4_link_res res = {
.server = ser... | 283,352,298,152,462,050,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,862 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_open(struct nfs4_opendata *data)
{
struct inode *dir = data->dir->d_inode;
struct nfs_server *server = NFS_SERVER(dir);
struct nfs_openargs *o_arg = &data->o_arg;
struct nfs_openres *o_res = &data->o_res;
int status;
status = nfs4_run_open_task(data, 0);
if (!data->rpc_done)
return statu... | 308,242,487,503,041,720,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,863 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
u64 cookie, struct page **pages, unsigned int count, int plus)
{
struct inode *dir = dentry->d_inode;
struct nfs4_readdir_arg args = {
.fh = NFS_FH(dir),
.pages = pages,
.pgbase = 0,
.count = count,
.bitmask = NFS_SERVER(dentry->... | 330,463,796,783,508,760,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,864 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
{
struct nfs_server *server = NFS_SERVER(dir);
struct nfs_removeargs args = {
.fh = NFS_FH(dir),
.name = *name,
};
struct nfs_removeres res = {
.server = server,
};
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMO... | 212,001,238,655,659,570,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,865 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
struct inode *new_dir, struct qstr *new_name)
{
struct nfs_server *server = NFS_SERVER(old_dir);
struct nfs_renameargs arg = {
.old_dir = NFS_FH(old_dir),
.new_dir = NFS_FH(new_dir),
.old_name = old_name,
.new_name = new_name,
};
s... | 219,299,138,711,433,260,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,866 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int _nfs4_recover_proc_open(struct nfs4_opendata *data)
{
struct inode *dir = data->dir->d_inode;
struct nfs_openres *o_res = &data->o_res;
int status;
status = nfs4_run_open_task(data, 1);
if (status != 0 || !data->rpc_done)
return status;
nfs_fattr_map_and_free_names(NFS_SERVER(dir), &data->f_... | 61,267,308,835,316,260,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,867 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int buf_to_pages_noslab(const void *buf, size_t buflen,
struct page **pages, unsigned int *pgbase)
{
struct page *newpage, **spages;
int rc = 0;
size_t len;
spages = pages;
do {
len = min_t(size_t, PAGE_SIZE, buflen);
newpage = alloc_page(GFP_KERNEL);
if (newpage == NULL)
goto unwind;
memcpy(... | 189,414,980,280,262,570,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,868 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_check_expired_locks(struct nfs4_state *state)
{
int status, ret = -NFS4ERR_BAD_STATEID;
struct nfs4_lock_state *lsp;
struct nfs_server *server = NFS_SERVER(state->inode);
list_for_each_entry(lsp, &state->lock_states, ls_locks) {
if (test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags)) {
status = n... | 186,986,455,734,228,400,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,869 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_check_open_stateid(struct nfs4_state *state)
{
struct nfs_server *server = NFS_SERVER(state->inode);
nfs4_stateid *stateid = &state->open_stateid;
int status;
/* If a state reset has been done, test_stateid is unneeded */
if ((test_bit(NFS_O_RDONLY_STATE, &state->flags) == 0) &&
(test_bit(NF... | 6,304,220,459,626,904,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,870 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_check_session_ready(struct nfs_client *clp)
{
int ret;
if (clp->cl_cons_state == NFS_CS_SESSION_INITING) {
ret = nfs4_client_recover_expired_lease(clp);
if (ret)
return ret;
}
if (clp->cl_cons_state < NFS_CS_READY)
return -EPROTONOSUPPORT;
smp_rmb();
return 0;
}
| 129,281,517,012,290,780,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,871 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs41_clear_delegation_stateid(struct nfs4_state *state)
{
struct nfs_server *server = NFS_SERVER(state->inode);
nfs4_stateid *stateid = &state->stateid;
int status;
/* If a state reset has been done, test_stateid is unneeded */
if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
return;
status... | 297,485,378,520,688,260,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,872 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_free_stateid(struct nfs_server *server, nfs4_stateid *stateid)
{
struct nfs4_exception exception = { };
int err;
do {
err = _nfs4_free_stateid(server, stateid);
if (err != -NFS4ERR_DELAY)
break;
nfs4_handle_exception(server, err, &exception);
} while (exception.retry);
return err;
}
| 170,990,278,061,122,170,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,873 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_lock_expired(struct nfs4_state *state, struct file_lock *request)
{
int status = NFS_OK;
if (test_bit(LK_STATE_IN_USE, &state->flags))
status = nfs41_check_expired_locks(state);
if (status != NFS_OK)
status = nfs4_lock_expired(state, request);
return status;
}
| 180,227,941,250,578,560,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,874 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
{
int status;
nfs41_clear_delegation_stateid(state);
status = nfs41_check_open_stateid(state);
if (status != NFS_OK)
status = nfs4_open_expired(sp, state);
return status;
}
| 35,630,544,777,597,796,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,875 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
{
struct nfs4_exception exception = { };
int err;
do {
err = _nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
switch (err) {
case 0:
case -NFS4ERR_WRO... | 100,544,277,339,297,730,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,876 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs41_same_server_scope(struct nfs41_server_scope *a,
struct nfs41_server_scope *b)
{
if (a->server_scope_sz == b->server_scope_sz &&
memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0)
return true;
return false;
}
| 151,692,322,551,009,700,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,877 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs41_test_stateid(struct nfs_server *server, nfs4_stateid *stateid)
{
struct nfs4_exception exception = { };
int err;
do {
err = _nfs41_test_stateid(server, stateid);
if (err != -NFS4ERR_DELAY)
break;
nfs4_handle_exception(server, err, &exception);
} while (exception.retry);
return err;
}
| 108,689,240,589,491,260,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,878 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_add_and_init_slots(struct nfs4_slot_table *tbl,
struct nfs4_slot *new,
u32 max_slots,
u32 ivalue)
{
struct nfs4_slot *old = NULL;
u32 i;
spin_lock(&tbl->slot_tbl_lock);
if (new) {
old = tbl->slots;
tbl->slots = new;
tbl->max_slots = max_slots;
}
tbl->highest_used_slotid = NFS4_NO_SLO... | 60,434,284,782,422,140,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,879 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static struct nfs4_createdata *nfs4_alloc_createdata(struct inode *dir,
struct qstr *name, struct iattr *sattr, u32 ftype)
{
struct nfs4_createdata *data;
data = kzalloc(sizeof(*data), GFP_KERNEL);
if (data != NULL) {
struct nfs_server *server = NFS_SERVER(dir);
data->msg.rpc_proc = &nfs4_procedures[NFSPROC4... | 115,844,782,793,285,370,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,880 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static struct page **nfs4_alloc_pages(size_t size, gfp_t gfp_flags)
{
struct page **pages;
int i;
pages = kcalloc(size, sizeof(struct page *), gfp_flags);
if (!pages) {
dprintk("%s: can't alloc array of %zu pages\n", __func__, size);
return NULL;
}
for (i = 0; i < size; i++) {
pages[i] = alloc_page(gfp_fl... | 43,862,368,063,354,070,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,881 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server, struct nfs4_state *state)
{
struct nfs_client *clp = server->nfs_client;
if (task->tk_status >= 0)
return 0;
switch(task->tk_status) {
case -NFS4ERR_DELEG_REVOKED:
case -NFS4ERR_ADMIN_REVOKED:
case -NFS4ERR_BAD_STATEID:
if (s... | 280,554,855,143,562,500,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,882 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs4_atomic_open(struct inode *dir, struct nfs_open_context *ctx, int open_flags, struct iattr *attr)
{
struct nfs4_state *state;
/* Protect against concurrent sillydeletes */
state = nfs4_do_open(dir, ctx->dentry, ctx->mode, open_flags, attr,
ctx->cred, &ctx->mdsthreshold);
if (IS_ERR(state))
return ERR... | 31,385,112,248,056,400,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,883 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_close_prepare(struct rpc_task *task, void *data)
{
struct nfs4_closedata *calldata = data;
struct nfs4_state *state = calldata->state;
struct inode *inode = calldata->inode;
int call_close = 0;
dprintk("%s: begin!\n", __func__);
if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
return;... | 57,605,657,476,591,670,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,884 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs4_commit_done(struct rpc_task *task, struct nfs_commit_data *data)
{
if (!nfs4_sequence_done(task, &data->res.seq_res))
return -EAGAIN;
return data->commit_done_cb(task, data);
}
| 126,081,400,040,657,770,000,000,000,000,000,000,000 | nfs4proc.c | 206,563,598,646,579,670,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,885 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs4_commit_done_cb(struct rpc_task *task, struct nfs_commit_data *data)
{
struct inode *inode = data->inode;
if (nfs4_async_handle_error(task, NFS_SERVER(inode), NULL) == -EAGAIN) {
rpc_restart_call_prepare(task);
return -EAGAIN;
}
return 0;
}
| 256,437,274,752,232,400,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,886 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | int nfs4_destroy_clientid(struct nfs_client *clp)
{
struct rpc_cred *cred;
int ret = 0;
if (clp->cl_mvops->minor_version < 1)
goto out;
if (clp->cl_exchange_flags == 0)
goto out;
if (clp->cl_preserve_clid)
goto out;
cred = nfs4_get_exchange_id_cred(clp);
ret = nfs4_proc_destroy_clientid(clp, cred);
if (c... | 175,520,571,812,152,060,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,887 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | void nfs4_destroy_session(struct nfs4_session *session)
{
struct rpc_xprt *xprt;
struct rpc_cred *cred;
cred = nfs4_get_exchange_id_cred(session->clp);
nfs4_proc_destroy_session(session, cred);
if (cred)
put_rpccred(cred);
rcu_read_lock();
xprt = rcu_dereference(session->clp->cl_rpcclient->cl_xprt);
rcu_rea... | 24,481,328,384,019,482,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,888 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs4_do_create(struct inode *dir, struct dentry *dentry, struct nfs4_createdata *data)
{
int status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &data->msg,
&data->arg.seq_args, &data->res.seq_res, 1);
if (status == 0) {
update_changeattr(dir, &data->res.dir_cinfo);
status = nfs_i... | 223,522,334,969,611,300,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,889 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static struct nfs4_state *nfs4_do_open(struct inode *dir,
struct dentry *dentry,
fmode_t fmode,
int flags,
struct iattr *sattr,
struct rpc_cred *cred,
struct nfs4_threshold **ctx_th)
{
struct nfs4_exception exception = { };
struct nfs4_state *res;
int status;
fmode &= FMODE_READ|FMODE... | 26,997,892,343,040,530,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,890 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
struct nfs_fattr *fattr, struct iattr *sattr,
struct nfs4_state *state)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs4_exception exception = {
.state = state,
.inode = inode,
};
int err;
do {
err = _nfs4_do_setat... | 21,897,696,109,838,040,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,891 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_free_closedata(void *data)
{
struct nfs4_closedata *calldata = data;
struct nfs4_state_owner *sp = calldata->state->owner;
struct super_block *sb = calldata->state->inode->i_sb;
if (calldata->roc)
pnfs_roc_release(calldata->state->inode);
nfs4_put_open_state(calldata->state);
nfs_free_seqid(ca... | 215,060,131,792,733,900,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,892 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_free_pages(struct page **pages, size_t size)
{
int i;
if (!pages)
return;
for (i = 0; i < size; i++) {
if (!pages[i])
break;
__free_page(pages[i]);
}
kfree(pages);
}
| 308,350,312,838,322,380,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,893 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs4_get_referral(struct rpc_clnt *client, struct inode *dir,
const struct qstr *name, struct nfs_fattr *fattr,
struct nfs_fh *fhandle)
{
int status = -ENOMEM;
struct page *page = NULL;
struct nfs4_fs_locations *locations = NULL;
page = alloc_page(GFP_KERNEL);
if (page == NULL)
goto o... | 5,051,389,253,777,536,400,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,894 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static int nfs4_handle_exception(struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
{
struct nfs_client *clp = server->nfs_client;
struct nfs4_state *state = exception->state;
struct inode *inode = exception->inode;
int ret = errorcode;
exception->retry = 0;
switch(errorcode) {
case 0:... | 279,680,711,918,677,780,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,895 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_handle_setlk_error(struct nfs_server *server, struct nfs4_lock_state *lsp, int new_lock_owner, int error)
{
switch (error) {
case -NFS4ERR_ADMIN_REVOKED:
case -NFS4ERR_BAD_STATEID:
lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
if (new_lock_owner != 0 ||
test_bit(NFS_LOCK_INITIALIZED, &lsp->l... | 79,119,463,124,643,610,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,896 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | int nfs4_init_ds_session(struct nfs_client *clp, unsigned long lease_time)
{
struct nfs4_session *session = clp->cl_session;
int ret;
spin_lock(&clp->cl_lock);
if (test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state)) {
/*
* Do not set NFS_CS_CHECK_LEASE_TIME instead set the
* DS lease to be e... | 128,849,488,892,238,760,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,897 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs4_init_nonuniform_client_string(const struct nfs_client *clp,
char *buf, size_t len)
{
unsigned int result;
rcu_read_lock();
result = scnprintf(buf, len, "Linux NFSv4.0 %s/%s %s",
clp->cl_ipaddr,
rpc_peeraddr2str(clp->cl_rpcclient,
RPC_DISPLAY_ADDR),
rpc_peeraddr2str(clp->cl_rpcclient,
... | 100,082,708,797,504,780,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,898 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_init_opendata_res(struct nfs4_opendata *p)
{
p->o_res.f_attr = &p->f_attr;
p->o_res.seqid = p->o_arg.seqid;
p->c_res.seqid = p->c_arg.seqid;
p->o_res.server = p->o_arg.server;
p->o_res.access_request = p->o_arg.access;
nfs_fattr_init(&p->f_attr);
nfs_fattr_init_names(&p->f_attr, &p->owner_name, ... | 4,478,897,761,046,107,500,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,899 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | int nfs4_init_session(struct nfs_server *server)
{
struct nfs_client *clp = server->nfs_client;
struct nfs4_session *session;
unsigned int rsize, wsize;
if (!nfs4_has_session(clp))
return 0;
session = clp->cl_session;
spin_lock(&clp->cl_lock);
if (test_and_clear_bit(NFS4_SESSION_INITING, &session->session_st... | 101,669,726,231,477,700,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,900 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs4_init_uniform_client_string(const struct nfs_client *clp,
char *buf, size_t len)
{
char *nodename = clp->cl_rpcclient->cl_nodename;
if (nfs4_client_id_uniquifier[0] != '\0')
nodename = nfs4_client_id_uniquifier;
return scnprintf(buf, len, "Linux NFSv%u.%u %s",
clp->rpc_ops->version, clp->cl_minorversi... | 185,346,249,866,295,400,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,901 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | nfs4_layoutcommit_done(struct rpc_task *task, void *calldata)
{
struct nfs4_layoutcommit_data *data = calldata;
struct nfs_server *server = NFS_SERVER(data->args.inode);
if (!nfs4_sequence_done(task, &data->res.seq_res))
return;
switch (task->tk_status) { /* Just ignore these failures */
case -NFS4ERR_DELEG_RE... | 107,101,890,660,675,690,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,902 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_layoutcommit_release(void *calldata)
{
struct nfs4_layoutcommit_data *data = calldata;
struct pnfs_layout_segment *lseg, *tmp;
unsigned long *bitlock = &NFS_I(data->args.inode)->flags;
pnfs_cleanup_layoutcommit(data);
/* Matched by references in pnfs_set_layoutcommit */
list_for_each_entry_safe(... | 276,733,564,768,380,650,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,903 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_layoutget_done(struct rpc_task *task, void *calldata)
{
struct nfs4_layoutget *lgp = calldata;
struct inode *inode = lgp->args.inode;
struct nfs_server *server = NFS_SERVER(inode);
struct pnfs_layout_hdr *lo;
struct nfs4_state *state = NULL;
dprintk("--> %s\n", __func__);
if (!nfs4_sequence_do... | 296,415,138,505,785,300,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,904 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_layoutget_release(void *calldata)
{
struct nfs4_layoutget *lgp = calldata;
struct nfs_server *server = NFS_SERVER(lgp->args.inode);
size_t max_pages = max_response_pages(server);
dprintk("--> %s\n", __func__);
nfs4_free_pages(lgp->args.layout.pages, max_pages);
put_nfs_open_context(lgp->args.ctx... | 125,390,984,317,011,780,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,905 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_layoutreturn_done(struct rpc_task *task, void *calldata)
{
struct nfs4_layoutreturn *lrp = calldata;
struct nfs_server *server;
dprintk("--> %s\n", __func__);
if (!nfs4_sequence_done(task, &lrp->res.seq_res))
return;
server = NFS_SERVER(lrp->args.inode);
if (nfs4_async_handle_error(task, ser... | 45,925,181,795,327,150,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,906 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | static void nfs4_layoutreturn_release(void *calldata)
{
struct nfs4_layoutreturn *lrp = calldata;
struct pnfs_layout_hdr *lo = lrp->args.layout;
dprintk("--> %s\n", __func__);
spin_lock(&lo->plh_inode->i_lock);
if (lrp->res.lrs_present)
pnfs_set_layout_stateid(lo, &lrp->res.stateid, true);
lo->plh_block_lgets-... | 284,815,300,502,762,820,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
30,907 | linux | 7d3e91a89b7adbc2831334def9e494dd9892f9af | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d3e91a89b7adbc2831334def9e494dd9892f9af | NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 0 | int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl)
{
struct nfs_server *server = NFS_SERVER(state->inode);
struct nfs4_exception exception = { };
int err;
err = nfs4_set_lock_state(state, fl);
if (err != 0)
goto out;
do {
err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW);
... | 103,369,393,253,325,520,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4591 | Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname... | https://nvd.nist.gov/vuln/detail/CVE-2013-4591 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.