idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
31,208
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline void free_copy(struct msg_msg *copy) { if (copy) free_msg(copy); }
307,799,315,073,196,180,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,209
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline void free_copy(struct msg_msg *copy) { }
261,992,057,132,513,280,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,210
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void freeque(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp) { struct list_head *tmp; struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm); expunge_all(msq, -EIDRM); ss_wakeup(&msq->q_senders, 1); msg_rmid(ns, msq); msg_unlock(msq); tmp = msq->q_messages.next; while (tmp != &msq->...
280,541,424,154,207,780,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,211
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void msg_exit_ns(struct ipc_namespace *ns) { free_ipcs(ns, &msg_ids(ns), freeque); idr_destroy(&ns->ids[IPC_MSG_IDS].ipcs_idr); }
3,396,147,286,682,355,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,212
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void __init msg_init(void) { msg_init_ns(&init_ipc_ns); printk(KERN_INFO "msgmni has been set to %d\n", init_ipc_ns.msg_ctlmni); ipc_init_proc_interface("sysvipc/msg", " key msqid perms cbytes qnum lspid lrpid uid gid cuid cgid stime rtime ctime\n", IPC_MSG_IDS,...
331,502,294,124,686,800,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,213
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void msg_init_ns(struct ipc_namespace *ns) { ns->msg_ctlmax = MSGMAX; ns->msg_ctlmnb = MSGMNB; recompute_msgmni(ns); atomic_set(&ns->msg_bytes, 0); atomic_set(&ns->msg_hdrs, 0); ipc_init_ids(&ns->ids[IPC_MSG_IDS]); }
236,855,778,551,074,140,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,214
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline struct msg_queue *msg_lock(struct ipc_namespace *ns, int id) { struct kern_ipc_perm *ipcp = ipc_lock(&msg_ids(ns), id); if (IS_ERR(ipcp)) return (struct msg_queue *)ipcp; return container_of(ipcp, struct msg_queue, q_perm); }
273,972,643,030,213,660,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,215
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline struct msg_queue *msg_lock_check(struct ipc_namespace *ns, int id) { struct kern_ipc_perm *ipcp = ipc_lock_check(&msg_ids(ns), id); if (IS_ERR(ipcp)) return (struct msg_queue *)ipcp; return container_of(ipcp, struct msg_queue, q_perm); }
322,924,312,876,124,940,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,216
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline void msg_rmid(struct ipc_namespace *ns, struct msg_queue *s) { ipc_rmid(&msg_ids(ns), &s->q_perm); }
88,132,654,543,801,750,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,217
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline int msg_security(struct kern_ipc_perm *ipcp, int msgflg) { struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm); return security_msg_queue_associate(msq, msgflg); }
337,653,995,240,952,660,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,218
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int msgctl_down(struct ipc_namespace *ns, int msqid, int cmd, struct msqid_ds __user *buf, int version) { struct kern_ipc_perm *ipcp; struct msqid64_ds uninitialized_var(msqid64); struct msg_queue *msq; int err; if (cmd == IPC_SET) { if (copy_msqid_from_user(&msqid64, buf, version)) return -E...
265,852,995,922,560,940,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,219
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int newque(struct ipc_namespace *ns, struct ipc_params *params) { struct msg_queue *msq; int id, retval; key_t key = params->key; int msgflg = params->flg; msq = ipc_rcu_alloc(sizeof(*msq)); if (!msq) return -ENOMEM; msq->q_perm.mode = msgflg & S_IRWXUGO; msq->q_perm.key = key; msq->q_perm.security...
197,192,448,105,225,000,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,220
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline int pipelined_send(struct msg_queue *msq, struct msg_msg *msg) { struct list_head *tmp; tmp = msq->q_receivers.next; while (tmp != &msq->q_receivers) { struct msg_receiver *msr; msr = list_entry(tmp, struct msg_receiver, r_list); tmp = tmp->next; if (testmsg(msg, msr->r_msgtype, msr->r_mode) ...
210,500,468,914,634,170,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,221
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline struct msg_msg *prepare_copy(void __user *buf, size_t bufsz) { return ERR_PTR(-ENOSYS); }
291,553,033,571,574,880,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,222
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void recompute_msgmni(struct ipc_namespace *ns) { struct sysinfo i; unsigned long allowed; int nb_ns; si_meminfo(&i); allowed = (((i.totalram - i.totalhigh) / MSG_MEM_SCALE) * i.mem_unit) / MSGMNB; nb_ns = atomic_read(&nr_ipc_ns); allowed /= nb_ns; if (allowed < MSGMNI) { ns->msg_ctlmni = MSGMNI; return...
259,743,289,152,522,270,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,223
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline void ss_add(struct msg_queue *msq, struct msg_sender *mss) { mss->tsk = current; current->state = TASK_INTERRUPTIBLE; list_add_tail(&mss->list, &msq->q_senders); }
32,279,268,031,438,780,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,224
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline void ss_del(struct msg_sender *mss) { if (mss->list.next != NULL) list_del(&mss->list); }
269,096,682,663,916,050,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,225
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void ss_wakeup(struct list_head *h, int kill) { struct list_head *tmp; tmp = h->next; while (tmp != h) { struct msg_sender *mss; mss = list_entry(tmp, struct msg_sender, list); tmp = tmp->next; if (kill) mss->list.next = NULL; wake_up_process(mss->tsk); } }
141,374,755,407,269,900,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,226
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int sysvipc_msg_proc_show(struct seq_file *s, void *it) { struct user_namespace *user_ns = seq_user_ns(s); struct msg_queue *msq = it; return seq_printf(s, "%10d %10d %4o %10lu %10lu %5u %5u %5u %5u %5u %5u %10lu %10lu %10lu\n", msq->q_perm.key, msq->q_perm.id, msq->q_perm.mode, msq->q_cbyte...
248,945,375,801,756,020,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,227
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int testmsg(struct msg_msg *msg, long type, int mode) { switch(mode) { case SEARCH_ANY: case SEARCH_NUMBER: return 1; case SEARCH_LESSEQUAL: if (msg->m_type <=type) return 1; break; case SEARCH_EQUAL: if (msg->m_type == type) return 1; break; case SEARCH_NOTEQUAL: if (msg->m...
258,929,518,265,959,580,000,000,000,000,000,000,000
msg.c
134,253,663,128,864,880,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,228
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
SYSCALL_DEFINE3(semget, key_t, key, int, nsems, int, semflg) { struct ipc_namespace *ns; struct ipc_ops sem_ops; struct ipc_params sem_params; ns = current->nsproxy->ipc_ns; if (nsems < 0 || nsems > ns->sc_semmsl) return -EINVAL; sem_ops.getnew = newary; sem_ops.associate = sem_security; sem_ops.more_check...
190,032,183,638,376,730,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,229
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
SYSCALL_DEFINE3(semop, int, semid, struct sembuf __user *, tsops, unsigned, nsops) { return sys_semtimedop(semid, tsops, nsops, NULL); }
339,256,934,206,791,950,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,230
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
SYSCALL_DEFINE4(semctl, int, semid, int, semnum, int, cmd, unsigned long, arg) { int version; struct ipc_namespace *ns; void __user *p = (void __user *)arg; if (semid < 0) return -EINVAL; version = ipc_parse_version(&cmd); ns = current->nsproxy->ipc_ns; switch(cmd) { case IPC_INFO: case SEM_INFO: case IP...
116,671,143,449,735,010,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,231
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static struct sem_undo *__lookup_undo(struct sem_undo_list *ulp, int semid) { struct sem_undo *un; list_for_each_entry_rcu(un, &ulp->list_proc, list_proc) { if (un->semid == semid) return un; } return NULL; }
275,759,646,546,034,500,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,232
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int check_restart(struct sem_array *sma, struct sem_queue *q) { struct sem *curr; struct sem_queue *h; /* if the operation didn't modify the array, then no restart */ if (q->alter == 0) return 0; /* pending complex operations are too difficult to analyse */ if (sma->complex_count) return 1; /* we w...
37,356,522,991,465,940,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,233
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
copy_semid_from_user(struct semid64_ds *out, void __user *buf, int version) { switch(version) { case IPC_64: if (copy_from_user(out, buf, sizeof(*out))) return -EFAULT; return 0; case IPC_OLD: { struct semid_ds tbuf_old; if(copy_from_user(&tbuf_old, buf, sizeof(tbuf_old))) return -EFAULT; out-...
220,550,083,938,255,600,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,234
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static unsigned long copy_semid_to_user(void __user *buf, struct semid64_ds *in, int version) { switch(version) { case IPC_64: return copy_to_user(buf, in, sizeof(*in)); case IPC_OLD: { struct semid_ds out; memset(&out, 0, sizeof(out)); ipc64_perm_to_ipc_perm(&in->sem_perm, &out.sem_perm); out.sem_...
311,585,810,054,589,030,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,235
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
int copy_semundo(unsigned long clone_flags, struct task_struct *tsk) { struct sem_undo_list *undo_list; int error; if (clone_flags & CLONE_SYSVSEM) { error = get_undo_list(&undo_list); if (error) return error; atomic_inc(&undo_list->refcnt); tsk->sysvsem.undo_list = undo_list; } else tsk->sysvsem.und...
237,672,493,785,183,230,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,236
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int count_semncnt (struct sem_array * sma, ushort semnum) { int semncnt; struct sem_queue * q; semncnt = 0; list_for_each_entry(q, &sma->sem_pending, list) { struct sembuf * sops = q->sops; int nsops = q->nsops; int i; for (i = 0; i < nsops; i++) if (sops[i].sem_num == semnum && (sops[i].s...
272,984,954,746,959,600,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,237
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int get_queue_result(struct sem_queue *q) { int error; error = q->status; while (unlikely(error == IN_WAKEUP)) { cpu_relax(); error = q->status; } return error; }
260,553,625,261,556,020,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,238
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline int get_undo_list(struct sem_undo_list **undo_listp) { struct sem_undo_list *undo_list; undo_list = current->sysvsem.undo_list; if (!undo_list) { undo_list = kzalloc(sizeof(*undo_list), GFP_KERNEL); if (undo_list == NULL) return -ENOMEM; spin_lock_init(&undo_list->lock); atomic_set(&undo_li...
161,822,870,464,892,280,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,239
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static struct sem_undo *lookup_undo(struct sem_undo_list *ulp, int semid) { struct sem_undo *un; assert_spin_locked(&ulp->lock); un = __lookup_undo(ulp, semid); if (un) { list_del_rcu(&un->list_proc); list_add_rcu(&un->list_proc, &ulp->list_proc); } return un; }
201,413,432,632,766,600,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,240
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void sem_exit_ns(struct ipc_namespace *ns) { free_ipcs(ns, &sem_ids(ns), freeary); idr_destroy(&ns->ids[IPC_SEM_IDS].ipcs_idr); }
227,662,364,785,456,730,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,241
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void sem_init_ns(struct ipc_namespace *ns) { ns->sc_semmsl = SEMMSL; ns->sc_semmns = SEMMNS; ns->sc_semopm = SEMOPM; ns->sc_semmni = SEMMNI; ns->used_sems = 0; ipc_init_ids(&ns->ids[IPC_SEM_IDS]); }
153,048,350,672,789,790,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,242
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline int sem_more_checks(struct kern_ipc_perm *ipcp, struct ipc_params *params) { struct sem_array *sma; sma = container_of(ipcp, struct sem_array, sem_perm); if (params->u.nsems > sma->sem_nsems) return -EINVAL; return 0; }
95,263,703,238,454,090,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,243
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline struct sem_array *sem_obtain_object(struct ipc_namespace *ns, int id) { struct kern_ipc_perm *ipcp = ipc_obtain_object(&sem_ids(ns), id); if (IS_ERR(ipcp)) return ERR_CAST(ipcp); return container_of(ipcp, struct sem_array, sem_perm); }
71,861,166,963,134,050,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,244
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline struct sem_array *sem_obtain_object_check(struct ipc_namespace *ns, int id) { struct kern_ipc_perm *ipcp = ipc_obtain_object_check(&sem_ids(ns), id); if (IS_ERR(ipcp)) return ERR_CAST(ipcp); return container_of(ipcp, struct sem_array, sem_perm); }
143,568,748,209,857,580,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,245
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline void sem_rmid(struct ipc_namespace *ns, struct sem_array *s) { ipc_rmid(&sem_ids(ns), &s->sem_perm); }
129,635,729,027,383,290,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,246
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline int sem_security(struct kern_ipc_perm *ipcp, int semflg) { struct sem_array *sma; sma = container_of(ipcp, struct sem_array, sem_perm); return security_sem_associate(sma, semflg); }
47,049,729,113,382,140,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,247
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int semctl_nolock(struct ipc_namespace *ns, int semid, int cmd, int version, void __user *p) { int err; struct sem_array *sma; switch(cmd) { case IPC_INFO: case SEM_INFO: { struct seminfo seminfo; int max_id; err = security_sem_semctl(NULL, cmd); if (err) return err; memset(&seminfo,0...
257,203,871,880,814,400,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,248
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int sysvipc_sem_proc_show(struct seq_file *s, void *it) { struct user_namespace *user_ns = seq_user_ns(s); struct sem_array *sma = it; return seq_printf(s, "%10d %10d %4o %10u %5u %5u %5u %5u %10lu %10lu\n", sma->sem_perm.key, sma->sem_perm.id, sma->sem_perm.mode, sma->sem_nsems, ...
105,375,149,809,852,550,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,249
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int try_atomic_semop (struct sem_array * sma, struct sembuf * sops, int nsops, struct sem_undo *un, int pid) { int result, sem_op; struct sembuf *sop; struct sem * curr; for (sop = sops; sop < sops + nsops; sop++) { curr = sma->sem_base + sop->sem_num; sem_op = sop->sem_op; result = curr->semv...
273,693,321,028,027,740,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,250
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void unlink_queue(struct sem_array *sma, struct sem_queue *q) { list_del(&q->list); if (q->nsops > 1) sma->complex_count--; }
7,598,453,001,265,964,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,251
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void wake_up_sem_queue_do(struct list_head *pt) { struct sem_queue *q, *t; int did_something; did_something = !list_empty(pt); list_for_each_entry_safe(q, t, pt, list) { wake_up_process(q->sleeper); /* q can disappear immediately after writing q->status. */ smp_wmb(); q->status = q->pid; } if (did...
284,928,737,163,537,830,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,252
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void wake_up_sem_queue_prepare(struct list_head *pt, struct sem_queue *q, int error) { if (list_empty(pt)) { /* * Hold preempt off so that we don't get preempted and have the * wakee busy-wait until we're scheduled back on. */ preempt_disable(); } q->status = IN_WAKEUP; q->pid = error; lis...
20,581,830,183,824,025,000,000,000,000,000,000,000
sem.c
101,438,121,952,310,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,253
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void ipc64_perm_to_ipc_perm (struct ipc64_perm *in, struct ipc_perm *out) { out->key = in->key; SET_UID(out->uid, in->uid); SET_GID(out->gid, in->gid); SET_UID(out->cuid, in->cuid); SET_GID(out->cgid, in->cgid); out->mode = in->mode; out->seq = in->seq; }
252,661,994,143,889,230,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,254
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
int ipc_addid(struct ipc_ids* ids, struct kern_ipc_perm* new, int size) { kuid_t euid; kgid_t egid; int id; int next_id = ids->next_id; if (size > IPCMNI) size = IPCMNI; if (ids->in_use >= size) return -ENOSPC; idr_preload(GFP_KERNEL); spin_lock_init(&new->lock); new->deleted = 0; rcu_read_lock(); sp...
253,147,503,683,926,840,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,255
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int ipc_check_perms(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp, struct ipc_ops *ops, struct ipc_params *params) { int err; if (ipcperms(ns, ipcp, params->flg)) err = -EACCES; else { err = ops->associate(ipcp, params->flg); if (!err) err = ipcp->id; } return err; }
117,481,000,052,019,250,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,256
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void ipc_do_vfree(struct work_struct *work) { vfree(container_of(work, struct ipc_rcu_sched, work)); }
86,018,357,047,196,400,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,257
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static struct kern_ipc_perm *ipc_findkey(struct ipc_ids *ids, key_t key) { struct kern_ipc_perm *ipc; int next_id; int total; for (total = 0, next_id = 0; total < ids->in_use; next_id++) { ipc = idr_find(&ids->ipcs_idr, next_id); if (ipc == NULL) continue; if (ipc->key != key) { total++; continue;...
47,311,835,634,925,280,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,258
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void ipc_free(void* ptr, int size) { if(size > PAGE_SIZE) vfree(ptr); else kfree(ptr); }
332,296,737,718,265,760,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,259
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
int ipc_get_maxid(struct ipc_ids *ids) { struct kern_ipc_perm *ipc; int max_id = -1; int total, id; if (ids->in_use == 0) return -1; if (ids->in_use == IPCMNI) return IPCMNI - 1; /* Look for the last assigned id */ total = 0; for (id = 0; id < IPCMNI && total < ids->in_use; id++) { ipc = idr_find(&ids-...
285,728,492,768,195,560,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,260
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
struct kern_ipc_perm *ipc_lock(struct ipc_ids *ids, int id) { struct kern_ipc_perm *out; rcu_read_lock(); out = ipc_obtain_object(ids, id); if (IS_ERR(out)) goto err1; spin_lock(&out->lock); /* ipc_rmid() may have already freed the ID while ipc_lock * was spinning: here verify that the structure is still v...
275,261,544,575,067,400,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,261
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
struct kern_ipc_perm *ipc_lock_check(struct ipc_ids *ids, int id) { struct kern_ipc_perm *out; out = ipc_lock(ids, id); if (IS_ERR(out)) return out; if (ipc_checkid(out, id)) { ipc_unlock(out); return ERR_PTR(-EIDRM); } return out; }
211,230,251,439,061,100,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,262
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int ipc_memory_callback(struct notifier_block *self, unsigned long action, void *arg) { static DECLARE_WORK(ipc_memory_wq, ipc_memory_notifier); switch (action) { case MEM_ONLINE: /* memory successfully brought online */ case MEM_OFFLINE: /* or offline: it's time to recompute msgmni */ /* * Th...
94,269,540,168,858,130,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,263
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void ipc_memory_notifier(struct work_struct *work) { ipcns_notify(IPCNS_MEMCHANGED); }
246,535,204,869,695,480,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,264
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
struct kern_ipc_perm *ipc_obtain_object(struct ipc_ids *ids, int id) { struct kern_ipc_perm *out; int lid = ipcid_to_idx(id); out = idr_find(&ids->ipcs_idr, lid); if (!out) return ERR_PTR(-EINVAL); return out; }
213,965,830,637,768,800,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,265
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
struct kern_ipc_perm *ipc_obtain_object_check(struct ipc_ids *ids, int id) { struct kern_ipc_perm *out = ipc_obtain_object(ids, id); if (IS_ERR(out)) goto out; if (ipc_checkid(out, id)) return ERR_PTR(-EIDRM); out: return out; }
6,775,704,255,681,438,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,266
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
int ipc_parse_version (int *cmd) { if (*cmd & IPC_64) { *cmd ^= IPC_64; return IPC_64; } else { return IPC_OLD; } }
7,137,977,765,904,962,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,267
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void ipc_rmid(struct ipc_ids *ids, struct kern_ipc_perm *ipcp) { int lid = ipcid_to_idx(ipcp->id); idr_remove(&ids->ipcs_idr, lid); ids->in_use--; ipcp->deleted = 1; return; }
312,272,517,715,353,100,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,268
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void ipc_schedule_free(struct rcu_head *head) { struct ipc_rcu_grace *grace; struct ipc_rcu_sched *sched; grace = container_of(head, struct ipc_rcu_grace, rcu); sched = container_of(&(grace->data[0]), struct ipc_rcu_sched, data[0]); INIT_WORK(&sched->work, ipc_do_vfree); schedule_work(&sched->work); ...
3,472,706,904,548,623,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,269
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
int ipc_update_perm(struct ipc64_perm *in, struct kern_ipc_perm *out) { kuid_t uid = make_kuid(current_user_ns(), in->uid); kgid_t gid = make_kgid(current_user_ns(), in->gid); if (!uid_valid(uid) || !gid_valid(gid)) return -EINVAL; out->uid = uid; out->gid = gid; out->mode = (out->mode & ~S_IRWXUGO) | (in->m...
308,715,860,393,009,600,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,270
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
struct kern_ipc_perm *ipcctl_pre_down(struct ipc_namespace *ns, struct ipc_ids *ids, int id, int cmd, struct ipc64_perm *perm, int extra_perm) { struct kern_ipc_perm *ipcp; ipcp = ipcctl_pre_down_nolock(ns, ids, id, cmd, perm, extra_perm); if (IS_ERR(ipcp)) goto out; spin_lock(&ipcp->lock); ...
28,052,145,991,941,220,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,271
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
struct kern_ipc_perm *ipcctl_pre_down_nolock(struct ipc_namespace *ns, struct ipc_ids *ids, int id, int cmd, struct ipc64_perm *perm, int extra_perm) { kuid_t euid; int err = -EPERM; struct kern_ipc_perm *ipcp; down_write(&ids->rw_mutex); rcu_read_lock(); ipcp = ipc_obtain_object_check(ids, ...
196,619,185,469,743,080,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,272
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
int ipcget(struct ipc_namespace *ns, struct ipc_ids *ids, struct ipc_ops *ops, struct ipc_params *params) { if (params->key == IPC_PRIVATE) return ipcget_new(ns, ids, ops, params); else return ipcget_public(ns, ids, ops, params); }
274,173,121,729,962,750,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,273
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int ipcget_new(struct ipc_namespace *ns, struct ipc_ids *ids, struct ipc_ops *ops, struct ipc_params *params) { int err; down_write(&ids->rw_mutex); err = ops->getnew(ns, params); up_write(&ids->rw_mutex); return err; }
224,669,350,218,348,920,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,274
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int ipcget_public(struct ipc_namespace *ns, struct ipc_ids *ids, struct ipc_ops *ops, struct ipc_params *params) { struct kern_ipc_perm *ipcp; int flg = params->flg; int err; /* * Take the lock as a writer since we are potentially going to add * a new entry + read locks are not "upgradable" */ down...
253,650,627,991,387,300,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,275
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
void kernel_to_ipc64_perm (struct kern_ipc_perm *in, struct ipc64_perm *out) { out->key = in->key; out->uid = from_kuid_munged(current_user_ns(), in->uid); out->gid = from_kgid_munged(current_user_ns(), in->gid); out->cuid = from_kuid_munged(current_user_ns(), in->cuid); out->cgid = from_kgid_munged(current_user_n...
188,324,914,486,840,650,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,276
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static inline int rcu_use_vmalloc(int size) { /* Too big for a single page? */ if (HDRLEN_KMALLOC + size > PAGE_SIZE) return 1; return 0; }
234,989,249,521,972,560,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,277
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static struct kern_ipc_perm *sysvipc_find_ipc(struct ipc_ids *ids, loff_t pos, loff_t *new_pos) { struct kern_ipc_perm *ipc; int total, id; total = 0; for (id = 0; id < pos && total < ids->in_use; id++) { ipc = idr_find(&ids->ipcs_idr, id); if (ipc != NULL) total++; } if (total >= ids->in_use)...
130,207,841,471,740,970,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,278
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static void *sysvipc_proc_next(struct seq_file *s, void *it, loff_t *pos) { struct ipc_proc_iter *iter = s->private; struct ipc_proc_iface *iface = iter->iface; struct kern_ipc_perm *ipc = it; /* If we had an ipc id locked before, unlock it */ if (ipc && ipc != SEQ_START_TOKEN) ipc_unlock(ipc); return sysvipc...
280,181,936,913,959,900,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,279
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int sysvipc_proc_open(struct inode *inode, struct file *file) { int ret; struct seq_file *seq; struct ipc_proc_iter *iter; ret = -ENOMEM; iter = kmalloc(sizeof(*iter), GFP_KERNEL); if (!iter) goto out; ret = seq_open(file, &sysvipc_proc_seqops); if (ret) goto out_kfree; seq = file->private_data; ...
160,535,861,057,583,900,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,280
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int sysvipc_proc_release(struct inode *inode, struct file *file) { struct seq_file *seq = file->private_data; struct ipc_proc_iter *iter = seq->private; put_ipc_ns(iter->ns); return seq_release_private(inode, file); }
164,533,418,114,745,020,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,281
linux
6062a8dc0517bce23e3c2f7d2fea5e22411269a3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
0
static int sysvipc_proc_show(struct seq_file *s, void *it) { struct ipc_proc_iter *iter = s->private; struct ipc_proc_iface *iface = iter->iface; if (it == SEQ_START_TOKEN) return seq_puts(s, iface->header); return iface->show(s, it); }
310,085,645,928,462,330,000,000,000,000,000,000,000
util.c
44,742,915,001,977,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4483
31,282
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
struct sk_buff *__ip_make_skb(struct sock *sk, struct flowi4 *fl4, struct sk_buff_head *queue, struct inet_cork *cork) { struct sk_buff *skb, *tmp_skb; struct sk_buff **tail_skb; struct inet_sock *inet = inet_sk(sk); struct net *net = sock_net(sk); struct ip_options *opt = NULL; struct ...
308,905,331,904,090,840,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,283
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_append_data(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) { struct inet_sock *inet = inet_sk(sk); ...
73,598,811,680,834,740,000,000,000,000,000,000,000
ip_output.c
291,486,425,007,202,620,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,284
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
ssize_t ip_append_page(struct sock *sk, struct flowi4 *fl4, struct page *page, int offset, size_t size, int flags) { struct inet_sock *inet = inet_sk(sk); struct sk_buff *skb; struct rtable *rt; struct ip_options *opt = NULL; struct inet_cork *cork; int hh_len; int mtu; int len; int err; unsigned int...
229,278,062,529,687,900,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,285
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_build_and_send_pkt(struct sk_buff *skb, struct sock *sk, __be32 saddr, __be32 daddr, struct ip_options_rcu *opt) { struct inet_sock *inet = inet_sk(sk); struct rtable *rt = skb_rtable(skb); struct iphdr *iph; /* Build the IP header. */ skb_push(skb, sizeof(struct iphdr) + (opt ? opt->opt.optlen : 0));...
226,560,067,086,647,730,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,286
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
static void ip_copy_addrs(struct iphdr *iph, const struct flowi4 *fl4) { BUILD_BUG_ON(offsetof(typeof(*fl4), daddr) != offsetof(typeof(*fl4), saddr) + sizeof(fl4->saddr)); memcpy(&iph->saddr, &fl4->saddr, sizeof(fl4->saddr) + sizeof(fl4->daddr)); }
146,342,216,398,073,470,000,000,000,000,000,000,000
ip_output.c
291,486,425,007,202,620,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,287
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
static void ip_copy_metadata(struct sk_buff *to, struct sk_buff *from) { to->pkt_type = from->pkt_type; to->priority = from->priority; to->protocol = from->protocol; skb_dst_drop(to); skb_dst_copy(to, from); to->dev = from->dev; to->mark = from->mark; /* Copy the flags to each fragment. */ IPCB(to)->flags = I...
111,326,507,850,551,890,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,288
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
static inline int ip_finish_output2(struct sk_buff *skb) { struct dst_entry *dst = skb_dst(skb); struct rtable *rt = (struct rtable *)dst; struct net_device *dev = dst->dev; unsigned int hh_len = LL_RESERVED_SPACE(dev); struct neighbour *neigh; u32 nexthop; if (rt->rt_type == RTN_MULTICAST) { IP_UPD_PO_STATS(...
305,992,806,789,308,900,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,289
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
void ip_flush_pending_frames(struct sock *sk) { __ip_flush_pending_frames(sk, &sk->sk_write_queue, &inet_sk(sk)->cork.base); }
3,875,865,526,394,019,000,000,000,000,000,000,000
ip_output.c
291,486,425,007,202,620,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,290
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *)) { struct iphdr *iph; int ptr; struct net_device *dev; struct sk_buff *skb2; unsigned int mtu, hlen, left, len, ll_rs; int offset; __be16 not_last_frag; struct rtable *rt = skb_rtable(skb); int err = 0; dev = rt->dst.dev; /* * Point int...
147,012,695,734,569,950,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,291
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_mc_output(struct sk_buff *skb) { struct sock *sk = skb->sk; struct rtable *rt = skb_rtable(skb); struct net_device *dev = rt->dst.dev; /* * If the indicated interface is up and running, send the packet. */ IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUT, skb->len); skb->dev = dev; skb->protocol = hton...
148,438,413,934,262,940,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,292
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_push_pending_frames(struct sock *sk, struct flowi4 *fl4) { struct sk_buff *skb; skb = ip_finish_skb(sk, fl4); if (!skb) return 0; /* Netfilter gets whole the not fragmented skb. */ return ip_send_skb(sock_net(sk), skb); }
77,109,571,987,148,615,000,000,000,000,000,000,000
ip_output.c
291,486,425,007,202,620,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,293
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_queue_xmit(struct sk_buff *skb, struct flowi *fl) { struct sock *sk = skb->sk; struct inet_sock *inet = inet_sk(sk); struct ip_options_rcu *inet_opt; struct flowi4 *fl4; struct rtable *rt; struct iphdr *iph; int res; /* Skip all of this if the packet is already routed, * f.e. by something like SCTP. ...
187,324,865,523,810,200,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,294
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
void ip_send_check(struct iphdr *iph) { iph->check = 0; iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl); }
274,865,987,444,331,600,000,000,000,000,000,000,000
ip_output.c
291,486,425,007,202,620,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,295
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
int ip_send_skb(struct net *net, struct sk_buff *skb) { int err; err = ip_local_out(skb); if (err) { if (err > 0) err = net_xmit_errno(err); if (err) IP_INC_STATS(net, IPSTATS_MIB_OUTDISCARDS); } return err; }
63,634,247,548,683,620,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,296
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
void ip_send_unicast_reply(struct net *net, struct sk_buff *skb, __be32 daddr, __be32 saddr, const struct ip_reply_arg *arg, unsigned int len) { struct ip_options_data replyopts; struct ipcm_cookie ipc; struct flowi4 fl4; struct rtable *rt = skb_rtable(skb); struct sk_buff *nskb; struct sock *sk; str...
169,880,821,778,256,970,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,297
linux
e93b7d748be887cd7639b113ba7d7ef792a7efb9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9
ip_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e9920...
0
static int ip_setup_cork(struct sock *sk, struct inet_cork *cork, struct ipcm_cookie *ipc, struct rtable **rtp) { struct inet_sock *inet = inet_sk(sk); struct ip_options_rcu *opt; struct rtable *rt; /* * setup for corking. */ opt = ipc->opt; if (opt) { if (cork->opt == NULL) { cork->opt = kmalloc(si...
202,739,323,924,192,950,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
31,339
linux
d661684cf6820331feae71146c35da83d794467e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e
net: Check the correct namespace when spoofing pid over SCM_RIGHTS This is a security bug. The follow-up will fix nsproxy to discourage this type of issue from happening again. Cc: stable@vger.kernel.org Signed-off-by: Andy Lutomirski <luto@amacapital.net> Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com> Sig...
0
int __scm_send(struct socket *sock, struct msghdr *msg, struct scm_cookie *p) { struct cmsghdr *cmsg; int err; for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) { err = -EINVAL; /* Verify that cmsg_len is at least sizeof(struct cmsghdr) */ /* The first check was omitted in <= 2.2.5. The r...
268,819,234,589,674,840,000,000,000,000,000,000,000
scm.c
151,933,687,966,539,770,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4300
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing.
https://nvd.nist.gov/vuln/detail/CVE-2013-4300
31,340
linux
d661684cf6820331feae71146c35da83d794467e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e
net: Check the correct namespace when spoofing pid over SCM_RIGHTS This is a security bug. The follow-up will fix nsproxy to discourage this type of issue from happening again. Cc: stable@vger.kernel.org Signed-off-by: Andy Lutomirski <luto@amacapital.net> Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com> Sig...
0
int put_cmsg(struct msghdr * msg, int level, int type, int len, void *data) { struct cmsghdr __user *cm = (__force struct cmsghdr __user *)msg->msg_control; struct cmsghdr cmhdr; int cmlen = CMSG_LEN(len); int err; if (MSG_CMSG_COMPAT & msg->msg_flags) return put_cmsg_compat(msg, level, type, len, data); if...
317,836,410,038,709,770,000,000,000,000,000,000,000
scm.c
151,933,687,966,539,770,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4300
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing.
https://nvd.nist.gov/vuln/detail/CVE-2013-4300
31,341
linux
d661684cf6820331feae71146c35da83d794467e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e
net: Check the correct namespace when spoofing pid over SCM_RIGHTS This is a security bug. The follow-up will fix nsproxy to discourage this type of issue from happening again. Cc: stable@vger.kernel.org Signed-off-by: Andy Lutomirski <luto@amacapital.net> Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com> Sig...
0
void scm_detach_fds(struct msghdr *msg, struct scm_cookie *scm) { struct cmsghdr __user *cm = (__force struct cmsghdr __user*)msg->msg_control; int fdmax = 0; int fdnum = scm->fp->count; struct file **fp = scm->fp->fp; int __user *cmfptr; int err = 0, i; if (MSG_CMSG_COMPAT & msg->msg_flags) { scm_detach_f...
173,032,174,635,894,180,000,000,000,000,000,000,000
scm.c
151,933,687,966,539,770,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4300
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing.
https://nvd.nist.gov/vuln/detail/CVE-2013-4300
31,366
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
static int is_seen(struct ctl_table_set *set) { return &current->nsproxy->net_ns->sysctls == set; }
196,628,425,173,933,980,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
31,367
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces) { return &namespaces->net_ns->sysctls; }
124,743,924,761,211,400,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
31,368
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
__init int net_sysctl_init(void) { static struct ctl_table empty[1]; int ret = -ENOMEM; /* Avoid limitations in the sysctl implementation by * registering "/proc/sys/net" as an empty directory not in a * network namespace. */ net_header = register_sysctl("net", empty); if (!net_header) goto out; ret = reg...
101,534,033,433,529,770,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
31,369
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
struct ctl_table_header *register_net_sysctl(struct net *net, const char *path, struct ctl_table *table) { return __register_sysctl_table(&net->sysctls, path, table); }
238,495,525,389,642,440,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
31,370
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
static void __net_exit sysctl_net_exit(struct net *net) { retire_sysctl_set(&net->sysctls); }
82,417,181,421,564,410,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
31,371
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
static int __net_init sysctl_net_init(struct net *net) { setup_sysctl_set(&net->sysctls, &net_sysctl_root, is_seen); return 0; }
290,208,308,953,255,870,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
31,372
linux
2433c8f094a008895e66f25bd1773cdb01c91d01
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. ...
0
void unregister_net_sysctl_table(struct ctl_table_header *header) { unregister_sysctl_table(header); }
197,287,648,083,906,880,000,000,000,000,000,000,000
sysctl_net.c
167,050,741,138,228,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-4270