idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
31,208 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline void free_copy(struct msg_msg *copy)
{
if (copy)
free_msg(copy);
}
| 307,799,315,073,196,180,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,209 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline void free_copy(struct msg_msg *copy)
{
}
| 261,992,057,132,513,280,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,210 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void freeque(struct ipc_namespace *ns, struct kern_ipc_perm *ipcp)
{
struct list_head *tmp;
struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm);
expunge_all(msq, -EIDRM);
ss_wakeup(&msq->q_senders, 1);
msg_rmid(ns, msq);
msg_unlock(msq);
tmp = msq->q_messages.next;
while (tmp != &msq->... | 280,541,424,154,207,780,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,211 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void msg_exit_ns(struct ipc_namespace *ns)
{
free_ipcs(ns, &msg_ids(ns), freeque);
idr_destroy(&ns->ids[IPC_MSG_IDS].ipcs_idr);
}
| 3,396,147,286,682,355,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,212 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void __init msg_init(void)
{
msg_init_ns(&init_ipc_ns);
printk(KERN_INFO "msgmni has been set to %d\n",
init_ipc_ns.msg_ctlmni);
ipc_init_proc_interface("sysvipc/msg",
" key msqid perms cbytes qnum lspid lrpid uid gid cuid cgid stime rtime ctime\n",
IPC_MSG_IDS,... | 331,502,294,124,686,800,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,213 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void msg_init_ns(struct ipc_namespace *ns)
{
ns->msg_ctlmax = MSGMAX;
ns->msg_ctlmnb = MSGMNB;
recompute_msgmni(ns);
atomic_set(&ns->msg_bytes, 0);
atomic_set(&ns->msg_hdrs, 0);
ipc_init_ids(&ns->ids[IPC_MSG_IDS]);
}
| 236,855,778,551,074,140,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,214 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline struct msg_queue *msg_lock(struct ipc_namespace *ns, int id)
{
struct kern_ipc_perm *ipcp = ipc_lock(&msg_ids(ns), id);
if (IS_ERR(ipcp))
return (struct msg_queue *)ipcp;
return container_of(ipcp, struct msg_queue, q_perm);
}
| 273,972,643,030,213,660,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,215 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline struct msg_queue *msg_lock_check(struct ipc_namespace *ns,
int id)
{
struct kern_ipc_perm *ipcp = ipc_lock_check(&msg_ids(ns), id);
if (IS_ERR(ipcp))
return (struct msg_queue *)ipcp;
return container_of(ipcp, struct msg_queue, q_perm);
}
| 322,924,312,876,124,940,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,216 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline void msg_rmid(struct ipc_namespace *ns, struct msg_queue *s)
{
ipc_rmid(&msg_ids(ns), &s->q_perm);
}
| 88,132,654,543,801,750,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,217 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline int msg_security(struct kern_ipc_perm *ipcp, int msgflg)
{
struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm);
return security_msg_queue_associate(msq, msgflg);
}
| 337,653,995,240,952,660,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,218 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int msgctl_down(struct ipc_namespace *ns, int msqid, int cmd,
struct msqid_ds __user *buf, int version)
{
struct kern_ipc_perm *ipcp;
struct msqid64_ds uninitialized_var(msqid64);
struct msg_queue *msq;
int err;
if (cmd == IPC_SET) {
if (copy_msqid_from_user(&msqid64, buf, version))
return -E... | 265,852,995,922,560,940,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,219 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int newque(struct ipc_namespace *ns, struct ipc_params *params)
{
struct msg_queue *msq;
int id, retval;
key_t key = params->key;
int msgflg = params->flg;
msq = ipc_rcu_alloc(sizeof(*msq));
if (!msq)
return -ENOMEM;
msq->q_perm.mode = msgflg & S_IRWXUGO;
msq->q_perm.key = key;
msq->q_perm.security... | 197,192,448,105,225,000,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,220 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline int pipelined_send(struct msg_queue *msq, struct msg_msg *msg)
{
struct list_head *tmp;
tmp = msq->q_receivers.next;
while (tmp != &msq->q_receivers) {
struct msg_receiver *msr;
msr = list_entry(tmp, struct msg_receiver, r_list);
tmp = tmp->next;
if (testmsg(msg, msr->r_msgtype, msr->r_mode) ... | 210,500,468,914,634,170,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,221 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline struct msg_msg *prepare_copy(void __user *buf, size_t bufsz)
{
return ERR_PTR(-ENOSYS);
}
| 291,553,033,571,574,880,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,222 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void recompute_msgmni(struct ipc_namespace *ns)
{
struct sysinfo i;
unsigned long allowed;
int nb_ns;
si_meminfo(&i);
allowed = (((i.totalram - i.totalhigh) / MSG_MEM_SCALE) * i.mem_unit)
/ MSGMNB;
nb_ns = atomic_read(&nr_ipc_ns);
allowed /= nb_ns;
if (allowed < MSGMNI) {
ns->msg_ctlmni = MSGMNI;
return... | 259,743,289,152,522,270,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,223 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline void ss_add(struct msg_queue *msq, struct msg_sender *mss)
{
mss->tsk = current;
current->state = TASK_INTERRUPTIBLE;
list_add_tail(&mss->list, &msq->q_senders);
}
| 32,279,268,031,438,780,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,224 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline void ss_del(struct msg_sender *mss)
{
if (mss->list.next != NULL)
list_del(&mss->list);
}
| 269,096,682,663,916,050,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,225 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void ss_wakeup(struct list_head *h, int kill)
{
struct list_head *tmp;
tmp = h->next;
while (tmp != h) {
struct msg_sender *mss;
mss = list_entry(tmp, struct msg_sender, list);
tmp = tmp->next;
if (kill)
mss->list.next = NULL;
wake_up_process(mss->tsk);
}
}
| 141,374,755,407,269,900,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,226 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int sysvipc_msg_proc_show(struct seq_file *s, void *it)
{
struct user_namespace *user_ns = seq_user_ns(s);
struct msg_queue *msq = it;
return seq_printf(s,
"%10d %10d %4o %10lu %10lu %5u %5u %5u %5u %5u %5u %10lu %10lu %10lu\n",
msq->q_perm.key,
msq->q_perm.id,
msq->q_perm.mode,
msq->q_cbyte... | 248,945,375,801,756,020,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,227 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int testmsg(struct msg_msg *msg, long type, int mode)
{
switch(mode)
{
case SEARCH_ANY:
case SEARCH_NUMBER:
return 1;
case SEARCH_LESSEQUAL:
if (msg->m_type <=type)
return 1;
break;
case SEARCH_EQUAL:
if (msg->m_type == type)
return 1;
break;
case SEARCH_NOTEQUAL:
if (msg->m... | 258,929,518,265,959,580,000,000,000,000,000,000,000 | msg.c | 134,253,663,128,864,880,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,228 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | SYSCALL_DEFINE3(semget, key_t, key, int, nsems, int, semflg)
{
struct ipc_namespace *ns;
struct ipc_ops sem_ops;
struct ipc_params sem_params;
ns = current->nsproxy->ipc_ns;
if (nsems < 0 || nsems > ns->sc_semmsl)
return -EINVAL;
sem_ops.getnew = newary;
sem_ops.associate = sem_security;
sem_ops.more_check... | 190,032,183,638,376,730,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,229 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | SYSCALL_DEFINE3(semop, int, semid, struct sembuf __user *, tsops,
unsigned, nsops)
{
return sys_semtimedop(semid, tsops, nsops, NULL);
}
| 339,256,934,206,791,950,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,230 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | SYSCALL_DEFINE4(semctl, int, semid, int, semnum, int, cmd, unsigned long, arg)
{
int version;
struct ipc_namespace *ns;
void __user *p = (void __user *)arg;
if (semid < 0)
return -EINVAL;
version = ipc_parse_version(&cmd);
ns = current->nsproxy->ipc_ns;
switch(cmd) {
case IPC_INFO:
case SEM_INFO:
case IP... | 116,671,143,449,735,010,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,231 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static struct sem_undo *__lookup_undo(struct sem_undo_list *ulp, int semid)
{
struct sem_undo *un;
list_for_each_entry_rcu(un, &ulp->list_proc, list_proc) {
if (un->semid == semid)
return un;
}
return NULL;
}
| 275,759,646,546,034,500,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,232 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int check_restart(struct sem_array *sma, struct sem_queue *q)
{
struct sem *curr;
struct sem_queue *h;
/* if the operation didn't modify the array, then no restart */
if (q->alter == 0)
return 0;
/* pending complex operations are too difficult to analyse */
if (sma->complex_count)
return 1;
/* we w... | 37,356,522,991,465,940,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,233 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | copy_semid_from_user(struct semid64_ds *out, void __user *buf, int version)
{
switch(version) {
case IPC_64:
if (copy_from_user(out, buf, sizeof(*out)))
return -EFAULT;
return 0;
case IPC_OLD:
{
struct semid_ds tbuf_old;
if(copy_from_user(&tbuf_old, buf, sizeof(tbuf_old)))
return -EFAULT;
out-... | 220,550,083,938,255,600,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,234 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static unsigned long copy_semid_to_user(void __user *buf, struct semid64_ds *in, int version)
{
switch(version) {
case IPC_64:
return copy_to_user(buf, in, sizeof(*in));
case IPC_OLD:
{
struct semid_ds out;
memset(&out, 0, sizeof(out));
ipc64_perm_to_ipc_perm(&in->sem_perm, &out.sem_perm);
out.sem_... | 311,585,810,054,589,030,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,235 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | int copy_semundo(unsigned long clone_flags, struct task_struct *tsk)
{
struct sem_undo_list *undo_list;
int error;
if (clone_flags & CLONE_SYSVSEM) {
error = get_undo_list(&undo_list);
if (error)
return error;
atomic_inc(&undo_list->refcnt);
tsk->sysvsem.undo_list = undo_list;
} else
tsk->sysvsem.und... | 237,672,493,785,183,230,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,236 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int count_semncnt (struct sem_array * sma, ushort semnum)
{
int semncnt;
struct sem_queue * q;
semncnt = 0;
list_for_each_entry(q, &sma->sem_pending, list) {
struct sembuf * sops = q->sops;
int nsops = q->nsops;
int i;
for (i = 0; i < nsops; i++)
if (sops[i].sem_num == semnum
&& (sops[i].s... | 272,984,954,746,959,600,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,237 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int get_queue_result(struct sem_queue *q)
{
int error;
error = q->status;
while (unlikely(error == IN_WAKEUP)) {
cpu_relax();
error = q->status;
}
return error;
}
| 260,553,625,261,556,020,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,238 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline int get_undo_list(struct sem_undo_list **undo_listp)
{
struct sem_undo_list *undo_list;
undo_list = current->sysvsem.undo_list;
if (!undo_list) {
undo_list = kzalloc(sizeof(*undo_list), GFP_KERNEL);
if (undo_list == NULL)
return -ENOMEM;
spin_lock_init(&undo_list->lock);
atomic_set(&undo_li... | 161,822,870,464,892,280,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,239 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static struct sem_undo *lookup_undo(struct sem_undo_list *ulp, int semid)
{
struct sem_undo *un;
assert_spin_locked(&ulp->lock);
un = __lookup_undo(ulp, semid);
if (un) {
list_del_rcu(&un->list_proc);
list_add_rcu(&un->list_proc, &ulp->list_proc);
}
return un;
}
| 201,413,432,632,766,600,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,240 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void sem_exit_ns(struct ipc_namespace *ns)
{
free_ipcs(ns, &sem_ids(ns), freeary);
idr_destroy(&ns->ids[IPC_SEM_IDS].ipcs_idr);
}
| 227,662,364,785,456,730,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,241 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void sem_init_ns(struct ipc_namespace *ns)
{
ns->sc_semmsl = SEMMSL;
ns->sc_semmns = SEMMNS;
ns->sc_semopm = SEMOPM;
ns->sc_semmni = SEMMNI;
ns->used_sems = 0;
ipc_init_ids(&ns->ids[IPC_SEM_IDS]);
}
| 153,048,350,672,789,790,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,242 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline int sem_more_checks(struct kern_ipc_perm *ipcp,
struct ipc_params *params)
{
struct sem_array *sma;
sma = container_of(ipcp, struct sem_array, sem_perm);
if (params->u.nsems > sma->sem_nsems)
return -EINVAL;
return 0;
}
| 95,263,703,238,454,090,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,243 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline struct sem_array *sem_obtain_object(struct ipc_namespace *ns, int id)
{
struct kern_ipc_perm *ipcp = ipc_obtain_object(&sem_ids(ns), id);
if (IS_ERR(ipcp))
return ERR_CAST(ipcp);
return container_of(ipcp, struct sem_array, sem_perm);
}
| 71,861,166,963,134,050,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,244 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline struct sem_array *sem_obtain_object_check(struct ipc_namespace *ns,
int id)
{
struct kern_ipc_perm *ipcp = ipc_obtain_object_check(&sem_ids(ns), id);
if (IS_ERR(ipcp))
return ERR_CAST(ipcp);
return container_of(ipcp, struct sem_array, sem_perm);
}
| 143,568,748,209,857,580,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,245 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline void sem_rmid(struct ipc_namespace *ns, struct sem_array *s)
{
ipc_rmid(&sem_ids(ns), &s->sem_perm);
}
| 129,635,729,027,383,290,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,246 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline int sem_security(struct kern_ipc_perm *ipcp, int semflg)
{
struct sem_array *sma;
sma = container_of(ipcp, struct sem_array, sem_perm);
return security_sem_associate(sma, semflg);
}
| 47,049,729,113,382,140,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,247 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int semctl_nolock(struct ipc_namespace *ns, int semid,
int cmd, int version, void __user *p)
{
int err;
struct sem_array *sma;
switch(cmd) {
case IPC_INFO:
case SEM_INFO:
{
struct seminfo seminfo;
int max_id;
err = security_sem_semctl(NULL, cmd);
if (err)
return err;
memset(&seminfo,0... | 257,203,871,880,814,400,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,248 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int sysvipc_sem_proc_show(struct seq_file *s, void *it)
{
struct user_namespace *user_ns = seq_user_ns(s);
struct sem_array *sma = it;
return seq_printf(s,
"%10d %10d %4o %10u %5u %5u %5u %5u %10lu %10lu\n",
sma->sem_perm.key,
sma->sem_perm.id,
sma->sem_perm.mode,
sma->sem_nsems,
... | 105,375,149,809,852,550,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,249 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int try_atomic_semop (struct sem_array * sma, struct sembuf * sops,
int nsops, struct sem_undo *un, int pid)
{
int result, sem_op;
struct sembuf *sop;
struct sem * curr;
for (sop = sops; sop < sops + nsops; sop++) {
curr = sma->sem_base + sop->sem_num;
sem_op = sop->sem_op;
result = curr->semv... | 273,693,321,028,027,740,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,250 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void unlink_queue(struct sem_array *sma, struct sem_queue *q)
{
list_del(&q->list);
if (q->nsops > 1)
sma->complex_count--;
}
| 7,598,453,001,265,964,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,251 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void wake_up_sem_queue_do(struct list_head *pt)
{
struct sem_queue *q, *t;
int did_something;
did_something = !list_empty(pt);
list_for_each_entry_safe(q, t, pt, list) {
wake_up_process(q->sleeper);
/* q can disappear immediately after writing q->status. */
smp_wmb();
q->status = q->pid;
}
if (did... | 284,928,737,163,537,830,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,252 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void wake_up_sem_queue_prepare(struct list_head *pt,
struct sem_queue *q, int error)
{
if (list_empty(pt)) {
/*
* Hold preempt off so that we don't get preempted and have the
* wakee busy-wait until we're scheduled back on.
*/
preempt_disable();
}
q->status = IN_WAKEUP;
q->pid = error;
lis... | 20,581,830,183,824,025,000,000,000,000,000,000,000 | sem.c | 101,438,121,952,310,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,253 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void ipc64_perm_to_ipc_perm (struct ipc64_perm *in, struct ipc_perm *out)
{
out->key = in->key;
SET_UID(out->uid, in->uid);
SET_GID(out->gid, in->gid);
SET_UID(out->cuid, in->cuid);
SET_GID(out->cgid, in->cgid);
out->mode = in->mode;
out->seq = in->seq;
}
| 252,661,994,143,889,230,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,254 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | int ipc_addid(struct ipc_ids* ids, struct kern_ipc_perm* new, int size)
{
kuid_t euid;
kgid_t egid;
int id;
int next_id = ids->next_id;
if (size > IPCMNI)
size = IPCMNI;
if (ids->in_use >= size)
return -ENOSPC;
idr_preload(GFP_KERNEL);
spin_lock_init(&new->lock);
new->deleted = 0;
rcu_read_lock();
sp... | 253,147,503,683,926,840,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,255 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int ipc_check_perms(struct ipc_namespace *ns,
struct kern_ipc_perm *ipcp,
struct ipc_ops *ops,
struct ipc_params *params)
{
int err;
if (ipcperms(ns, ipcp, params->flg))
err = -EACCES;
else {
err = ops->associate(ipcp, params->flg);
if (!err)
err = ipcp->id;
}
return err;
}
| 117,481,000,052,019,250,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,256 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void ipc_do_vfree(struct work_struct *work)
{
vfree(container_of(work, struct ipc_rcu_sched, work));
}
| 86,018,357,047,196,400,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,257 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static struct kern_ipc_perm *ipc_findkey(struct ipc_ids *ids, key_t key)
{
struct kern_ipc_perm *ipc;
int next_id;
int total;
for (total = 0, next_id = 0; total < ids->in_use; next_id++) {
ipc = idr_find(&ids->ipcs_idr, next_id);
if (ipc == NULL)
continue;
if (ipc->key != key) {
total++;
continue;... | 47,311,835,634,925,280,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,258 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void ipc_free(void* ptr, int size)
{
if(size > PAGE_SIZE)
vfree(ptr);
else
kfree(ptr);
}
| 332,296,737,718,265,760,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,259 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | int ipc_get_maxid(struct ipc_ids *ids)
{
struct kern_ipc_perm *ipc;
int max_id = -1;
int total, id;
if (ids->in_use == 0)
return -1;
if (ids->in_use == IPCMNI)
return IPCMNI - 1;
/* Look for the last assigned id */
total = 0;
for (id = 0; id < IPCMNI && total < ids->in_use; id++) {
ipc = idr_find(&ids-... | 285,728,492,768,195,560,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,260 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | struct kern_ipc_perm *ipc_lock(struct ipc_ids *ids, int id)
{
struct kern_ipc_perm *out;
rcu_read_lock();
out = ipc_obtain_object(ids, id);
if (IS_ERR(out))
goto err1;
spin_lock(&out->lock);
/* ipc_rmid() may have already freed the ID while ipc_lock
* was spinning: here verify that the structure is still v... | 275,261,544,575,067,400,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,261 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | struct kern_ipc_perm *ipc_lock_check(struct ipc_ids *ids, int id)
{
struct kern_ipc_perm *out;
out = ipc_lock(ids, id);
if (IS_ERR(out))
return out;
if (ipc_checkid(out, id)) {
ipc_unlock(out);
return ERR_PTR(-EIDRM);
}
return out;
}
| 211,230,251,439,061,100,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,262 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int ipc_memory_callback(struct notifier_block *self,
unsigned long action, void *arg)
{
static DECLARE_WORK(ipc_memory_wq, ipc_memory_notifier);
switch (action) {
case MEM_ONLINE: /* memory successfully brought online */
case MEM_OFFLINE: /* or offline: it's time to recompute msgmni */
/*
* Th... | 94,269,540,168,858,130,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,263 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void ipc_memory_notifier(struct work_struct *work)
{
ipcns_notify(IPCNS_MEMCHANGED);
}
| 246,535,204,869,695,480,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,264 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | struct kern_ipc_perm *ipc_obtain_object(struct ipc_ids *ids, int id)
{
struct kern_ipc_perm *out;
int lid = ipcid_to_idx(id);
out = idr_find(&ids->ipcs_idr, lid);
if (!out)
return ERR_PTR(-EINVAL);
return out;
}
| 213,965,830,637,768,800,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,265 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | struct kern_ipc_perm *ipc_obtain_object_check(struct ipc_ids *ids, int id)
{
struct kern_ipc_perm *out = ipc_obtain_object(ids, id);
if (IS_ERR(out))
goto out;
if (ipc_checkid(out, id))
return ERR_PTR(-EIDRM);
out:
return out;
}
| 6,775,704,255,681,438,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,266 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | int ipc_parse_version (int *cmd)
{
if (*cmd & IPC_64) {
*cmd ^= IPC_64;
return IPC_64;
} else {
return IPC_OLD;
}
}
| 7,137,977,765,904,962,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,267 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void ipc_rmid(struct ipc_ids *ids, struct kern_ipc_perm *ipcp)
{
int lid = ipcid_to_idx(ipcp->id);
idr_remove(&ids->ipcs_idr, lid);
ids->in_use--;
ipcp->deleted = 1;
return;
}
| 312,272,517,715,353,100,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,268 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void ipc_schedule_free(struct rcu_head *head)
{
struct ipc_rcu_grace *grace;
struct ipc_rcu_sched *sched;
grace = container_of(head, struct ipc_rcu_grace, rcu);
sched = container_of(&(grace->data[0]), struct ipc_rcu_sched,
data[0]);
INIT_WORK(&sched->work, ipc_do_vfree);
schedule_work(&sched->work);
... | 3,472,706,904,548,623,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,269 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | int ipc_update_perm(struct ipc64_perm *in, struct kern_ipc_perm *out)
{
kuid_t uid = make_kuid(current_user_ns(), in->uid);
kgid_t gid = make_kgid(current_user_ns(), in->gid);
if (!uid_valid(uid) || !gid_valid(gid))
return -EINVAL;
out->uid = uid;
out->gid = gid;
out->mode = (out->mode & ~S_IRWXUGO)
| (in->m... | 308,715,860,393,009,600,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,270 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | struct kern_ipc_perm *ipcctl_pre_down(struct ipc_namespace *ns,
struct ipc_ids *ids, int id, int cmd,
struct ipc64_perm *perm, int extra_perm)
{
struct kern_ipc_perm *ipcp;
ipcp = ipcctl_pre_down_nolock(ns, ids, id, cmd, perm, extra_perm);
if (IS_ERR(ipcp))
goto out;
spin_lock(&ipcp->lock);
... | 28,052,145,991,941,220,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,271 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | struct kern_ipc_perm *ipcctl_pre_down_nolock(struct ipc_namespace *ns,
struct ipc_ids *ids, int id, int cmd,
struct ipc64_perm *perm, int extra_perm)
{
kuid_t euid;
int err = -EPERM;
struct kern_ipc_perm *ipcp;
down_write(&ids->rw_mutex);
rcu_read_lock();
ipcp = ipc_obtain_object_check(ids, ... | 196,619,185,469,743,080,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,272 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | int ipcget(struct ipc_namespace *ns, struct ipc_ids *ids,
struct ipc_ops *ops, struct ipc_params *params)
{
if (params->key == IPC_PRIVATE)
return ipcget_new(ns, ids, ops, params);
else
return ipcget_public(ns, ids, ops, params);
}
| 274,173,121,729,962,750,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,273 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int ipcget_new(struct ipc_namespace *ns, struct ipc_ids *ids,
struct ipc_ops *ops, struct ipc_params *params)
{
int err;
down_write(&ids->rw_mutex);
err = ops->getnew(ns, params);
up_write(&ids->rw_mutex);
return err;
}
| 224,669,350,218,348,920,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,274 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int ipcget_public(struct ipc_namespace *ns, struct ipc_ids *ids,
struct ipc_ops *ops, struct ipc_params *params)
{
struct kern_ipc_perm *ipcp;
int flg = params->flg;
int err;
/*
* Take the lock as a writer since we are potentially going to add
* a new entry + read locks are not "upgradable"
*/
down... | 253,650,627,991,387,300,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,275 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | void kernel_to_ipc64_perm (struct kern_ipc_perm *in, struct ipc64_perm *out)
{
out->key = in->key;
out->uid = from_kuid_munged(current_user_ns(), in->uid);
out->gid = from_kgid_munged(current_user_ns(), in->gid);
out->cuid = from_kuid_munged(current_user_ns(), in->cuid);
out->cgid = from_kgid_munged(current_user_n... | 188,324,914,486,840,650,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,276 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static inline int rcu_use_vmalloc(int size)
{
/* Too big for a single page? */
if (HDRLEN_KMALLOC + size > PAGE_SIZE)
return 1;
return 0;
}
| 234,989,249,521,972,560,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,277 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static struct kern_ipc_perm *sysvipc_find_ipc(struct ipc_ids *ids, loff_t pos,
loff_t *new_pos)
{
struct kern_ipc_perm *ipc;
int total, id;
total = 0;
for (id = 0; id < pos && total < ids->in_use; id++) {
ipc = idr_find(&ids->ipcs_idr, id);
if (ipc != NULL)
total++;
}
if (total >= ids->in_use)... | 130,207,841,471,740,970,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,278 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static void *sysvipc_proc_next(struct seq_file *s, void *it, loff_t *pos)
{
struct ipc_proc_iter *iter = s->private;
struct ipc_proc_iface *iface = iter->iface;
struct kern_ipc_perm *ipc = it;
/* If we had an ipc id locked before, unlock it */
if (ipc && ipc != SEQ_START_TOKEN)
ipc_unlock(ipc);
return sysvipc... | 280,181,936,913,959,900,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,279 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int sysvipc_proc_open(struct inode *inode, struct file *file)
{
int ret;
struct seq_file *seq;
struct ipc_proc_iter *iter;
ret = -ENOMEM;
iter = kmalloc(sizeof(*iter), GFP_KERNEL);
if (!iter)
goto out;
ret = seq_open(file, &sysvipc_proc_seqops);
if (ret)
goto out_kfree;
seq = file->private_data;
... | 160,535,861,057,583,900,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,280 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int sysvipc_proc_release(struct inode *inode, struct file *file)
{
struct seq_file *seq = file->private_data;
struct ipc_proc_iter *iter = seq->private;
put_ipc_ns(iter->ns);
return seq_release_private(inode, file);
}
| 164,533,418,114,745,020,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,281 | linux | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 0 | static int sysvipc_proc_show(struct seq_file *s, void *it)
{
struct ipc_proc_iter *iter = s->private;
struct ipc_proc_iface *iface = iter->iface;
if (it == SEQ_START_TOKEN)
return seq_puts(s, iface->header);
return iface->show(s, it);
}
| 310,085,645,928,462,330,000,000,000,000,000,000,000 | util.c | 44,742,915,001,977,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4483 | The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4483 |
31,282 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | struct sk_buff *__ip_make_skb(struct sock *sk,
struct flowi4 *fl4,
struct sk_buff_head *queue,
struct inet_cork *cork)
{
struct sk_buff *skb, *tmp_skb;
struct sk_buff **tail_skb;
struct inet_sock *inet = inet_sk(sk);
struct net *net = sock_net(sk);
struct ip_options *opt = NULL;
struct ... | 308,905,331,904,090,840,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,283 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_append_data(struct sock *sk, struct flowi4 *fl4,
int getfrag(void *from, char *to, int offset, int len,
int odd, struct sk_buff *skb),
void *from, int length, int transhdrlen,
struct ipcm_cookie *ipc, struct rtable **rtp,
unsigned int flags)
{
struct inet_sock *inet = inet_sk(sk);
... | 73,598,811,680,834,740,000,000,000,000,000,000,000 | ip_output.c | 291,486,425,007,202,620,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,284 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | ssize_t ip_append_page(struct sock *sk, struct flowi4 *fl4, struct page *page,
int offset, size_t size, int flags)
{
struct inet_sock *inet = inet_sk(sk);
struct sk_buff *skb;
struct rtable *rt;
struct ip_options *opt = NULL;
struct inet_cork *cork;
int hh_len;
int mtu;
int len;
int err;
unsigned int... | 229,278,062,529,687,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,285 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_build_and_send_pkt(struct sk_buff *skb, struct sock *sk,
__be32 saddr, __be32 daddr, struct ip_options_rcu *opt)
{
struct inet_sock *inet = inet_sk(sk);
struct rtable *rt = skb_rtable(skb);
struct iphdr *iph;
/* Build the IP header. */
skb_push(skb, sizeof(struct iphdr) + (opt ? opt->opt.optlen : 0));... | 226,560,067,086,647,730,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,286 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | static void ip_copy_addrs(struct iphdr *iph, const struct flowi4 *fl4)
{
BUILD_BUG_ON(offsetof(typeof(*fl4), daddr) !=
offsetof(typeof(*fl4), saddr) + sizeof(fl4->saddr));
memcpy(&iph->saddr, &fl4->saddr,
sizeof(fl4->saddr) + sizeof(fl4->daddr));
}
| 146,342,216,398,073,470,000,000,000,000,000,000,000 | ip_output.c | 291,486,425,007,202,620,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,287 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | static void ip_copy_metadata(struct sk_buff *to, struct sk_buff *from)
{
to->pkt_type = from->pkt_type;
to->priority = from->priority;
to->protocol = from->protocol;
skb_dst_drop(to);
skb_dst_copy(to, from);
to->dev = from->dev;
to->mark = from->mark;
/* Copy the flags to each fragment. */
IPCB(to)->flags = I... | 111,326,507,850,551,890,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,288 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | static inline int ip_finish_output2(struct sk_buff *skb)
{
struct dst_entry *dst = skb_dst(skb);
struct rtable *rt = (struct rtable *)dst;
struct net_device *dev = dst->dev;
unsigned int hh_len = LL_RESERVED_SPACE(dev);
struct neighbour *neigh;
u32 nexthop;
if (rt->rt_type == RTN_MULTICAST) {
IP_UPD_PO_STATS(... | 305,992,806,789,308,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,289 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | void ip_flush_pending_frames(struct sock *sk)
{
__ip_flush_pending_frames(sk, &sk->sk_write_queue, &inet_sk(sk)->cork.base);
}
| 3,875,865,526,394,019,000,000,000,000,000,000,000 | ip_output.c | 291,486,425,007,202,620,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,290 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *))
{
struct iphdr *iph;
int ptr;
struct net_device *dev;
struct sk_buff *skb2;
unsigned int mtu, hlen, left, len, ll_rs;
int offset;
__be16 not_last_frag;
struct rtable *rt = skb_rtable(skb);
int err = 0;
dev = rt->dst.dev;
/*
* Point int... | 147,012,695,734,569,950,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,291 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_mc_output(struct sk_buff *skb)
{
struct sock *sk = skb->sk;
struct rtable *rt = skb_rtable(skb);
struct net_device *dev = rt->dst.dev;
/*
* If the indicated interface is up and running, send the packet.
*/
IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUT, skb->len);
skb->dev = dev;
skb->protocol = hton... | 148,438,413,934,262,940,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,292 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_push_pending_frames(struct sock *sk, struct flowi4 *fl4)
{
struct sk_buff *skb;
skb = ip_finish_skb(sk, fl4);
if (!skb)
return 0;
/* Netfilter gets whole the not fragmented skb. */
return ip_send_skb(sock_net(sk), skb);
}
| 77,109,571,987,148,615,000,000,000,000,000,000,000 | ip_output.c | 291,486,425,007,202,620,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,293 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_queue_xmit(struct sk_buff *skb, struct flowi *fl)
{
struct sock *sk = skb->sk;
struct inet_sock *inet = inet_sk(sk);
struct ip_options_rcu *inet_opt;
struct flowi4 *fl4;
struct rtable *rt;
struct iphdr *iph;
int res;
/* Skip all of this if the packet is already routed,
* f.e. by something like SCTP.
... | 187,324,865,523,810,200,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,294 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | void ip_send_check(struct iphdr *iph)
{
iph->check = 0;
iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl);
}
| 274,865,987,444,331,600,000,000,000,000,000,000,000 | ip_output.c | 291,486,425,007,202,620,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,295 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | int ip_send_skb(struct net *net, struct sk_buff *skb)
{
int err;
err = ip_local_out(skb);
if (err) {
if (err > 0)
err = net_xmit_errno(err);
if (err)
IP_INC_STATS(net, IPSTATS_MIB_OUTDISCARDS);
}
return err;
}
| 63,634,247,548,683,620,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,296 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | void ip_send_unicast_reply(struct net *net, struct sk_buff *skb, __be32 daddr,
__be32 saddr, const struct ip_reply_arg *arg,
unsigned int len)
{
struct ip_options_data replyopts;
struct ipcm_cookie ipc;
struct flowi4 fl4;
struct rtable *rt = skb_rtable(skb);
struct sk_buff *nskb;
struct sock *sk;
str... | 169,880,821,778,256,970,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,297 | linux | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e93b7d748be887cd7639b113ba7d7ef792a7efb9 | ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | 0 | static int ip_setup_cork(struct sock *sk, struct inet_cork *cork,
struct ipcm_cookie *ipc, struct rtable **rtp)
{
struct inet_sock *inet = inet_sk(sk);
struct ip_options_rcu *opt;
struct rtable *rt;
/*
* setup for corking.
*/
opt = ipc->opt;
if (opt) {
if (cork->opt == NULL) {
cork->opt = kmalloc(si... | 202,739,323,924,192,950,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
31,339 | linux | d661684cf6820331feae71146c35da83d794467e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e | net: Check the correct namespace when spoofing pid over SCM_RIGHTS
This is a security bug.
The follow-up will fix nsproxy to discourage this type of issue from
happening again.
Cc: stable@vger.kernel.org
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com>
Sig... | 0 | int __scm_send(struct socket *sock, struct msghdr *msg, struct scm_cookie *p)
{
struct cmsghdr *cmsg;
int err;
for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg))
{
err = -EINVAL;
/* Verify that cmsg_len is at least sizeof(struct cmsghdr) */
/* The first check was omitted in <= 2.2.5. The r... | 268,819,234,589,674,840,000,000,000,000,000,000,000 | scm.c | 151,933,687,966,539,770,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4300 | The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing. | https://nvd.nist.gov/vuln/detail/CVE-2013-4300 |
31,340 | linux | d661684cf6820331feae71146c35da83d794467e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e | net: Check the correct namespace when spoofing pid over SCM_RIGHTS
This is a security bug.
The follow-up will fix nsproxy to discourage this type of issue from
happening again.
Cc: stable@vger.kernel.org
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com>
Sig... | 0 | int put_cmsg(struct msghdr * msg, int level, int type, int len, void *data)
{
struct cmsghdr __user *cm
= (__force struct cmsghdr __user *)msg->msg_control;
struct cmsghdr cmhdr;
int cmlen = CMSG_LEN(len);
int err;
if (MSG_CMSG_COMPAT & msg->msg_flags)
return put_cmsg_compat(msg, level, type, len, data);
if... | 317,836,410,038,709,770,000,000,000,000,000,000,000 | scm.c | 151,933,687,966,539,770,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4300 | The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing. | https://nvd.nist.gov/vuln/detail/CVE-2013-4300 |
31,341 | linux | d661684cf6820331feae71146c35da83d794467e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e | net: Check the correct namespace when spoofing pid over SCM_RIGHTS
This is a security bug.
The follow-up will fix nsproxy to discourage this type of issue from
happening again.
Cc: stable@vger.kernel.org
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com>
Sig... | 0 | void scm_detach_fds(struct msghdr *msg, struct scm_cookie *scm)
{
struct cmsghdr __user *cm
= (__force struct cmsghdr __user*)msg->msg_control;
int fdmax = 0;
int fdnum = scm->fp->count;
struct file **fp = scm->fp->fp;
int __user *cmfptr;
int err = 0, i;
if (MSG_CMSG_COMPAT & msg->msg_flags) {
scm_detach_f... | 173,032,174,635,894,180,000,000,000,000,000,000,000 | scm.c | 151,933,687,966,539,770,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4300 | The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing. | https://nvd.nist.gov/vuln/detail/CVE-2013-4300 |
31,366 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | static int is_seen(struct ctl_table_set *set)
{
return ¤t->nsproxy->net_ns->sysctls == set;
}
| 196,628,425,173,933,980,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
31,367 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces)
{
return &namespaces->net_ns->sysctls;
}
| 124,743,924,761,211,400,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
31,368 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | __init int net_sysctl_init(void)
{
static struct ctl_table empty[1];
int ret = -ENOMEM;
/* Avoid limitations in the sysctl implementation by
* registering "/proc/sys/net" as an empty directory not in a
* network namespace.
*/
net_header = register_sysctl("net", empty);
if (!net_header)
goto out;
ret = reg... | 101,534,033,433,529,770,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
31,369 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | struct ctl_table_header *register_net_sysctl(struct net *net,
const char *path, struct ctl_table *table)
{
return __register_sysctl_table(&net->sysctls, path, table);
}
| 238,495,525,389,642,440,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
31,370 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | static void __net_exit sysctl_net_exit(struct net *net)
{
retire_sysctl_set(&net->sysctls);
}
| 82,417,181,421,564,410,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
31,371 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | static int __net_init sysctl_net_init(struct net *net)
{
setup_sysctl_set(&net->sysctls, &net_sysctl_root, is_seen);
return 0;
}
| 290,208,308,953,255,870,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
31,372 | linux | 2433c8f094a008895e66f25bd1773cdb01c91d01 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 | net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 0 | void unregister_net_sysctl_table(struct ctl_table_header *header)
{
unregister_sysctl_table(header);
}
| 197,287,648,083,906,880,000,000,000,000,000,000,000 | sysctl_net.c | 167,050,741,138,228,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4270 | The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-4270 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.