idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
31,631
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_ip4_multicast_igmp3_report(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct igmpv3_report *ih; struct igmpv3_grec *grec; int i; int len; int num; int type; int err = 0; __be32 group; u16 vid = 0; if (!pskb_may_pull(skb, sizeof(*ih))) return -EINVA...
97,342,177,360,720,220,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,632
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_ip4_multicast_leave_group(struct net_bridge *br, struct net_bridge_port *port, __be32 group, __u16 vid) { struct br_ip br_group; if (ipv4_is_local_multicast(group)) return; br_group.u.ip4 = group; br_group.proto = htons(ETH_P_IP); br_group.vid = vid; br_multicast_leave_group(...
101,333,224,639,064,340,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,633
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_ip4_multicast_query(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { const struct iphdr *iph = ip_hdr(skb); struct igmphdr *ih = igmp_hdr(skb); struct net_bridge_mdb_entry *mp; struct igmpv3_query *ih3; struct net_bridge_port_group *p; struct net_bridge_port_gr...
335,188,738,674,060,500,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,634
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_ip6_multicast_leave_group(struct net_bridge *br, struct net_bridge_port *port, const struct in6_addr *group, __u16 vid) { struct br_ip br_group; if (!ipv6_is_transient_multicast(group)) return; br_group.u.ip6 = *group; br_group.proto = htons(ETH_P_IPV6); br_group.vid = vid; b...
204,702,727,617,811,140,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,635
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_ip6_multicast_mld2_report(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct icmp6hdr *icmp6h; struct mld2_grec *grec; int i; int len; int num; int err = 0; u16 vid = 0; if (!pskb_may_pull(skb, sizeof(*icmp6h))) return -EINVAL; br_vlan_get_tag(skb, &v...
257,857,492,215,662,960,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,636
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_ip6_multicast_query(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { const struct ipv6hdr *ip6h = ipv6_hdr(skb); struct mld_msg *mld; struct net_bridge_mdb_entry *mp; struct mld2_query *mld2q; struct net_bridge_port_group *p; struct net_bridge_port_group __rcu ...
203,985,641,304,744,500,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,637
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b) { if (a->proto != b->proto) return 0; if (a->vid != b->vid) return 0; switch (a->proto) { case htons(ETH_P_IP): return a->u.ip4 == b->u.ip4; #if IS_ENABLED(CONFIG_IPV6) case htons(ETH_P_IPV6): return ipv6_addr_equal(&a->u.ip6, &b->...
72,220,057,856,396,390,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,638
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb, struct br_ip *ip) { switch (ip->proto) { case htons(ETH_P_IP): return __br_ip4_hash(mdb, ip->u.ip4, ip->vid); #if IS_ENABLED(CONFIG_IPV6) case htons(ETH_P_IPV6): return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid); #endif } return 0; }
142,304,701,156,305,990,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,639
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_mdb_copy(struct net_bridge_mdb_htable *new, struct net_bridge_mdb_htable *old, int elasticity) { struct net_bridge_mdb_entry *mp; int maxlen; int len; int i; for (i = 0; i < old->max; i++) hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver]) hlist_add_head(&mp->hlist[new-...
324,073,996,644,193,500,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,640
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br, struct sk_buff *skb, u16 vid) { struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb); struct br_ip ip; if (br->multicast_disabled) return NULL; if (BR_INPUT_SKB_CB(skb)->igmp) return NULL; ip.proto = skb->protocol; ip.vid = vid; ...
108,436,297,827,022,840,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,641
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static struct net_bridge_mdb_entry *br_mdb_ip4_get( struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid) { struct br_ip br_dst; br_dst.u.ip4 = dst; br_dst.proto = htons(ETH_P_IP); br_dst.vid = vid; return br_mdb_ip_get(mdb, &br_dst); }
258,254,848,198,810,920,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,642
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static struct net_bridge_mdb_entry *br_mdb_ip6_get( struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst, __u16 vid) { struct br_ip br_dst; br_dst.u.ip6 = *dst; br_dst.proto = htons(ETH_P_IPV6); br_dst.vid = vid; return br_mdb_ip_get(mdb, &br_dst); }
75,299,119,836,784,460,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,643
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb, struct br_ip *dst) { if (!mdb) return NULL; return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst)); }
175,688,641,674,159,800,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,644
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max, int elasticity) { struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1); struct net_bridge_mdb_htable *mdb; int err; mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC); if (!mdb) return -ENOMEM; mdb->max = max; mdb->old =...
90,819,179,889,850,900,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,645
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_multicast_add_group(struct net_bridge *br, struct net_bridge_port *port, struct br_ip *group) { struct net_bridge_mdb_entry *mp; struct net_bridge_port_group *p; struct net_bridge_port_group __rcu **pp; int err; spin_lock(&br->multicast_lock); if (!netif_running(br->dev) || (port &...
246,311,261,496,849,150,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,646
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_add_router(struct net_bridge *br, struct net_bridge_port *port) { struct net_bridge_port *p; struct hlist_node *slot = NULL; hlist_for_each_entry(p, &br->router_list, rlist) { if ((unsigned long) port >= (unsigned long) p) break; slot = &p->rlist; } if (slot) hlist_add_a...
103,828,377,344,635,220,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,647
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br, struct br_ip *addr) { switch (addr->proto) { case htons(ETH_P_IP): return br_ip4_multicast_alloc_query(br, addr->u.ip4); #if IS_ENABLED(CONFIG_IPV6) case htons(ETH_P_IPV6): return br_ip6_multicast_alloc_query(br, &addr->u.ip6); #endif ...
97,158,690,486,629,620,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,648
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
void br_multicast_disable_port(struct net_bridge_port *port) { struct net_bridge *br = port->br; struct net_bridge_port_group *pg; struct hlist_node *n; spin_lock(&br->multicast_lock); hlist_for_each_entry_safe(pg, n, &port->mglist, mglist) br_multicast_del_pg(br, pg); if (!hlist_unhashed(&port->rlist)) hli...
100,628,880,187,502,040,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,649
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
void br_multicast_free_pg(struct rcu_head *head) { struct net_bridge_port_group *p = container_of(head, struct net_bridge_port_group, rcu); kfree(p); }
306,430,201,999,488,470,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,650
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static struct net_bridge_mdb_entry *br_multicast_get_group( struct net_bridge *br, struct net_bridge_port *port, struct br_ip *group, int hash) { struct net_bridge_mdb_htable *mdb; struct net_bridge_mdb_entry *mp; unsigned int count = 0; unsigned int max; int elasticity; int err; mdb = rcu_dereference_protect...
317,073,199,299,684,200,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,651
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_group_expired(unsigned long data) { struct net_bridge_mdb_entry *mp = (void *)data; struct net_bridge *br = mp->br; struct net_bridge_mdb_htable *mdb; spin_lock(&br->multicast_lock); if (!netif_running(br->dev) || timer_pending(&mp->timer)) goto out; mp->mglist = false; if (mp->port...
861,074,268,942,525,900,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,652
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
void br_multicast_init(struct net_bridge *br) { br->hash_elasticity = 4; br->hash_max = 512; br->multicast_router = 1; br->multicast_querier = 0; br->multicast_query_use_ifaddr = 0; br->multicast_last_member_count = 2; br->multicast_startup_query_count = 2; br->multicast_last_member_interval = HZ; br->multic...
54,750,497,883,260,250,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,653
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_multicast_ipv4_rcv(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct sk_buff *skb2 = skb; const struct iphdr *iph; struct igmphdr *ih; unsigned int len; unsigned int offset; int err; u16 vid = 0; /* We treat OOM as packet loss for now. */ if (!pskb_may_...
97,375,462,605,000,080,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,654
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static int br_multicast_ipv6_rcv(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { struct sk_buff *skb2; const struct ipv6hdr *ip6h; u8 icmp6_type; u8 nexthdr; __be16 frag_off; unsigned int len; int offset; int err; u16 vid = 0; if (!pskb_may_pull(skb, sizeof(*ip6h))) re...
150,658,476,488,393,400,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,655
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_leave_group(struct net_bridge *br, struct net_bridge_port *port, struct br_ip *group) { struct net_bridge_mdb_htable *mdb; struct net_bridge_mdb_entry *mp; struct net_bridge_port_group *p; unsigned long now; unsigned long time; spin_lock(&br->multicast_lock); if (!neti...
301,280,203,478,301,700,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,656
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br, struct net_bridge_port *port, struct br_ip *group) { struct net_bridge_mdb_htable *mdb; struct net_bridge_mdb_entry *mp; int hash; int err; mdb = rcu_dereference_protected(br->mdb, 1); if (!mdb) { err = br_mdb_rehash(&br->mdb, BR_HASH_...
92,508,426,073,976,460,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,657
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
struct net_bridge_port_group *br_multicast_new_port_group( struct net_bridge_port *port, struct br_ip *group, struct net_bridge_port_group __rcu *next, unsigned char state) { struct net_bridge_port_group *p; p = kzalloc(sizeof(*p), GFP_ATOMIC); if (unlikely(!p)) return NULL; p->addr = *group; p->po...
305,839,331,510,608,260,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,658
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_port_group_expired(unsigned long data) { struct net_bridge_port_group *pg = (void *)data; struct net_bridge *br = pg->port->br; spin_lock(&br->multicast_lock); if (!netif_running(br->dev) || timer_pending(&pg->timer) || hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT) goto ...
318,384,235,264,690,240,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,659
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_querier_expired(unsigned long data) { struct net_bridge *br = (void *)data; spin_lock(&br->multicast_lock); if (!netif_running(br->dev) || br->multicast_disabled) goto out; br_multicast_start_querier(br); out: spin_unlock(&br->multicast_lock); }
216,788,762,880,291,730,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,660
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port, struct sk_buff *skb) { BR_INPUT_SKB_CB(skb)->igmp = 0; BR_INPUT_SKB_CB(skb)->mrouters_only = 0; if (br->multicast_disabled) return 0; switch (skb->protocol) { case htons(ETH_P_IP): return br_multicast_ipv4_rcv(br, port, skb); #i...
234,035,048,492,151,830,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,661
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_send_query(struct net_bridge *br, struct net_bridge_port *port, u32 sent) { unsigned long time; struct br_ip br_group; if (!netif_running(br->dev) || br->multicast_disabled || !br->multicast_querier || timer_pending(&br->multicast_querier_timer)) return; memset(&br_gro...
4,989,570,390,068,303,400,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,662
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
int br_multicast_set_querier(struct net_bridge *br, unsigned long val) { val = !!val; spin_lock_bh(&br->multicast_lock); if (br->multicast_querier == val) goto unlock; br->multicast_querier = val; if (val) br_multicast_start_querier(br); unlock: spin_unlock_bh(&br->multicast_lock); return 0; }
86,391,107,869,792,550,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,663
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
static void br_multicast_start_querier(struct net_bridge *br) { struct net_bridge_port *port; br_multicast_open(br); list_for_each_entry(port, &br->port_list, list) { if (port->state == BR_STATE_DISABLED || port->state == BR_STATE_BLOCKING) continue; __br_multicast_enable_port(port); } }
66,029,396,919,390,250,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,664
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
void br_multicast_stop(struct net_bridge *br) { struct net_bridge_mdb_htable *mdb; struct net_bridge_mdb_entry *mp; struct hlist_node *n; u32 ver; int i; del_timer_sync(&br->multicast_router_timer); del_timer_sync(&br->multicast_querier_timer); del_timer_sync(&br->multicast_query_timer); spin_lock_bh(&br->mu...
260,327,771,367,767,130,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,665
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
int br_multicast_toggle(struct net_bridge *br, unsigned long val) { int err = 0; struct net_bridge_mdb_htable *mdb; spin_lock_bh(&br->multicast_lock); if (br->multicast_disabled == !val) goto unlock; br->multicast_disabled = !val; if (br->multicast_disabled) goto unlock; if (!netif_running(br->dev)) got...
307,116,020,498,551,530,000,000,000,000,000,000,000
br_multicast.c
184,713,466,390,494,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4129
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
https://nvd.nist.gov/vuln/detail/CVE-2013-4129
31,666
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void copy_iovec_hdr(const struct iovec *from, struct iovec *to, size_t len, int iovcount) { int seg = 0; size_t size; while (len && seg < iovcount) { size = min(from->iov_len, len); to->iov_base = from->iov_base; to->iov_len = size; len -= size; ++from; ++to; ++seg; } }
199,688,335,676,426,100,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,667
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static struct socket *get_raw_socket(int fd) { struct { struct sockaddr_ll sa; char buf[MAX_ADDR_LEN]; } uaddr; int uaddr_len = sizeof uaddr, r; struct socket *sock = sockfd_lookup(fd, &r); if (!sock) return ERR_PTR(-ENOTSOCK); /* Parameter checking */ if (sock->sk->sk_type != SOCK_RAW) { r = -ESOCKTN...
30,626,154,520,396,140,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,668
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static struct socket *get_socket(int fd) { struct socket *sock; /* special case to disable backend */ if (fd == -1) return NULL; sock = get_raw_socket(fd); if (!IS_ERR(sock)) return sock; sock = get_tap_socket(fd); if (!IS_ERR(sock)) return sock; return ERR_PTR(-ENOTSOCK); }
1,910,071,814,709,228,600,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,669
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static struct socket *get_tap_socket(int fd) { struct file *file = fget(fd); struct socket *sock; if (!file) return ERR_PTR(-EBADF); sock = tun_get_socket(file); if (!IS_ERR(sock)) return sock; sock = macvtap_get_socket(file); if (IS_ERR(sock)) fput(file); return sock; }
338,356,841,960,301,670,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,670
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void handle_rx(struct vhost_net *net) { struct vhost_net_virtqueue *nvq = &net->vqs[VHOST_NET_VQ_RX]; struct vhost_virtqueue *vq = &nvq->vq; unsigned uninitialized_var(in), log; struct vhost_log *vq_log; struct msghdr msg = { .msg_name = NULL, .msg_namelen = 0, .msg_control = NULL, /* FIXME: get and h...
261,948,532,333,686,420,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,671
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void handle_rx_kick(struct vhost_work *work) { struct vhost_virtqueue *vq = container_of(work, struct vhost_virtqueue, poll.work); struct vhost_net *net = container_of(vq->dev, struct vhost_net, dev); handle_rx(net); }
139,937,413,462,850,490,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,672
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void handle_rx_net(struct vhost_work *work) { struct vhost_net *net = container_of(work, struct vhost_net, poll[VHOST_NET_VQ_RX].work); handle_rx(net); }
213,639,421,397,584,030,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,673
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void handle_tx(struct vhost_net *net) { struct vhost_net_virtqueue *nvq = &net->vqs[VHOST_NET_VQ_TX]; struct vhost_virtqueue *vq = &nvq->vq; unsigned out, in, s; int head; struct msghdr msg = { .msg_name = NULL, .msg_namelen = 0, .msg_control = NULL, .msg_controllen = 0, .msg_iov = vq->iov, .msg...
155,297,231,167,955,380,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,674
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void handle_tx_net(struct vhost_work *work) { struct vhost_net *net = container_of(work, struct vhost_net, poll[VHOST_NET_VQ_TX].work); handle_tx(net); }
130,748,961,639,892,440,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,675
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int move_iovec_hdr(struct iovec *from, struct iovec *to, size_t len, int iov_count) { int seg = 0; size_t size; while (len && seg < iov_count) { size = min(from->iov_len, len); to->iov_base = from->iov_base; to->iov_len = size; from->iov_len -= size; from->iov_base += size; len -= size; ++...
75,985,607,747,628,630,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,676
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int peek_head_len(struct sock *sk) { struct sk_buff *head; int len = 0; unsigned long flags; spin_lock_irqsave(&sk->sk_receive_queue.lock, flags); head = skb_peek(&sk->sk_receive_queue); if (likely(head)) { len = head->len; if (vlan_tx_tag_present(head)) len += VLAN_HLEN; } spin_unlock_irqrestor...
250,051,894,550,359,030,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,677
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_clear_ubuf_info(struct vhost_net *n) { int i; for (i = 0; i < VHOST_NET_VQ_MAX; ++i) { kfree(n->vqs[i].ubuf_info); n->vqs[i].ubuf_info = NULL; } }
16,717,605,545,880,899,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,678
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_disable_vq(struct vhost_net *n, struct vhost_virtqueue *vq) { struct vhost_net_virtqueue *nvq = container_of(vq, struct vhost_net_virtqueue, vq); struct vhost_poll *poll = n->poll + (nvq - n->vqs); if (!vq->private_data) return; vhost_poll_stop(poll); }
63,449,561,619,214,440,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,679
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int vhost_net_enable_vq(struct vhost_net *n, struct vhost_virtqueue *vq) { struct vhost_net_virtqueue *nvq = container_of(vq, struct vhost_net_virtqueue, vq); struct vhost_poll *poll = n->poll + (nvq - n->vqs); struct socket *sock; sock = rcu_dereference_protected(vq->private_data, lockdep_is_he...
229,452,361,913,024,400,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,680
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_enable_zcopy(int vq) { vhost_net_zcopy_mask |= 0x1 << vq; }
180,662,797,390,396,170,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,681
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_exit(void) { misc_deregister(&vhost_net_misc); }
196,830,186,568,450,300,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,682
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_flush(struct vhost_net *n) { vhost_net_flush_vq(n, VHOST_NET_VQ_TX); vhost_net_flush_vq(n, VHOST_NET_VQ_RX); if (n->vqs[VHOST_NET_VQ_TX].ubufs) { mutex_lock(&n->vqs[VHOST_NET_VQ_TX].vq.mutex); n->tx_flush = true; mutex_unlock(&n->vqs[VHOST_NET_VQ_TX].vq.mutex); /* Wait for all lower dev...
34,702,764,523,245,080,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,683
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_flush_vq(struct vhost_net *n, int index) { vhost_poll_flush(n->poll + index); vhost_poll_flush(&n->vqs[index].vq.poll); }
35,549,534,210,188,215,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,684
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int vhost_net_init(void) { if (experimental_zcopytx) vhost_net_enable_zcopy(VHOST_NET_VQ_TX); return misc_register(&vhost_net_misc); }
316,566,009,847,077,700,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,685
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static long vhost_net_ioctl(struct file *f, unsigned int ioctl, unsigned long arg) { struct vhost_net *n = f->private_data; void __user *argp = (void __user *)arg; u64 __user *featurep = argp; struct vhost_vring_file backend; u64 features; int r; switch (ioctl) { case VHOST_NET_SET_BACKEND: if (copy_f...
108,191,677,526,313,650,000,000,000,000,000,000,000
net.c
236,351,763,781,669,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,686
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int vhost_net_open(struct inode *inode, struct file *f) { struct vhost_net *n = kmalloc(sizeof *n, GFP_KERNEL); struct vhost_dev *dev; struct vhost_virtqueue **vqs; int r, i; if (!n) return -ENOMEM; vqs = kmalloc(VHOST_NET_VQ_MAX * sizeof(*vqs), GFP_KERNEL); if (!vqs) { kfree(n); return -ENOMEM; }...
229,198,217,293,515,460,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,687
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int vhost_net_release(struct inode *inode, struct file *f) { struct vhost_net *n = f->private_data; struct socket *tx_sock; struct socket *rx_sock; vhost_net_stop(n, &tx_sock, &rx_sock); vhost_net_flush(n); vhost_dev_stop(&n->dev); vhost_dev_cleanup(&n->dev, false); vhost_net_vq_reset(n); if (tx_sock) ...
42,712,309,109,153,680,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,688
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static long vhost_net_reset_owner(struct vhost_net *n) { struct socket *tx_sock = NULL; struct socket *rx_sock = NULL; long err; struct vhost_memory *memory; mutex_lock(&n->dev.mutex); err = vhost_dev_check_owner(&n->dev); if (err) goto done; memory = vhost_dev_reset_owner_prepare(); if (!memory) { err = ...
43,568,057,260,807,820,000,000,000,000,000,000,000
net.c
236,351,763,781,669,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,689
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int vhost_net_set_features(struct vhost_net *n, u64 features) { size_t vhost_hlen, sock_hlen, hdr_len; int i; hdr_len = (features & (1 << VIRTIO_NET_F_MRG_RXBUF)) ? sizeof(struct virtio_net_hdr_mrg_rxbuf) : sizeof(struct virtio_net_hdr); if (features & (1 << VHOST_NET_F_VIRTIO_NET_HDR)) { /* vhost p...
36,692,941,492,535,124,000,000,000,000,000,000,000
net.c
236,351,763,781,669,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,690
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static long vhost_net_set_owner(struct vhost_net *n) { int r; mutex_lock(&n->dev.mutex); if (vhost_dev_has_owner(&n->dev)) { r = -EBUSY; goto out; } r = vhost_net_set_ubuf_info(n); if (r) goto out; r = vhost_dev_set_owner(&n->dev); if (r) vhost_net_clear_ubuf_info(n); vhost_net_flush(n); out: mutex_u...
169,270,158,730,465,470,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,691
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
int vhost_net_set_ubuf_info(struct vhost_net *n) { bool zcopy; int i; for (i = 0; i < VHOST_NET_VQ_MAX; ++i) { zcopy = vhost_net_zcopy_mask & (0x1 << i); if (!zcopy) continue; n->vqs[i].ubuf_info = kmalloc(sizeof(*n->vqs[i].ubuf_info) * UIO_MAXIOV, GFP_KERNEL); if (!n->vqs[i].ubuf_info) go...
215,337,994,206,334,500,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,692
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_stop(struct vhost_net *n, struct socket **tx_sock, struct socket **rx_sock) { *tx_sock = vhost_net_stop_vq(n, &n->vqs[VHOST_NET_VQ_TX].vq); *rx_sock = vhost_net_stop_vq(n, &n->vqs[VHOST_NET_VQ_RX].vq); }
242,495,743,008,613,600,000,000,000,000,000,000,000
net.c
268,911,689,132,856,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,693
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_tx_packet(struct vhost_net *net) { ++net->tx_packets; if (net->tx_packets < 1024) return; net->tx_packets = 0; net->tx_zcopy_err = 0; }
338,087,418,730,067,940,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,694
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static bool vhost_net_tx_select_zcopy(struct vhost_net *net) { /* TX flush waits for outstanding DMAs to be done. * Don't start new DMAs. */ return !net->tx_flush && net->tx_packets / 64 >= net->tx_zcopy_err; }
7,485,927,288,503,932,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,695
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
vhost_net_ubuf_alloc(struct vhost_virtqueue *vq, bool zcopy) { struct vhost_net_ubuf_ref *ubufs; /* No zero copy backend? Nothing to count. */ if (!zcopy) return NULL; ubufs = kmalloc(sizeof(*ubufs), GFP_KERNEL); if (!ubufs) return ERR_PTR(-ENOMEM); kref_init(&ubufs->kref); init_waitqueue_head(&ubufs->wait);...
104,176,965,554,205,200,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,696
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_net_zerocopy_done_signal(struct kref *kref) { struct vhost_net_ubuf_ref *ubufs; ubufs = container_of(kref, struct vhost_net_ubuf_ref, kref); wake_up(&ubufs->wait); }
23,334,096,491,587,340,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,697
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static bool vhost_sock_zcopy(struct socket *sock) { return unlikely(experimental_zcopytx) && sock_flag(sock->sk, SOCK_ZEROCOPY); }
31,603,831,538,416,627,000,000,000,000,000,000,000
net.c
340,076,013,592,583,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,698
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static void vhost_zerocopy_callback(struct ubuf_info *ubuf, bool success) { struct vhost_net_ubuf_ref *ubufs = ubuf->ctx; struct vhost_virtqueue *vq = ubufs->vq; int cnt = atomic_read(&ubufs->kref.refcount); /* * Trigger polling thread if guest stopped submitting new buffers: * in this case, the refcount after...
331,154,078,388,500,900,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,699
linux
dd7633ecd553a5e304d349aa6f8eb8a0417098c5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd7633ecd553a5e304d349aa6f8eb8a0417098c5
vhost-net: fix use-after-free in vhost_net_flush vhost_net_ubuf_put_and_wait has a confusing name: it will actually also free it's argument. Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01 "vhost-net: flush outstanding DMAs on memory change" vhost_net_flush tries to use the argument after passing it to ...
0
static int vhost_zerocopy_signal_used(struct vhost_net *net, struct vhost_virtqueue *vq) { struct vhost_net_virtqueue *nvq = container_of(vq, struct vhost_net_virtqueue, vq); int i; int j = 0; for (i = nvq->done_idx; i != nvq->upend_idx; i = (i + 1) % UIO_MAXIOV) { if (vq->heads[i].len == VHOST_DMA_F...
52,732,836,131,956,470,000,000,000,000,000,000,000
net.c
61,901,905,992,146,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4127
Use-after-free vulnerability in the vhost_net_set_backend function in drivers/vhost/net.c in the Linux kernel through 3.10.3 allows local users to cause a denial of service (OOPS and system crash) via vectors involving powering on a virtual machine.
https://nvd.nist.gov/vuln/detail/CVE-2013-4127
31,700
linux
307f2fb95e9b96b3577916e73d92e104f8f26494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/307f2fb95e9b96b3577916e73d92e104f8f26494
ipv6: only static routes qualify for equal cost multipathing Static routes in this case are non-expiring routes which did not get configured by autoconf or by icmpv6 redirects. To make sure we actually get an ecmp route while searching for the first one in this fib6_node's leafs, also make sure it matches the ecmp ro...
0
int fib6_add(struct fib6_node *root, struct rt6_info *rt, struct nl_info *info) { struct fib6_node *fn, *pn = NULL; int err = -ENOMEM; int allow_create = 1; int replace_required = 0; if (info->nlh) { if (!(info->nlh->nlmsg_flags & NLM_F_CREATE)) allow_create = 0; if (info->nlh->nlmsg_flags & NLM_F_REPLACE)...
158,843,602,677,462,700,000,000,000,000,000,000,000
ip6_fib.c
287,079,937,670,340,830,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4125
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first t...
https://nvd.nist.gov/vuln/detail/CVE-2013-4125
31,701
linux
307f2fb95e9b96b3577916e73d92e104f8f26494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/307f2fb95e9b96b3577916e73d92e104f8f26494
ipv6: only static routes qualify for equal cost multipathing Static routes in this case are non-expiring routes which did not get configured by autoconf or by icmpv6 redirects. To make sure we actually get an ecmp route while searching for the first one in this fib6_node's leafs, also make sure it matches the ecmp ro...
0
static struct fib6_node * fib6_add_1(struct fib6_node *root, void *addr, int addrlen, int plen, int offset, int allow_create, int replace_required) { struct fib6_node *fn, *in, *ln; struct fib6_node *pn = NULL; struct rt6key *key; int bit; __be32 dir = 0; __u32 sernum = fib6_new_sernum(...
138,558,071,144,738,800,000,000,000,000,000,000,000
ip6_fib.c
287,079,937,670,340,830,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4125
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first t...
https://nvd.nist.gov/vuln/detail/CVE-2013-4125
31,702
linux
307f2fb95e9b96b3577916e73d92e104f8f26494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/307f2fb95e9b96b3577916e73d92e104f8f26494
ipv6: only static routes qualify for equal cost multipathing Static routes in this case are non-expiring routes which did not get configured by autoconf or by icmpv6 redirects. To make sure we actually get an ecmp route while searching for the first one in this fib6_node's leafs, also make sure it matches the ecmp ro...
0
static void fib6_gc_timer_cb(unsigned long arg) { fib6_run_gc(0, (struct net *)arg); }
296,754,128,050,892,850,000,000,000,000,000,000,000
ip6_fib.c
287,079,937,670,340,830,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4125
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first t...
https://nvd.nist.gov/vuln/detail/CVE-2013-4125
31,703
linux
307f2fb95e9b96b3577916e73d92e104f8f26494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/307f2fb95e9b96b3577916e73d92e104f8f26494
ipv6: only static routes qualify for equal cost multipathing Static routes in this case are non-expiring routes which did not get configured by autoconf or by icmpv6 redirects. To make sure we actually get an ecmp route while searching for the first one in this fib6_node's leafs, also make sure it matches the ecmp ro...
0
static struct fib6_node * fib6_lookup_1(struct fib6_node *root, struct lookup_args *args) { struct fib6_node *fn; __be32 dir; if (unlikely(args->offset == 0)) return NULL; /* * Descend on a tree */ fn = root; for (;;) { struct fib6_node *next; dir = addr_bit_set(args->addr, fn->fn_bit); nex...
207,180,660,122,211,400,000,000,000,000,000,000,000
ip6_fib.c
287,079,937,670,340,830,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4125
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first t...
https://nvd.nist.gov/vuln/detail/CVE-2013-4125
31,704
linux
307f2fb95e9b96b3577916e73d92e104f8f26494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/307f2fb95e9b96b3577916e73d92e104f8f26494
ipv6: only static routes qualify for equal cost multipathing Static routes in this case are non-expiring routes which did not get configured by autoconf or by icmpv6 redirects. To make sure we actually get an ecmp route while searching for the first one in this fib6_node's leafs, also make sure it matches the ecmp ro...
0
void fib6_run_gc(unsigned long expires, struct net *net) { if (expires != ~0UL) { spin_lock_bh(&fib6_gc_lock); gc_args.timeout = expires ? (int)expires : net->ipv6.sysctl.ip6_rt_gc_interval; } else { if (!spin_trylock_bh(&fib6_gc_lock)) { mod_timer(&net->ipv6.ip6_fib_timer, jiffies + HZ); return; } ...
39,206,337,693,906,005,000,000,000,000,000,000,000
ip6_fib.c
287,079,937,670,340,830,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4125
The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first t...
https://nvd.nist.gov/vuln/detail/CVE-2013-4125
31,711
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
AllocMidQEntry(const struct smb_hdr *smb_buffer, struct TCP_Server_Info *server) { struct mid_q_entry *temp; if (server == NULL) { cERROR(1, "Null TCP session in AllocMidQEntry"); return NULL; } temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS); if (temp == NULL) return temp; else { memset(temp, 0, sizeof(...
67,645,299,657,220,800,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,712
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
DeleteMidQEntry(struct mid_q_entry *midEntry) { #ifdef CONFIG_CIFS_STATS2 __le16 command = midEntry->server->vals->lock_cmd; unsigned long now; #endif midEntry->mid_state = MID_FREE; atomic_dec(&midCount); if (midEntry->large_buf) cifs_buf_release(midEntry->resp_buf); else cifs_small_buf_release(midEntry->res...
229,784,706,594,471,000,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,713
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
SendReceive(const unsigned int xid, struct cifs_ses *ses, struct smb_hdr *in_buf, struct smb_hdr *out_buf, int *pbytes_returned, const int timeout) { int rc = 0; struct mid_q_entry *midQ; if (ses == NULL) { cERROR(1, "Null smb session"); return -EIO; } if (ses->server == NULL) { cERROR(1, "Null tc...
110,216,786,194,232,600,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,714
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
SendReceive2(const unsigned int xid, struct cifs_ses *ses, struct kvec *iov, int n_vec, int *resp_buf_type /* ret */, const int flags) { int rc = 0; int timeout, optype; struct mid_q_entry *midQ; char *buf = iov[0].iov_base; unsigned int credits = 1; struct smb_rqst rqst = { .rq_iov = iov, .rq_nv...
307,007,524,124,115,580,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,715
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
SendReceiveBlockingLock(const unsigned int xid, struct cifs_tcon *tcon, struct smb_hdr *in_buf, struct smb_hdr *out_buf, int *pbytes_returned) { int rc = 0; int rstart = 0; struct mid_q_entry *midQ; struct cifs_ses *ses; if (tcon == NULL || tcon->ses == NULL) { cERROR(1, "Null smb session"); return ...
64,887,237,402,032,310,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,716
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses, char *in_buf, int flags) { int rc; struct kvec iov[1]; int resp_buf_type; iov[0].iov_base = in_buf; iov[0].iov_len = get_rfc1002_length(in_buf) + 4; flags |= CIFS_NO_RESP; rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags); cFYI(DBG2, "S...
31,190,509,658,205,150,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,717
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf, struct mid_q_entry **ppmidQ) { if (ses->server->tcpStatus == CifsExiting) { return -ENOENT; } if (ses->server->tcpStatus == CifsNeedReconnect) { cFYI(1, "tcp session dead - return to caller to retry"); return -EAGAIN; } if (ses->statu...
223,039,044,392,869,150,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,718
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_call_async(struct TCP_Server_Info *server, struct smb_rqst *rqst, mid_receive_t *receive, mid_callback_t *callback, void *cbdata, const int flags) { int rc, timeout, optype; struct mid_q_entry *mid; timeout = flags & CIFS_TIMEOUT_MASK; optype = flags & CIFS_OP_MASK; rc = wait_for_free_request(server, ti...
80,073,106,366,343,470,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,719
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server, bool log_error) { unsigned int len = get_rfc1002_length(mid->resp_buf) + 4; dump_smb(mid->resp_buf, min_t(u32, 92, len)); /* convert the length into a more usable form */ if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_E...
307,245,936,759,728,850,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,720
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_delete_mid(struct mid_q_entry *mid) { spin_lock(&GlobalMid_Lock); list_del(&mid->qhead); spin_unlock(&GlobalMid_Lock); DeleteMidQEntry(mid); }
20,433,348,361,740,012,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,721
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx, struct kvec *iov) { /* * FIXME: We could avoid this kmap altogether if we used * kernel_sendpage instead of kernel_sendmsg. That will only * work if signing is disabled though as sendpage inlines the * page directly into the fraglist. If usersp...
200,235,483,202,640,960,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,722
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_setup_async_request(struct TCP_Server_Info *server, struct smb_rqst *rqst) { int rc; struct smb_hdr *hdr = (struct smb_hdr *)rqst->rq_iov[0].iov_base; struct mid_q_entry *mid; /* enable signing if server requires it */ if (server->sec_mode & (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) hdr->Flags2 |= SM...
88,481,283,806,486,770,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,723
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_setup_request(struct cifs_ses *ses, struct smb_rqst *rqst) { int rc; struct smb_hdr *hdr = (struct smb_hdr *)rqst->rq_iov[0].iov_base; struct mid_q_entry *mid; rc = allocate_mid(ses, hdr, &mid); if (rc) return ERR_PTR(rc); rc = cifs_sign_rqst(rqst, ses->server, &mid->sequence_number); if (rc) { cifs_de...
241,069,670,184,776,600,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,724
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_sync_mid_result(struct mid_q_entry *mid, struct TCP_Server_Info *server) { int rc = 0; cFYI(1, "%s: cmd=%d mid=%llu state=%d", __func__, le16_to_cpu(mid->command), mid->mid, mid->mid_state); spin_lock(&GlobalMid_Lock); switch (mid->mid_state) { case MID_RESPONSE_RECEIVED: spin_unlock(&GlobalMid_Lock...
284,430,374,917,210,350,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,725
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
cifs_wake_up_task(struct mid_q_entry *mid) { wake_up_process(mid->callback_data); }
1,854,782,539,402,306,700,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,726
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
send_cancel(struct TCP_Server_Info *server, void *buf, struct mid_q_entry *mid) { return server->ops->send_cancel ? server->ops->send_cancel(server, buf, mid) : 0; }
110,755,881,910,230,800,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,727
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
send_lock_cancel(const unsigned int xid, struct cifs_tcon *tcon, struct smb_hdr *in_buf, struct smb_hdr *out_buf) { int bytes_returned; struct cifs_ses *ses = tcon->ses; LOCK_REQ *pSMB = (LOCK_REQ *)in_buf; /* We just modify the current in_buf to change the type of lock from LOCKING_ANDX_SHARED_LOCK ...
23,369,120,829,698,315,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,728
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec) { struct smb_rqst rqst = { .rq_iov = iov, .rq_nvec = n_vec }; return smb_send_rqst(server, &rqst); }
155,107,142,690,052,900,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,729
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
wait_for_free_credits(struct TCP_Server_Info *server, const int timeout, int *credits) { int rc; spin_lock(&server->req_lock); if (timeout == CIFS_ASYNC_OP) { /* oplock breaks must not be held up */ server->in_flight++; *credits -= 1; spin_unlock(&server->req_lock); return 0; } while (1) { if...
183,778,985,911,935,250,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,730
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
wait_for_free_request(struct TCP_Server_Info *server, const int timeout, const int optype) { return wait_for_free_credits(server, timeout, server->ops->get_credits_field(server, optype)); }
267,154,991,812,511,000,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,731
linux
ea702b80e0bbb2448e201472127288beb82ca2fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea702b80e0bbb2448e201472127288beb82ca2fe
cifs: move check for NULL socket into smb_send_rqst Cai reported this oops: [90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028 [90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60 [90701.632167] PGD fea319067 PUD 103fda4067 PMD 0 [90701.637255] Oops: 0000 [#1] SMP ...
0
wait_for_response(struct TCP_Server_Info *server, struct mid_q_entry *midQ) { int error; error = wait_event_freezekillable(server->response_q, midQ->mid_state != MID_REQUEST_SUBMITTED); if (error < 0) return -ERESTARTSYS; return 0; }
112,669,689,266,872,740,000,000,000,000,000,000,000
transport.c
109,712,433,639,111,850,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2013-3302
Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event.
https://nvd.nist.gov/vuln/detail/CVE-2013-3302
31,732
linux
6a76f8c0ab19f215af2a3442870eeb5f0e81998d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6a76f8c0ab19f215af2a3442870eeb5f0e81998d
tracing: Fix possible NULL pointer dereferences Currently set_ftrace_pid and set_graph_function files use seq_lseek for their fops. However seq_open() is called only for FMODE_READ in the fops->open() so that if an user tries to seek one of those file when she open it for writing, it sees NULL seq_file and then panic...
0
static void __add_hash_entry(struct ftrace_hash *hash, struct ftrace_func_entry *entry) { struct hlist_head *hhd; unsigned long key; if (hash->size_bits) key = hash_long(entry->ip, hash->size_bits); else key = 0; hhd = &hash->buckets[key]; hlist_add_head(&entry->hlist, hhd); hash->count++; }
66,607,100,458,899,820,000,000,000,000,000,000,000
ftrace.c
162,419,749,784,779,270,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-3301
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then ...
https://nvd.nist.gov/vuln/detail/CVE-2013-3301
31,733
linux
6a76f8c0ab19f215af2a3442870eeb5f0e81998d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6a76f8c0ab19f215af2a3442870eeb5f0e81998d
tracing: Fix possible NULL pointer dereferences Currently set_ftrace_pid and set_graph_function files use seq_lseek for their fops. However seq_open() is called only for FMODE_READ in the fops->open() so that if an user tries to seek one of those file when she open it for writing, it sees NULL seq_file and then panic...
0
static void __disable_ftrace_function_probe(void) { int ret; int i; if (!ftrace_probe_registered) return; for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) { struct hlist_head *hhd = &ftrace_func_hash[i]; if (hhd->first) return; } /* no more funcs left */ ret = __unregister_ftrace_function(&trace_probe_ops)...
161,014,097,509,467,660,000,000,000,000,000,000,000
ftrace.c
162,419,749,784,779,270,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-3301
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then ...
https://nvd.nist.gov/vuln/detail/CVE-2013-3301
31,734
linux
6a76f8c0ab19f215af2a3442870eeb5f0e81998d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6a76f8c0ab19f215af2a3442870eeb5f0e81998d
tracing: Fix possible NULL pointer dereferences Currently set_ftrace_pid and set_graph_function files use seq_lseek for their fops. However seq_open() is called only for FMODE_READ in the fops->open() so that if an user tries to seek one of those file when she open it for writing, it sees NULL seq_file and then panic...
0
static void __enable_ftrace_function_probe(void) { int ret; int i; if (ftrace_probe_registered) return; for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) { struct hlist_head *hhd = &ftrace_func_hash[i]; if (hhd->first) break; } /* Nothing registered? */ if (i == FTRACE_FUNC_HASHSIZE) return; ret = __regi...
294,854,204,627,370,200,000,000,000,000,000,000,000
ftrace.c
162,419,749,784,779,270,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-3301
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then ...
https://nvd.nist.gov/vuln/detail/CVE-2013-3301
31,735
linux
6a76f8c0ab19f215af2a3442870eeb5f0e81998d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6a76f8c0ab19f215af2a3442870eeb5f0e81998d
tracing: Fix possible NULL pointer dereferences Currently set_ftrace_pid and set_graph_function files use seq_lseek for their fops. However seq_open() is called only for FMODE_READ in the fops->open() so that if an user tries to seek one of those file when she open it for writing, it sees NULL seq_file and then panic...
0
static void __ftrace_hash_rec_update(struct ftrace_ops *ops, int filter_hash, bool inc) { struct ftrace_hash *hash; struct ftrace_hash *other_hash; struct ftrace_page *pg; struct dyn_ftrace *rec; int count = 0; int all = 0; /* Only update if the ops has been registered */ if (!(ops->flags & F...
107,831,196,293,024,000,000,000,000,000,000,000,000
ftrace.c
162,419,749,784,779,270,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-3301
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then ...
https://nvd.nist.gov/vuln/detail/CVE-2013-3301
31,736
linux
6a76f8c0ab19f215af2a3442870eeb5f0e81998d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6a76f8c0ab19f215af2a3442870eeb5f0e81998d
tracing: Fix possible NULL pointer dereferences Currently set_ftrace_pid and set_graph_function files use seq_lseek for their fops. However seq_open() is called only for FMODE_READ in the fops->open() so that if an user tries to seek one of those file when she open it for writing, it sees NULL seq_file and then panic...
0
static int __ftrace_modify_code(void *data) { int *command = data; ftrace_modify_all_code(*command); return 0; }
19,765,870,931,545,104,000,000,000,000,000,000,000
ftrace.c
162,419,749,784,779,270,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-3301
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then ...
https://nvd.nist.gov/vuln/detail/CVE-2013-3301