idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
21,484
uzbl
1958b52d41cba96956dc1995660de49525ed1047
http://github.com/Dieterbe/uzbl
http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047
disable Uzbl javascript object because of security problem.
0
update_title (void) { Behaviour *b = &uzbl.behave; gchar *parsed; if (b->show_status) { if (b->title_format_short) { parsed = expand(b->title_format_short, 0); if (uzbl.gui.main_window) gtk_window_set_title (GTK_WINDOW(uzbl.gui.main_window), parsed); ...
337,049,454,984,981,500,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
https://nvd.nist.gov/vuln/detail/CVE-2010-0011
21,485
FFmpeg
8312e3fc9041027a33c8bc667bb99740fdf41dd5
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5
Do not attempt to decode APE file with no frames This fixes invalid reads/writes with this sample: http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt
0
static void ape_dumpinfo(AVFormatContext * s, APEContext * ape_ctx) { #if ENABLE_DEBUG int i; av_log(s, AV_LOG_DEBUG, "Descriptor Block:\n\n"); av_log(s, AV_LOG_DEBUG, "magic = \"%c%c%c%c\"\n", ape_ctx->magic[0], ape_ctx->magic[1], ape_ctx->magic[2], ape_ctx->magic[3]); av_log(s, AV_LOG_...
47,600,516,648,595,160,000,000,000,000,000,000,000
ape.c
89,322,528,757,637,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-2161
The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames.
https://nvd.nist.gov/vuln/detail/CVE-2011-2161
21,486
FFmpeg
8312e3fc9041027a33c8bc667bb99740fdf41dd5
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5
Do not attempt to decode APE file with no frames This fixes invalid reads/writes with this sample: http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt
0
static int ape_read_close(AVFormatContext * s) { APEContext *ape = s->priv_data; av_freep(&ape->frames); av_freep(&ape->seektable); return 0; }
281,440,613,646,170,950,000,000,000,000,000,000,000
ape.c
89,322,528,757,637,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-2161
The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames.
https://nvd.nist.gov/vuln/detail/CVE-2011-2161
21,487
FFmpeg
8312e3fc9041027a33c8bc667bb99740fdf41dd5
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5
Do not attempt to decode APE file with no frames This fixes invalid reads/writes with this sample: http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt
0
static int ape_read_packet(AVFormatContext * s, AVPacket * pkt) { int ret; int nblocks; APEContext *ape = s->priv_data; uint32_t extra_size = 8; if (s->pb->eof_reached) return AVERROR(EIO); if (ape->currentframe > ape->totalframes) return AVERROR(EIO); avio_seek (s->pb, ape...
93,812,878,949,937,470,000,000,000,000,000,000,000
ape.c
89,322,528,757,637,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-2161
The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames.
https://nvd.nist.gov/vuln/detail/CVE-2011-2161
21,488
FFmpeg
8312e3fc9041027a33c8bc667bb99740fdf41dd5
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5
Do not attempt to decode APE file with no frames This fixes invalid reads/writes with this sample: http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt
0
static int ape_read_seek(AVFormatContext *s, int stream_index, int64_t timestamp, int flags) { AVStream *st = s->streams[stream_index]; APEContext *ape = s->priv_data; int index = av_index_search_timestamp(st, timestamp, flags); if (index < 0) return -1; ape->currentframe = index; retu...
71,908,000,648,119,650,000,000,000,000,000,000,000
ape.c
89,322,528,757,637,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-2161
The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames.
https://nvd.nist.gov/vuln/detail/CVE-2011-2161
21,489
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int authorized_client(CLIENT *opts) { const char *ERRMSG="Invalid entry '%s' in authfile '%s', so, refusing all connections."; FILE *f ; char line[LINELEN]; char *tmp; struct in_addr addr; struct in_addr client; struct in_addr cltemp; int len; if ((f=fopen(opts->server->authname,"r"))==NULL) { msg4(LOG_INF...
197,469,967,995,340,700,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,490
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
SERVER* cmdline(int argc, char *argv[]) { int i=0; int nonspecial=0; int c; struct option long_options[] = { {"read-only", no_argument, NULL, 'r'}, {"multi-file", no_argument, NULL, 'm'}, {"copy-on-write", no_argument, NULL, 'c'}, {"authorize-file", required_argument, NULL, 'l'}, {"config-file", required_...
43,511,366,615,725,590,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,491
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int copyonwrite_prepare(CLIENT* client) { off_t i; if ((client->difffilename = malloc(1024))==NULL) err("Failed to allocate string for diff file name"); snprintf(client->difffilename, 1024, "%s-%s-%d.diff",client->exportname,client->clientname, (int)getpid()) ; client->difffilename[1023]='\0'; msg3(LOG_INFO,"A...
48,286,671,178,890,070,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,492
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void daemonize(SERVER* serve) { FILE*pidf; if(serve && !(serve->port)) { return; } if(daemon(0,0)<0) { err("daemon"); } if(!*pidftemplate) { if(serve) { strncpy(pidftemplate, "/var/run/nbd-server.%d.pid", 255); } else { strncpy(pidftemplate, "/var/run/nbd-server.pid", 255); } } snprintf(pidfnam...
252,611,328,867,890,700,000,000,000,000,000,000,000
nbd-server.c
248,075,128,229,751,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,493
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void destroy_pid_t(gpointer data) { g_free(data); }
209,534,168,169,843,400,000,000,000,000,000,000,000
nbd-server.c
248,075,128,229,751,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,494
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int do_run(gchar* command, gchar* file) { gchar* cmd; int retval=0; if(command && *command) { cmd = g_strdup_printf(command, file); retval=system(cmd); g_free(cmd); } return retval; }
140,130,379,397,299,540,000,000,000,000,000,000,000
nbd-server.c
248,075,128,229,751,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,495
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void dosockopts(int socket) { #ifndef sun int yes=1; #else char yes='1'; #endif /* sun */ int sock_flags; /* lose the pesky "Address already in use" error message */ if (setsockopt(socket,SOL_SOCKET,SO_REUSEADDR,&yes,sizeof(int)) == -1) { err("setsockopt SO_REUSEADDR"); } if (setsockopt(socket,SOL_SOCK...
126,728,750,014,009,670,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,496
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void dump_section(SERVER* serve, gchar* section_header) { printf("[%s]\n", section_header); printf("\texportname = %s\n", serve->exportname); printf("\tlistenaddr = %s\n", serve->listenaddr); printf("\tport = %d\n", serve->port); if(serve->flags & F_READONLY) { printf("\treadonly = true\n"); } if(serve->flags ...
30,779,327,370,724,900,000,000,000,000,000,000,000
nbd-server.c
248,075,128,229,751,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,497
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int expread(off_t a, char *buf, size_t len, CLIENT *client) { off_t rdlen, offset; off_t mapcnt, mapl, maph, pagestart; if (!(client->server->flags & F_COPYONWRITE)) return(rawexpread_fully(a, buf, len, client)); DEBUG3("Asked to read %d bytes at %llu.\n", len, (unsigned long long)a); mapl=a/DIFFPAGESIZE; maph...
132,437,474,310,531,000,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,498
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int expwrite(off_t a, char *buf, size_t len, CLIENT *client) { char pagebuf[DIFFPAGESIZE]; off_t mapcnt,mapl,maph; off_t wrlen,rdlen; off_t pagestart; off_t offset; if (!(client->server->flags & F_COPYONWRITE)) return(rawexpwrite_fully(a, buf, len, client)); DEBUG3("Asked to write %d bytes at %llu.\n", len,...
103,257,955,703,750,210,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,499
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int get_filepos(GArray* export, off_t a, int* fhandle, off_t* foffset, size_t* maxbytes ) { /* Negative offset not allowed */ if(a < 0) return -1; /* Binary search for last file with starting offset <= a */ FILE_INFO fi; int start = 0; int end = export->len - 1; while( start <= end ) { int mid = (start + en...
174,427,607,419,231,380,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,500
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void killchild(gpointer key, gpointer value, gpointer user_data) { pid_t *pid=value; int *parent=user_data; kill(*pid, SIGTERM); *parent=1; }
153,246,586,945,655,130,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,501
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int main(int argc, char *argv[]) { SERVER *serve; GArray *servers; GError *err=NULL; if (sizeof( struct nbd_request )!=28) { fprintf(stderr,"Bad size of structure. Alignment problems?\n"); exit(EXIT_FAILURE) ; } memset(pidftemplate, '\0', 256); logging(); config_file_pos = g_strdup(CFILE); serve=cmdline...
281,604,474,823,638,030,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,502
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void myseek(int handle,off_t a) { if (lseek(handle, a, SEEK_SET) < 0) { err("Can not seek locally!\n"); } }
142,853,188,256,884,620,000,000,000,000,000,000,000
nbd-server.c
248,075,128,229,751,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,503
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
CLIENT* negotiate(int net, CLIENT *client, GArray* servers) { char zeros[128]; uint64_t size_host; uint32_t flags = NBD_FLAG_HAS_FLAGS; uint16_t smallflags = 0; uint64_t magic; memset(zeros, '\0', sizeof(zeros)); if(!client || !client->modern) { /* common */ if (write(net, INIT_PASSWD, 8) < 0) { err_nonf...
299,426,344,373,163,870,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,504
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void open_modern(void) { struct addrinfo hints; struct addrinfo* ai = NULL; struct sock_flags; int e; memset(&hints, '\0', sizeof(hints)); hints.ai_flags = AI_PASSIVE | AI_ADDRCONFIG; hints.ai_socktype = SOCK_STREAM; hints.ai_family = AF_UNSPEC; hints.ai_protocol = IPPROTO_TCP; e = getaddrinfo(modern_listen,...
27,667,123,062,358,075,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,505
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int rawexpread_fully(off_t a, char *buf, size_t len, CLIENT *client) { ssize_t ret=0; while(len > 0 && (ret=rawexpread(a, buf, len, client)) > 0 ) { a += ret; buf += ret; len -= ret; } return (ret < 0 || len != 0); }
51,370,181,773,088,580,000,000,000,000,000,000,000
nbd-server.c
248,075,128,229,751,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,506
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
ssize_t rawexpwrite(off_t a, char *buf, size_t len, CLIENT *client) { int fhandle; off_t foffset; size_t maxbytes; ssize_t retval; if(get_filepos(client->export, a, &fhandle, &foffset, &maxbytes)) return -1; if(maxbytes && len > maxbytes) len = maxbytes; DEBUG4("(WRITE to fd %d offset %llu len %u), ", fhan...
256,338,337,216,596,060,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,507
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int rawexpwrite_fully(off_t a, char *buf, size_t len, CLIENT *client) { ssize_t ret=0; while(len > 0 && (ret=rawexpwrite(a, buf, len, client)) > 0 ) { a += ret; buf += ret; len -= ret; } return (ret < 0 || len != 0); }
158,945,911,407,479,060,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,508
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
inline void readit(int f, void *buf, size_t len) { ssize_t res; while (len > 0) { DEBUG("*"); if ((res = read(f, buf, len)) <= 0) { if(errno != EAGAIN) { err("Read failed: %m"); } } else { len -= res; buf += res; } } }
63,067,520,201,509,620,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,509
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void remove_server(gpointer s) { SERVER *server; server=(SERVER*)s; g_free(server->exportname); if(server->authname) g_free(server->authname); if(server->listenaddr) g_free(server->listenaddr); if(server->prerun) g_free(server->prerun); if(server->postrun) g_free(server->postrun); g_free(server); }
78,762,731,415,478,720,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,510
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void serve_err(SERVER* serve, const char* msg) { g_message("Export of %s on port %d failed:", serve->exportname, serve->port); err(msg); }
75,751,171,619,565,490,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,511
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void serveconnection(CLIENT *client) { if(do_run(client->server->prerun, client->exportname)) { exit(EXIT_FAILURE); } setupexport(client); if (client->server->flags & F_COPYONWRITE) { copyonwrite_prepare(client); } setmysockopt(client->net); mainloop(client); do_run(client->server->postrun, client->expor...
267,164,421,136,113,070,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,512
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void set_peername(int net, CLIENT *client) { struct sockaddr_storage addrin; struct sockaddr_storage netaddr; struct sockaddr_in *netaddr4 = NULL; struct sockaddr_in6 *netaddr6 = NULL; size_t addrinlen = sizeof( addrin ); struct addrinfo hints; struct addrinfo *ai = NULL; char peername[NI_MAXHOST]; char netna...
313,399,576,351,569,100,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,513
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
int setup_serve(SERVER *serve) { struct addrinfo hints; struct addrinfo *ai = NULL; gchar *port = NULL; int e; if(!do_oldstyle) { return serve->servename ? 1 : 0; } memset(&hints,'\0',sizeof(hints)); hints.ai_flags = AI_PASSIVE | AI_ADDRCONFIG | AI_NUMERICSERV; hints.ai_socktype = SOCK_STREAM; hints.ai_fam...
5,281,766,934,356,153,700,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,514
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void setup_servers(GArray* servers) { int i; struct sigaction sa; int want_modern=0; for(i=0;i<servers->len;i++) { want_modern |= setup_serve(&(g_array_index(servers, SERVER, i))); } if(want_modern) { open_modern(); } children=g_hash_table_new_full(g_int_hash, g_int_equal, NULL, destroy_pid_t); sa.sa_han...
257,834,388,697,328,050,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,515
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void setupexport(CLIENT* client) { int i; off_t laststartoff = 0, lastsize = 0; int multifile = (client->server->flags & F_MULTIFILE); client->export = g_array_new(TRUE, TRUE, sizeof(FILE_INFO)); /* If multi-file, open as many files as we can. * If not, open exactly one file. * Calculate file sizes as we go ...
58,382,503,236,280,020,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,516
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void sigchld_handler(int s) { int status; int* i; pid_t pid; while((pid=waitpid(-1, &status, WNOHANG)) > 0) { if(WIFEXITED(status)) { msg3(LOG_INFO, "Child exited with %d", WEXITSTATUS(status)); } i=g_hash_table_lookup(children, &pid); if(!i) { msg3(LOG_INFO, "SIGCHLD received for an unknown c...
258,350,777,777,054,750,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,517
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void sigterm_handler(int s) { int parent=0; g_hash_table_foreach(children, killchild, &parent); if(parent) { unlink(pidfname); } exit(EXIT_SUCCESS); }
119,310,273,672,404,330,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,518
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
off_t size_autodetect(int fhandle) { off_t es; u64 bytes; struct stat stat_buf; int error; #ifdef HAVE_SYS_MOUNT_H #ifdef HAVE_SYS_IOCTL_H #ifdef BLKGETSIZE64 DEBUG("looking for export size with ioctl BLKGETSIZE64\n"); if (!ioctl(fhandle, BLKGETSIZE64, &bytes) && bytes) { return (off_t)bytes; } #endif /* BLKG...
71,707,655,193,071,740,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,519
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
void usage() { printf("This is nbd-server version " VERSION "\n"); printf("Usage: [ip:|ip6@]port file_to_export [size][kKmM] [-l authorize_file] [-r] [-m] [-c] [-C configuration file] [-p PID file name] [-o section name] [-M max connections]\n" "\t-r|--read-only\t\tread only\n" "\t-m|--multi-file\t\tm...
196,065,297,819,952,300,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,520
nbd
3ef52043861ab16352d49af89e048ba6339d6df8
https://github.com/yoe/nbd
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
0
inline void writeit(int f, void *buf, size_t len) { ssize_t res; while (len > 0) { DEBUG("+"); if ((res = write(f, buf, len)) <= 0) err("Send failed: %m"); len -= res; buf += res; } }
83,162,606,114,484,120,000,000,000,000,000,000,000
nbd-server.c
215,605,186,871,532,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
https://nvd.nist.gov/vuln/detail/CVE-2011-0530
21,544
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int __ref __add_pages(int nid, struct zone *zone, unsigned long phys_start_pfn, unsigned long nr_pages) { unsigned long i; int err = 0; int start_sec, end_sec; /* during initialize mem_map, align hot-added range to section */ start_sec = pfn_to_section_nr(phys_start_pfn); end_sec = pfn_to_section_nr(phys_start...
19,417,869,054,740,804,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,545
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static int __meminit __add_section(int nid, struct zone *zone, unsigned long phys_start_pfn) { int nr_pages = PAGES_PER_SECTION; int ret; if (pfn_valid(phys_start_pfn)) return -EEXIST; ret = sparse_add_one_section(zone, phys_start_pfn, nr_pages); if (ret < 0) return ret; ret = __add_zone(zone, phys_s...
105,647,194,092,335,520,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,546
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static int __meminit __add_zone(struct zone *zone, unsigned long phys_start_pfn) { struct pglist_data *pgdat = zone->zone_pgdat; int nr_pages = PAGES_PER_SECTION; int nid = pgdat->node_id; int zone_type; unsigned long flags; zone_type = zone - pgdat->node_zones; if (!zone->wait_table) { int ret; ret = init...
229,683,015,057,091,150,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,547
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
void __online_page_free(struct page *page) { ClearPageReserved(page); init_page_count(page); __free_page(page); }
268,959,363,959,333,100,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,548
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
void __online_page_increment_counters(struct page *page) { totalram_pages++; #ifdef CONFIG_HIGHMEM if (PageHighMem(page)) totalhigh_pages++; #endif }
17,392,727,453,965,355,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,549
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int __remove_pages(struct zone *zone, unsigned long phys_start_pfn, unsigned long nr_pages) { unsigned long i, ret = 0; int sections_to_remove; /* * We can only remove entire sections */ BUG_ON(phys_start_pfn & ~PAGE_SECTION_MASK); BUG_ON(nr_pages % PAGES_PER_SECTION); sections_to_remove = nr_pages / PAG...
105,492,741,844,417,530,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,550
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static int __remove_section(struct zone *zone, struct mem_section *ms) { /* * XXX: Freeing memmap with vmemmap is not implement yet. * This should be removed later. */ return -EBUSY; }
66,445,319,540,431,910,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,551
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static int __remove_section(struct zone *zone, struct mem_section *ms) { unsigned long flags; struct pglist_data *pgdat = zone->zone_pgdat; int ret = -EINVAL; if (!valid_section(ms)) return ret; ret = unregister_memory_section(ms); if (ret) return ret; pgdat_resize_lock(pgdat, &flags); sparse_remove_one_...
226,174,030,666,887,000,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,552
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int __ref add_memory(int nid, u64 start, u64 size) { pg_data_t *pgdat = NULL; int new_pgdat = 0; struct resource *res; int ret; lock_memory_hotplug(); res = register_memory_resource(start, size); ret = -EEXIST; if (!res) goto out; if (!node_online(nid)) { pgdat = hotadd_new_pgdat(nid, start); ret = -E...
325,957,432,454,792,900,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,553
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
check_pages_isolated(unsigned long start_pfn, unsigned long end_pfn) { long offlined = 0; int ret; ret = walk_system_ram_range(start_pfn, end_pfn - start_pfn, &offlined, check_pages_isolated_cb); if (ret < 0) offlined = (long)ret; return offlined; }
148,809,305,982,652,630,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,554
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
check_pages_isolated_cb(unsigned long start_pfn, unsigned long nr_pages, void *data) { int ret; long offlined = *(long *)data; ret = test_pages_isolated(start_pfn, start_pfn + nr_pages); offlined = nr_pages; if (!ret) *(long *)data += offlined; return ret; }
109,913,179,941,004,380,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,555
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
do_migrate_range(unsigned long start_pfn, unsigned long end_pfn) { unsigned long pfn; struct page *page; int move_pages = NR_OFFLINE_AT_ONCE_PAGES; int not_managed = 0; int ret = 0; LIST_HEAD(source); for (pfn = start_pfn; pfn < end_pfn && move_pages > 0; pfn++) { if (!pfn_valid(pfn)) continue; page = pf...
62,934,053,640,585,060,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,556
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static void generic_online_page(struct page *page) { __online_page_set_limits(page); __online_page_increment_counters(page); __online_page_free(page); }
48,931,731,409,382,980,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,557
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static void get_page_bootmem(unsigned long info, struct page *page, unsigned long type) { page->lru.next = (struct list_head *) type; SetPagePrivate(page); set_page_private(page, info); atomic_inc(&page->_count); }
195,871,500,567,335,760,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,558
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static void grow_pgdat_span(struct pglist_data *pgdat, unsigned long start_pfn, unsigned long end_pfn) { unsigned long old_pgdat_end_pfn = pgdat->node_start_pfn + pgdat->node_spanned_pages; if (start_pfn < pgdat->node_start_pfn) pgdat->node_start_pfn = start_pfn; pgdat->node_spanned_pages = max(old_pgda...
34,101,596,569,200,540,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,559
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static void grow_zone_span(struct zone *zone, unsigned long start_pfn, unsigned long end_pfn) { unsigned long old_zone_end_pfn; zone_span_writelock(zone); old_zone_end_pfn = zone->zone_start_pfn + zone->spanned_pages; if (start_pfn < zone->zone_start_pfn) zone->zone_start_pfn = start_pfn; zone->spanned_...
98,931,125,227,291,800,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,560
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static pg_data_t __ref *hotadd_new_pgdat(int nid, u64 start) { struct pglist_data *pgdat; unsigned long zones_size[MAX_NR_ZONES] = {0}; unsigned long zholes_size[MAX_NR_ZONES] = {0}; unsigned long start_pfn = start >> PAGE_SHIFT; pgdat = arch_alloc_nodedata(nid); if (!pgdat) return NULL; arch_refresh_nodedat...
218,832,729,616,507,400,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,561
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
hotremove_migrate_alloc(struct page *page, unsigned long private, int **x) { /* This should be improooooved!! */ return alloc_page(GFP_HIGHUSER_MOVABLE); }
126,591,051,274,893,880,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,562
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
void lock_memory_hotplug(void) { mutex_lock(&mem_hotplug_mutex); /* for exclusive hibernation if CONFIG_HIBERNATION=y */ lock_system_sleep(); }
58,044,775,032,648,700,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,563
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int mem_online_node(int nid) { pg_data_t *pgdat; int ret; lock_memory_hotplug(); pgdat = hotadd_new_pgdat(nid, 0); if (!pgdat) { ret = -ENOMEM; goto out; } node_set_online(nid); ret = register_one_node(nid); BUG_ON(ret); out: unlock_memory_hotplug(); return ret; }
39,906,992,640,628,730,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,564
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static struct page *next_active_pageblock(struct page *page) { /* Ensure the starting page is pageblock-aligned */ BUG_ON(page_to_pfn(page) & (pageblock_nr_pages - 1)); /* If the entire pageblock is free, move to the end of free page */ if (pageblock_free(page)) { int order; /* be careful. we don't have locks,...
98,300,036,101,743,100,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,565
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
offline_isolated_pages_cb(unsigned long start, unsigned long nr_pages, void *data) { __offline_isolated_pages(start, start + nr_pages); return 0; }
106,920,697,236,542,510,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,566
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static inline int pageblock_free(struct page *page) { return PageBuddy(page) && page_order(page) >= pageblock_order; }
172,775,057,761,277,560,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,567
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
void __ref put_page_bootmem(struct page *page) { unsigned long type; type = (unsigned long) page->lru.next; BUG_ON(type < MEMORY_HOTPLUG_MIN_BOOTMEM_TYPE || type > MEMORY_HOTPLUG_MAX_BOOTMEM_TYPE); if (atomic_dec_return(&page->_count) == 1) { ClearPagePrivate(page); set_page_private(page, 0); INIT_L...
298,971,026,542,195,100,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,568
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static struct resource *register_memory_resource(u64 start, u64 size) { struct resource *res; res = kzalloc(sizeof(struct resource), GFP_KERNEL); BUG_ON(!res); res->name = "System RAM"; res->start = start; res->end = start + size - 1; res->flags = IORESOURCE_MEM | IORESOURCE_BUSY; if (request_resource(&iomem_r...
263,525,933,298,240,370,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,569
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
void register_page_bootmem_info_node(struct pglist_data *pgdat) { unsigned long i, pfn, end_pfn, nr_pages; int node = pgdat->node_id; struct page *page; struct zone *zone; nr_pages = PAGE_ALIGN(sizeof(struct pglist_data)) >> PAGE_SHIFT; page = virt_to_page(pgdat); for (i = 0; i < nr_pages; i++, page++) get_p...
114,081,648,769,825,550,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,570
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int remove_memory(u64 start, u64 size) { unsigned long start_pfn, end_pfn; start_pfn = PFN_DOWN(start); end_pfn = start_pfn + PFN_DOWN(size); return offline_pages(start_pfn, end_pfn, 120 * HZ); }
112,894,765,192,039,380,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,571
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int remove_memory(u64 start, u64 size) { return -EINVAL; }
169,206,088,632,361,470,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,572
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
int restore_online_page_callback(online_page_callback_t callback) { int rc = -EINVAL; lock_memory_hotplug(); if (online_page_callback == callback) { online_page_callback = generic_online_page; rc = 0; } unlock_memory_hotplug(); return rc; }
150,402,910,841,978,560,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,573
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static void rollback_node_hotadd(int nid, pg_data_t *pgdat) { arch_refresh_nodedata(nid, NULL); arch_free_nodedata(pgdat); return; }
29,213,377,815,598,306,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,574
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static unsigned long scan_lru_pages(unsigned long start, unsigned long end) { unsigned long pfn; struct page *page; for (pfn = start; pfn < end; pfn++) { if (pfn_valid(pfn)) { page = pfn_to_page(pfn); if (PageLRU(page)) return pfn; } } return 0; }
66,589,968,732,839,660,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,575
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
static int test_pages_in_a_zone(unsigned long start_pfn, unsigned long end_pfn) { unsigned long pfn; struct zone *zone = NULL; struct page *page; int i; for (pfn = start_pfn; pfn < end_pfn; pfn += MAX_ORDER_NR_PAGES) { i = 0; /* This is just a CONFIG_HOLES_IN_ZONE check.*/ while ((i < MAX_ORDER_N...
116,313,455,808,307,950,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,576
linux
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
0
void unlock_memory_hotplug(void) { unlock_system_sleep(); mutex_unlock(&mem_hotplug_mutex); }
297,460,574,509,323,320,000,000,000,000,000,000,000
memory_hotplug.c
234,056,103,817,400,300,000,000,000,000,000,000,000
[]
CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
https://nvd.nist.gov/vuln/detail/CVE-2012-5517
21,577
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static u32 alpha(struct illinois *ca, u32 da, u32 dm) { u32 d1 = dm / 100; /* Low threshold */ if (da <= d1) { /* If never got out of low delay zone, then use max */ if (!ca->rtt_above) return ALPHA_MAX; /* Wait for 5 good RTT's before allowing alpha to go alpha max. * This prevents one good RTT from ca...
269,213,373,329,981,250,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,578
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static inline u32 avg_delay(const struct illinois *ca) { u64 t = ca->sum_rtt; do_div(t, ca->cnt_rtt); return t - ca->base_rtt; }
174,548,158,535,444,800,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,579
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static u32 beta(u32 da, u32 dm) { u32 d2, d3; d2 = dm / 10; if (da <= d2) return BETA_MIN; d3 = (8 * dm) / 10; if (da >= d3 || d3 <= d2) return BETA_MAX; /* * Based on: * * bmin d3 - bmax d2 * k3 = ------------------- * d3 - d2 * * bmax - bmin * k4 = ------------- * ...
99,845,736,615,372,400,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,580
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static inline u32 max_delay(const struct illinois *ca) { return ca->max_rtt - ca->base_rtt; }
58,732,200,591,914,125,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,581
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void rtt_reset(struct sock *sk) { struct tcp_sock *tp = tcp_sk(sk); struct illinois *ca = inet_csk_ca(sk); ca->end_seq = tp->snd_nxt; ca->cnt_rtt = 0; ca->sum_rtt = 0; /* TODO: age max_rtt? */ }
168,498,623,581,798,580,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,582
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void tcp_illinois_acked(struct sock *sk, u32 pkts_acked, s32 rtt) { struct illinois *ca = inet_csk_ca(sk); ca->acked = pkts_acked; /* dup ack, no rtt sample */ if (rtt < 0) return; /* ignore bogus values, this prevents wraparound in alpha math */ if (rtt > RTT_MAX) rtt = RTT_MAX; /* keep track of ...
104,474,895,837,321,690,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,583
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void tcp_illinois_cong_avoid(struct sock *sk, u32 ack, u32 in_flight) { struct tcp_sock *tp = tcp_sk(sk); struct illinois *ca = inet_csk_ca(sk); if (after(ack, ca->end_seq)) update_params(sk); /* RFC2861 only increase cwnd if fully utilized */ if (!tcp_is_cwnd_limited(sk, in_flight)) return; /* In s...
51,152,993,735,840,850,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,584
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void tcp_illinois_init(struct sock *sk) { struct illinois *ca = inet_csk_ca(sk); ca->alpha = ALPHA_MAX; ca->beta = BETA_BASE; ca->base_rtt = 0x7fffffff; ca->max_rtt = 0; ca->acked = 0; ca->rtt_low = 0; ca->rtt_above = 0; rtt_reset(sk); }
166,072,037,282,540,810,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,585
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static int __init tcp_illinois_register(void) { BUILD_BUG_ON(sizeof(struct illinois) > ICSK_CA_PRIV_SIZE); return tcp_register_congestion_control(&tcp_illinois); }
295,622,923,565,813,960,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,586
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static u32 tcp_illinois_ssthresh(struct sock *sk) { struct tcp_sock *tp = tcp_sk(sk); struct illinois *ca = inet_csk_ca(sk); /* Multiplicative decrease */ return max(tp->snd_cwnd - ((tp->snd_cwnd * ca->beta) >> BETA_SHIFT), 2U); }
108,348,812,466,897,500,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,587
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void tcp_illinois_state(struct sock *sk, u8 new_state) { struct illinois *ca = inet_csk_ca(sk); if (new_state == TCP_CA_Loss) { ca->alpha = ALPHA_BASE; ca->beta = BETA_BASE; ca->rtt_low = 0; ca->rtt_above = 0; rtt_reset(sk); } }
328,721,057,693,749,180,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,588
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void __exit tcp_illinois_unregister(void) { tcp_unregister_congestion_control(&tcp_illinois); }
41,785,222,287,653,554,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,589
linux
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
0
static void update_params(struct sock *sk) { struct tcp_sock *tp = tcp_sk(sk); struct illinois *ca = inet_csk_ca(sk); if (tp->snd_cwnd < win_thresh) { ca->alpha = ALPHA_BASE; ca->beta = BETA_BASE; } else if (ca->cnt_rtt > 0) { u32 dm = max_delay(ca); u32 da = avg_delay(ca); ca->alpha = alpha(ca, da, dm)...
102,840,911,344,518,630,000,000,000,000,000,000,000
tcp_illinois.c
332,081,189,501,460,950,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
https://nvd.nist.gov/vuln/detail/CVE-2012-4565
21,652
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE2(listen, int, fd, int, backlog) { struct socket *sock; int err, fput_needed; int somaxconn; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock) { somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn; if ((unsigned int)backlog > somaxconn) backlog = somaxconn; err = security_soc...
183,554,383,754,479,600,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,653
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE2(shutdown, int, fd, int, how) { int err, fput_needed; struct socket *sock; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock != NULL) { err = security_socket_shutdown(sock, how); if (!err) err = sock->ops->shutdown(sock, how); fput_light(sock->file, fput_needed); } return err; ...
109,729,444,998,086,600,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,654
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol) { int retval; struct socket *sock; int flags; /* Check the SOCK_* constants for consistency. */ BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC); BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK); BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK); BUIL...
301,223,713,679,658,550,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,655
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen) { struct socket *sock; struct sockaddr_storage address; int err, fput_needed; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock) { err = move_addr_to_kernel(umyaddr, addrlen, &address); if (err >= 0) { err = security...
166,834,260,272,054,920,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,656
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr, int, addrlen) { struct socket *sock; struct sockaddr_storage address; int err, fput_needed; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (!sock) goto out; err = move_addr_to_kernel(uservaddr, addrlen, &address); if (err < 0) ...
114,730,531,196,545,260,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,657
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr, int __user *, usockaddr_len) { struct socket *sock; struct sockaddr_storage address; int len, err, fput_needed; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (!sock) goto out; err = security_socket_getsockname(sock); if (er...
6,761,547,869,686,874,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,658
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr, int __user *, usockaddr_len) { struct socket *sock; struct sockaddr_storage address; int len, err, fput_needed; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock != NULL) { err = security_socket_getpeername(sock); if (err)...
75,770,114,521,998,310,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,659
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned int, flags) { int fput_needed, err; struct msghdr msg_sys; struct socket *sock = sockfd_lookup_light(fd, &err, &fput_needed); if (!sock) goto out; err = __sys_sendmsg(sock, msg, &msg_sys, flags, NULL); fput_light(sock->file, fput_needed)...
244,750,970,220,436,880,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,660
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE3(recvmsg, int, fd, struct msghdr __user *, msg, unsigned int, flags) { int fput_needed, err; struct msghdr msg_sys; struct socket *sock = sockfd_lookup_light(fd, &err, &fput_needed); if (!sock) goto out; err = __sys_recvmsg(sock, msg, &msg_sys, flags, 0); fput_light(sock->file, fput_needed);...
326,996,564,297,690,950,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,661
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol, int __user *, usockvec) { struct socket *sock1, *sock2; int fd1, fd2, err; struct file *newfile1, *newfile2; int flags; flags = type & ~SOCK_TYPE_MASK; if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) return -EINVAL; type &= SOCK_TYPE_MASK; if...
194,819,499,021,053,400,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,662
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr, int __user *, upeer_addrlen, int, flags) { struct socket *sock, *newsock; struct file *newfile; int err, len, newfd, fput_needed; struct sockaddr_storage address; if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) return -EINVAL; if (SOCK...
32,735,664,406,787,680,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,663
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg, unsigned int, vlen, unsigned int, flags) { return __sys_sendmmsg(fd, mmsg, vlen, flags); }
226,896,755,484,001,240,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,664
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname, char __user *, optval, int, optlen) { int err, fput_needed; struct socket *sock; if (optlen < 0) return -EINVAL; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock != NULL) { err = security_socket_setsockopt(sock, level, optname); i...
189,089,540,143,901,750,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,665
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname, char __user *, optval, int __user *, optlen) { int err, fput_needed; struct socket *sock; sock = sockfd_lookup_light(fd, &err, &fput_needed); if (sock != NULL) { err = security_socket_getsockopt(sock, level, optname); if (err) goto out_put; ...
168,102,954,246,918,340,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,666
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg, unsigned int, vlen, unsigned int, flags, struct timespec __user *, timeout) { int datagrams; struct timespec timeout_sys; if (!timeout) return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL); if (copy_from_user(&timeout_sys, timeout, sizeof(timeo...
58,235,888,195,955,510,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,667
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len, unsigned int, flags, struct sockaddr __user *, addr, int, addr_len) { struct socket *sock; struct sockaddr_storage address; int err; struct msghdr msg; struct iovec iov; int fput_needed; if (len > INT_MAX) len = INT_MAX; sock = sockfd_loo...
219,945,376,795,102,600,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,668
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP); struct timespec ts[3]; int empty = 1; struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb); /* Race occurred between timestamp enabling and packet receiv...
234,832,476,226,041,340,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467