idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
21,484 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | update_title (void) {
Behaviour *b = &uzbl.behave;
gchar *parsed;
if (b->show_status) {
if (b->title_format_short) {
parsed = expand(b->title_format_short, 0);
if (uzbl.gui.main_window)
gtk_window_set_title (GTK_WINDOW(uzbl.gui.main_window), parsed);
... | 337,049,454,984,981,500,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,485 | FFmpeg | 8312e3fc9041027a33c8bc667bb99740fdf41dd5 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5 | Do not attempt to decode APE file with no frames
This fixes invalid reads/writes with this sample:
http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt | 0 | static void ape_dumpinfo(AVFormatContext * s, APEContext * ape_ctx)
{
#if ENABLE_DEBUG
int i;
av_log(s, AV_LOG_DEBUG, "Descriptor Block:\n\n");
av_log(s, AV_LOG_DEBUG, "magic = \"%c%c%c%c\"\n", ape_ctx->magic[0], ape_ctx->magic[1], ape_ctx->magic[2], ape_ctx->magic[3]);
av_log(s, AV_LOG_... | 47,600,516,648,595,160,000,000,000,000,000,000,000 | ape.c | 89,322,528,757,637,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-2161 | The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames. | https://nvd.nist.gov/vuln/detail/CVE-2011-2161 |
21,486 | FFmpeg | 8312e3fc9041027a33c8bc667bb99740fdf41dd5 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5 | Do not attempt to decode APE file with no frames
This fixes invalid reads/writes with this sample:
http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt | 0 | static int ape_read_close(AVFormatContext * s)
{
APEContext *ape = s->priv_data;
av_freep(&ape->frames);
av_freep(&ape->seektable);
return 0;
}
| 281,440,613,646,170,950,000,000,000,000,000,000,000 | ape.c | 89,322,528,757,637,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-2161 | The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames. | https://nvd.nist.gov/vuln/detail/CVE-2011-2161 |
21,487 | FFmpeg | 8312e3fc9041027a33c8bc667bb99740fdf41dd5 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5 | Do not attempt to decode APE file with no frames
This fixes invalid reads/writes with this sample:
http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt | 0 | static int ape_read_packet(AVFormatContext * s, AVPacket * pkt)
{
int ret;
int nblocks;
APEContext *ape = s->priv_data;
uint32_t extra_size = 8;
if (s->pb->eof_reached)
return AVERROR(EIO);
if (ape->currentframe > ape->totalframes)
return AVERROR(EIO);
avio_seek (s->pb, ape... | 93,812,878,949,937,470,000,000,000,000,000,000,000 | ape.c | 89,322,528,757,637,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-2161 | The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames. | https://nvd.nist.gov/vuln/detail/CVE-2011-2161 |
21,488 | FFmpeg | 8312e3fc9041027a33c8bc667bb99740fdf41dd5 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5 | Do not attempt to decode APE file with no frames
This fixes invalid reads/writes with this sample:
http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt | 0 | static int ape_read_seek(AVFormatContext *s, int stream_index, int64_t timestamp, int flags)
{
AVStream *st = s->streams[stream_index];
APEContext *ape = s->priv_data;
int index = av_index_search_timestamp(st, timestamp, flags);
if (index < 0)
return -1;
ape->currentframe = index;
retu... | 71,908,000,648,119,650,000,000,000,000,000,000,000 | ape.c | 89,322,528,757,637,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-2161 | The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames. | https://nvd.nist.gov/vuln/detail/CVE-2011-2161 |
21,489 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int authorized_client(CLIENT *opts) {
const char *ERRMSG="Invalid entry '%s' in authfile '%s', so, refusing all connections.";
FILE *f ;
char line[LINELEN];
char *tmp;
struct in_addr addr;
struct in_addr client;
struct in_addr cltemp;
int len;
if ((f=fopen(opts->server->authname,"r"))==NULL) {
msg4(LOG_INF... | 197,469,967,995,340,700,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,490 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | SERVER* cmdline(int argc, char *argv[]) {
int i=0;
int nonspecial=0;
int c;
struct option long_options[] = {
{"read-only", no_argument, NULL, 'r'},
{"multi-file", no_argument, NULL, 'm'},
{"copy-on-write", no_argument, NULL, 'c'},
{"authorize-file", required_argument, NULL, 'l'},
{"config-file", required_... | 43,511,366,615,725,590,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,491 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int copyonwrite_prepare(CLIENT* client) {
off_t i;
if ((client->difffilename = malloc(1024))==NULL)
err("Failed to allocate string for diff file name");
snprintf(client->difffilename, 1024, "%s-%s-%d.diff",client->exportname,client->clientname,
(int)getpid()) ;
client->difffilename[1023]='\0';
msg3(LOG_INFO,"A... | 48,286,671,178,890,070,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,492 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void daemonize(SERVER* serve) {
FILE*pidf;
if(serve && !(serve->port)) {
return;
}
if(daemon(0,0)<0) {
err("daemon");
}
if(!*pidftemplate) {
if(serve) {
strncpy(pidftemplate, "/var/run/nbd-server.%d.pid", 255);
} else {
strncpy(pidftemplate, "/var/run/nbd-server.pid", 255);
}
}
snprintf(pidfnam... | 252,611,328,867,890,700,000,000,000,000,000,000,000 | nbd-server.c | 248,075,128,229,751,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,493 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void destroy_pid_t(gpointer data) {
g_free(data);
}
| 209,534,168,169,843,400,000,000,000,000,000,000,000 | nbd-server.c | 248,075,128,229,751,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,494 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int do_run(gchar* command, gchar* file) {
gchar* cmd;
int retval=0;
if(command && *command) {
cmd = g_strdup_printf(command, file);
retval=system(cmd);
g_free(cmd);
}
return retval;
}
| 140,130,379,397,299,540,000,000,000,000,000,000,000 | nbd-server.c | 248,075,128,229,751,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,495 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void dosockopts(int socket) {
#ifndef sun
int yes=1;
#else
char yes='1';
#endif /* sun */
int sock_flags;
/* lose the pesky "Address already in use" error message */
if (setsockopt(socket,SOL_SOCKET,SO_REUSEADDR,&yes,sizeof(int)) == -1) {
err("setsockopt SO_REUSEADDR");
}
if (setsockopt(socket,SOL_SOCK... | 126,728,750,014,009,670,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,496 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void dump_section(SERVER* serve, gchar* section_header) {
printf("[%s]\n", section_header);
printf("\texportname = %s\n", serve->exportname);
printf("\tlistenaddr = %s\n", serve->listenaddr);
printf("\tport = %d\n", serve->port);
if(serve->flags & F_READONLY) {
printf("\treadonly = true\n");
}
if(serve->flags ... | 30,779,327,370,724,900,000,000,000,000,000,000,000 | nbd-server.c | 248,075,128,229,751,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,497 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int expread(off_t a, char *buf, size_t len, CLIENT *client) {
off_t rdlen, offset;
off_t mapcnt, mapl, maph, pagestart;
if (!(client->server->flags & F_COPYONWRITE))
return(rawexpread_fully(a, buf, len, client));
DEBUG3("Asked to read %d bytes at %llu.\n", len, (unsigned long long)a);
mapl=a/DIFFPAGESIZE; maph... | 132,437,474,310,531,000,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,498 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int expwrite(off_t a, char *buf, size_t len, CLIENT *client) {
char pagebuf[DIFFPAGESIZE];
off_t mapcnt,mapl,maph;
off_t wrlen,rdlen;
off_t pagestart;
off_t offset;
if (!(client->server->flags & F_COPYONWRITE))
return(rawexpwrite_fully(a, buf, len, client));
DEBUG3("Asked to write %d bytes at %llu.\n", len,... | 103,257,955,703,750,210,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,499 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int get_filepos(GArray* export, off_t a, int* fhandle, off_t* foffset, size_t* maxbytes ) {
/* Negative offset not allowed */
if(a < 0)
return -1;
/* Binary search for last file with starting offset <= a */
FILE_INFO fi;
int start = 0;
int end = export->len - 1;
while( start <= end ) {
int mid = (start + en... | 174,427,607,419,231,380,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,500 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void killchild(gpointer key, gpointer value, gpointer user_data) {
pid_t *pid=value;
int *parent=user_data;
kill(*pid, SIGTERM);
*parent=1;
}
| 153,246,586,945,655,130,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,501 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int main(int argc, char *argv[]) {
SERVER *serve;
GArray *servers;
GError *err=NULL;
if (sizeof( struct nbd_request )!=28) {
fprintf(stderr,"Bad size of structure. Alignment problems?\n");
exit(EXIT_FAILURE) ;
}
memset(pidftemplate, '\0', 256);
logging();
config_file_pos = g_strdup(CFILE);
serve=cmdline... | 281,604,474,823,638,030,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,502 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void myseek(int handle,off_t a) {
if (lseek(handle, a, SEEK_SET) < 0) {
err("Can not seek locally!\n");
}
}
| 142,853,188,256,884,620,000,000,000,000,000,000,000 | nbd-server.c | 248,075,128,229,751,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,503 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | CLIENT* negotiate(int net, CLIENT *client, GArray* servers) {
char zeros[128];
uint64_t size_host;
uint32_t flags = NBD_FLAG_HAS_FLAGS;
uint16_t smallflags = 0;
uint64_t magic;
memset(zeros, '\0', sizeof(zeros));
if(!client || !client->modern) {
/* common */
if (write(net, INIT_PASSWD, 8) < 0) {
err_nonf... | 299,426,344,373,163,870,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,504 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void open_modern(void) {
struct addrinfo hints;
struct addrinfo* ai = NULL;
struct sock_flags;
int e;
memset(&hints, '\0', sizeof(hints));
hints.ai_flags = AI_PASSIVE | AI_ADDRCONFIG;
hints.ai_socktype = SOCK_STREAM;
hints.ai_family = AF_UNSPEC;
hints.ai_protocol = IPPROTO_TCP;
e = getaddrinfo(modern_listen,... | 27,667,123,062,358,075,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,505 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int rawexpread_fully(off_t a, char *buf, size_t len, CLIENT *client) {
ssize_t ret=0;
while(len > 0 && (ret=rawexpread(a, buf, len, client)) > 0 ) {
a += ret;
buf += ret;
len -= ret;
}
return (ret < 0 || len != 0);
}
| 51,370,181,773,088,580,000,000,000,000,000,000,000 | nbd-server.c | 248,075,128,229,751,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,506 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | ssize_t rawexpwrite(off_t a, char *buf, size_t len, CLIENT *client) {
int fhandle;
off_t foffset;
size_t maxbytes;
ssize_t retval;
if(get_filepos(client->export, a, &fhandle, &foffset, &maxbytes))
return -1;
if(maxbytes && len > maxbytes)
len = maxbytes;
DEBUG4("(WRITE to fd %d offset %llu len %u), ", fhan... | 256,338,337,216,596,060,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,507 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int rawexpwrite_fully(off_t a, char *buf, size_t len, CLIENT *client) {
ssize_t ret=0;
while(len > 0 && (ret=rawexpwrite(a, buf, len, client)) > 0 ) {
a += ret;
buf += ret;
len -= ret;
}
return (ret < 0 || len != 0);
}
| 158,945,911,407,479,060,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,508 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | inline void readit(int f, void *buf, size_t len) {
ssize_t res;
while (len > 0) {
DEBUG("*");
if ((res = read(f, buf, len)) <= 0) {
if(errno != EAGAIN) {
err("Read failed: %m");
}
} else {
len -= res;
buf += res;
}
}
}
| 63,067,520,201,509,620,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,509 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void remove_server(gpointer s) {
SERVER *server;
server=(SERVER*)s;
g_free(server->exportname);
if(server->authname)
g_free(server->authname);
if(server->listenaddr)
g_free(server->listenaddr);
if(server->prerun)
g_free(server->prerun);
if(server->postrun)
g_free(server->postrun);
g_free(server);
}
| 78,762,731,415,478,720,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,510 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void serve_err(SERVER* serve, const char* msg) {
g_message("Export of %s on port %d failed:", serve->exportname,
serve->port);
err(msg);
}
| 75,751,171,619,565,490,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,511 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void serveconnection(CLIENT *client) {
if(do_run(client->server->prerun, client->exportname)) {
exit(EXIT_FAILURE);
}
setupexport(client);
if (client->server->flags & F_COPYONWRITE) {
copyonwrite_prepare(client);
}
setmysockopt(client->net);
mainloop(client);
do_run(client->server->postrun, client->expor... | 267,164,421,136,113,070,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,512 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void set_peername(int net, CLIENT *client) {
struct sockaddr_storage addrin;
struct sockaddr_storage netaddr;
struct sockaddr_in *netaddr4 = NULL;
struct sockaddr_in6 *netaddr6 = NULL;
size_t addrinlen = sizeof( addrin );
struct addrinfo hints;
struct addrinfo *ai = NULL;
char peername[NI_MAXHOST];
char netna... | 313,399,576,351,569,100,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,513 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | int setup_serve(SERVER *serve) {
struct addrinfo hints;
struct addrinfo *ai = NULL;
gchar *port = NULL;
int e;
if(!do_oldstyle) {
return serve->servename ? 1 : 0;
}
memset(&hints,'\0',sizeof(hints));
hints.ai_flags = AI_PASSIVE | AI_ADDRCONFIG | AI_NUMERICSERV;
hints.ai_socktype = SOCK_STREAM;
hints.ai_fam... | 5,281,766,934,356,153,700,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,514 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void setup_servers(GArray* servers) {
int i;
struct sigaction sa;
int want_modern=0;
for(i=0;i<servers->len;i++) {
want_modern |= setup_serve(&(g_array_index(servers, SERVER, i)));
}
if(want_modern) {
open_modern();
}
children=g_hash_table_new_full(g_int_hash, g_int_equal, NULL, destroy_pid_t);
sa.sa_han... | 257,834,388,697,328,050,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,515 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void setupexport(CLIENT* client) {
int i;
off_t laststartoff = 0, lastsize = 0;
int multifile = (client->server->flags & F_MULTIFILE);
client->export = g_array_new(TRUE, TRUE, sizeof(FILE_INFO));
/* If multi-file, open as many files as we can.
* If not, open exactly one file.
* Calculate file sizes as we go ... | 58,382,503,236,280,020,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,516 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void sigchld_handler(int s) {
int status;
int* i;
pid_t pid;
while((pid=waitpid(-1, &status, WNOHANG)) > 0) {
if(WIFEXITED(status)) {
msg3(LOG_INFO, "Child exited with %d", WEXITSTATUS(status));
}
i=g_hash_table_lookup(children, &pid);
if(!i) {
msg3(LOG_INFO, "SIGCHLD received for an unknown c... | 258,350,777,777,054,750,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,517 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void sigterm_handler(int s) {
int parent=0;
g_hash_table_foreach(children, killchild, &parent);
if(parent) {
unlink(pidfname);
}
exit(EXIT_SUCCESS);
}
| 119,310,273,672,404,330,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,518 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | off_t size_autodetect(int fhandle) {
off_t es;
u64 bytes;
struct stat stat_buf;
int error;
#ifdef HAVE_SYS_MOUNT_H
#ifdef HAVE_SYS_IOCTL_H
#ifdef BLKGETSIZE64
DEBUG("looking for export size with ioctl BLKGETSIZE64\n");
if (!ioctl(fhandle, BLKGETSIZE64, &bytes) && bytes) {
return (off_t)bytes;
}
#endif /* BLKG... | 71,707,655,193,071,740,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,519 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | void usage() {
printf("This is nbd-server version " VERSION "\n");
printf("Usage: [ip:|ip6@]port file_to_export [size][kKmM] [-l authorize_file] [-r] [-m] [-c] [-C configuration file] [-p PID file name] [-o section name] [-M max connections]\n"
"\t-r|--read-only\t\tread only\n"
"\t-m|--multi-file\t\tm... | 196,065,297,819,952,300,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,520 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 0 | inline void writeit(int f, void *buf, size_t len) {
ssize_t res;
while (len > 0) {
DEBUG("+");
if ((res = write(f, buf, len)) <= 0)
err("Send failed: %m");
len -= res;
buf += res;
}
}
| 83,162,606,114,484,120,000,000,000,000,000,000,000 | nbd-server.c | 215,605,186,871,532,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
21,544 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int __ref __add_pages(int nid, struct zone *zone, unsigned long phys_start_pfn,
unsigned long nr_pages)
{
unsigned long i;
int err = 0;
int start_sec, end_sec;
/* during initialize mem_map, align hot-added range to section */
start_sec = pfn_to_section_nr(phys_start_pfn);
end_sec = pfn_to_section_nr(phys_start... | 19,417,869,054,740,804,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,545 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static int __meminit __add_section(int nid, struct zone *zone,
unsigned long phys_start_pfn)
{
int nr_pages = PAGES_PER_SECTION;
int ret;
if (pfn_valid(phys_start_pfn))
return -EEXIST;
ret = sparse_add_one_section(zone, phys_start_pfn, nr_pages);
if (ret < 0)
return ret;
ret = __add_zone(zone, phys_s... | 105,647,194,092,335,520,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,546 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static int __meminit __add_zone(struct zone *zone, unsigned long phys_start_pfn)
{
struct pglist_data *pgdat = zone->zone_pgdat;
int nr_pages = PAGES_PER_SECTION;
int nid = pgdat->node_id;
int zone_type;
unsigned long flags;
zone_type = zone - pgdat->node_zones;
if (!zone->wait_table) {
int ret;
ret = init... | 229,683,015,057,091,150,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,547 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | void __online_page_free(struct page *page)
{
ClearPageReserved(page);
init_page_count(page);
__free_page(page);
}
| 268,959,363,959,333,100,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,548 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | void __online_page_increment_counters(struct page *page)
{
totalram_pages++;
#ifdef CONFIG_HIGHMEM
if (PageHighMem(page))
totalhigh_pages++;
#endif
}
| 17,392,727,453,965,355,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,549 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int __remove_pages(struct zone *zone, unsigned long phys_start_pfn,
unsigned long nr_pages)
{
unsigned long i, ret = 0;
int sections_to_remove;
/*
* We can only remove entire sections
*/
BUG_ON(phys_start_pfn & ~PAGE_SECTION_MASK);
BUG_ON(nr_pages % PAGES_PER_SECTION);
sections_to_remove = nr_pages / PAG... | 105,492,741,844,417,530,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,550 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static int __remove_section(struct zone *zone, struct mem_section *ms)
{
/*
* XXX: Freeing memmap with vmemmap is not implement yet.
* This should be removed later.
*/
return -EBUSY;
}
| 66,445,319,540,431,910,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,551 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static int __remove_section(struct zone *zone, struct mem_section *ms)
{
unsigned long flags;
struct pglist_data *pgdat = zone->zone_pgdat;
int ret = -EINVAL;
if (!valid_section(ms))
return ret;
ret = unregister_memory_section(ms);
if (ret)
return ret;
pgdat_resize_lock(pgdat, &flags);
sparse_remove_one_... | 226,174,030,666,887,000,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,552 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int __ref add_memory(int nid, u64 start, u64 size)
{
pg_data_t *pgdat = NULL;
int new_pgdat = 0;
struct resource *res;
int ret;
lock_memory_hotplug();
res = register_memory_resource(start, size);
ret = -EEXIST;
if (!res)
goto out;
if (!node_online(nid)) {
pgdat = hotadd_new_pgdat(nid, start);
ret = -E... | 325,957,432,454,792,900,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,553 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | check_pages_isolated(unsigned long start_pfn, unsigned long end_pfn)
{
long offlined = 0;
int ret;
ret = walk_system_ram_range(start_pfn, end_pfn - start_pfn, &offlined,
check_pages_isolated_cb);
if (ret < 0)
offlined = (long)ret;
return offlined;
}
| 148,809,305,982,652,630,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,554 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | check_pages_isolated_cb(unsigned long start_pfn, unsigned long nr_pages,
void *data)
{
int ret;
long offlined = *(long *)data;
ret = test_pages_isolated(start_pfn, start_pfn + nr_pages);
offlined = nr_pages;
if (!ret)
*(long *)data += offlined;
return ret;
}
| 109,913,179,941,004,380,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,555 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | do_migrate_range(unsigned long start_pfn, unsigned long end_pfn)
{
unsigned long pfn;
struct page *page;
int move_pages = NR_OFFLINE_AT_ONCE_PAGES;
int not_managed = 0;
int ret = 0;
LIST_HEAD(source);
for (pfn = start_pfn; pfn < end_pfn && move_pages > 0; pfn++) {
if (!pfn_valid(pfn))
continue;
page = pf... | 62,934,053,640,585,060,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,556 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static void generic_online_page(struct page *page)
{
__online_page_set_limits(page);
__online_page_increment_counters(page);
__online_page_free(page);
}
| 48,931,731,409,382,980,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,557 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static void get_page_bootmem(unsigned long info, struct page *page,
unsigned long type)
{
page->lru.next = (struct list_head *) type;
SetPagePrivate(page);
set_page_private(page, info);
atomic_inc(&page->_count);
}
| 195,871,500,567,335,760,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,558 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static void grow_pgdat_span(struct pglist_data *pgdat, unsigned long start_pfn,
unsigned long end_pfn)
{
unsigned long old_pgdat_end_pfn =
pgdat->node_start_pfn + pgdat->node_spanned_pages;
if (start_pfn < pgdat->node_start_pfn)
pgdat->node_start_pfn = start_pfn;
pgdat->node_spanned_pages = max(old_pgda... | 34,101,596,569,200,540,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,559 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static void grow_zone_span(struct zone *zone, unsigned long start_pfn,
unsigned long end_pfn)
{
unsigned long old_zone_end_pfn;
zone_span_writelock(zone);
old_zone_end_pfn = zone->zone_start_pfn + zone->spanned_pages;
if (start_pfn < zone->zone_start_pfn)
zone->zone_start_pfn = start_pfn;
zone->spanned_... | 98,931,125,227,291,800,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,560 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static pg_data_t __ref *hotadd_new_pgdat(int nid, u64 start)
{
struct pglist_data *pgdat;
unsigned long zones_size[MAX_NR_ZONES] = {0};
unsigned long zholes_size[MAX_NR_ZONES] = {0};
unsigned long start_pfn = start >> PAGE_SHIFT;
pgdat = arch_alloc_nodedata(nid);
if (!pgdat)
return NULL;
arch_refresh_nodedat... | 218,832,729,616,507,400,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,561 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | hotremove_migrate_alloc(struct page *page, unsigned long private, int **x)
{
/* This should be improooooved!! */
return alloc_page(GFP_HIGHUSER_MOVABLE);
}
| 126,591,051,274,893,880,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,562 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | void lock_memory_hotplug(void)
{
mutex_lock(&mem_hotplug_mutex);
/* for exclusive hibernation if CONFIG_HIBERNATION=y */
lock_system_sleep();
}
| 58,044,775,032,648,700,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,563 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int mem_online_node(int nid)
{
pg_data_t *pgdat;
int ret;
lock_memory_hotplug();
pgdat = hotadd_new_pgdat(nid, 0);
if (!pgdat) {
ret = -ENOMEM;
goto out;
}
node_set_online(nid);
ret = register_one_node(nid);
BUG_ON(ret);
out:
unlock_memory_hotplug();
return ret;
}
| 39,906,992,640,628,730,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,564 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static struct page *next_active_pageblock(struct page *page)
{
/* Ensure the starting page is pageblock-aligned */
BUG_ON(page_to_pfn(page) & (pageblock_nr_pages - 1));
/* If the entire pageblock is free, move to the end of free page */
if (pageblock_free(page)) {
int order;
/* be careful. we don't have locks,... | 98,300,036,101,743,100,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,565 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | offline_isolated_pages_cb(unsigned long start, unsigned long nr_pages,
void *data)
{
__offline_isolated_pages(start, start + nr_pages);
return 0;
}
| 106,920,697,236,542,510,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,566 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static inline int pageblock_free(struct page *page)
{
return PageBuddy(page) && page_order(page) >= pageblock_order;
}
| 172,775,057,761,277,560,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,567 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | void __ref put_page_bootmem(struct page *page)
{
unsigned long type;
type = (unsigned long) page->lru.next;
BUG_ON(type < MEMORY_HOTPLUG_MIN_BOOTMEM_TYPE ||
type > MEMORY_HOTPLUG_MAX_BOOTMEM_TYPE);
if (atomic_dec_return(&page->_count) == 1) {
ClearPagePrivate(page);
set_page_private(page, 0);
INIT_L... | 298,971,026,542,195,100,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,568 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static struct resource *register_memory_resource(u64 start, u64 size)
{
struct resource *res;
res = kzalloc(sizeof(struct resource), GFP_KERNEL);
BUG_ON(!res);
res->name = "System RAM";
res->start = start;
res->end = start + size - 1;
res->flags = IORESOURCE_MEM | IORESOURCE_BUSY;
if (request_resource(&iomem_r... | 263,525,933,298,240,370,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,569 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | void register_page_bootmem_info_node(struct pglist_data *pgdat)
{
unsigned long i, pfn, end_pfn, nr_pages;
int node = pgdat->node_id;
struct page *page;
struct zone *zone;
nr_pages = PAGE_ALIGN(sizeof(struct pglist_data)) >> PAGE_SHIFT;
page = virt_to_page(pgdat);
for (i = 0; i < nr_pages; i++, page++)
get_p... | 114,081,648,769,825,550,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,570 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int remove_memory(u64 start, u64 size)
{
unsigned long start_pfn, end_pfn;
start_pfn = PFN_DOWN(start);
end_pfn = start_pfn + PFN_DOWN(size);
return offline_pages(start_pfn, end_pfn, 120 * HZ);
}
| 112,894,765,192,039,380,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,571 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int remove_memory(u64 start, u64 size)
{
return -EINVAL;
}
| 169,206,088,632,361,470,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,572 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | int restore_online_page_callback(online_page_callback_t callback)
{
int rc = -EINVAL;
lock_memory_hotplug();
if (online_page_callback == callback) {
online_page_callback = generic_online_page;
rc = 0;
}
unlock_memory_hotplug();
return rc;
}
| 150,402,910,841,978,560,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,573 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static void rollback_node_hotadd(int nid, pg_data_t *pgdat)
{
arch_refresh_nodedata(nid, NULL);
arch_free_nodedata(pgdat);
return;
}
| 29,213,377,815,598,306,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,574 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static unsigned long scan_lru_pages(unsigned long start, unsigned long end)
{
unsigned long pfn;
struct page *page;
for (pfn = start; pfn < end; pfn++) {
if (pfn_valid(pfn)) {
page = pfn_to_page(pfn);
if (PageLRU(page))
return pfn;
}
}
return 0;
}
| 66,589,968,732,839,660,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,575 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | static int test_pages_in_a_zone(unsigned long start_pfn, unsigned long end_pfn)
{
unsigned long pfn;
struct zone *zone = NULL;
struct page *page;
int i;
for (pfn = start_pfn;
pfn < end_pfn;
pfn += MAX_ORDER_NR_PAGES) {
i = 0;
/* This is just a CONFIG_HOLES_IN_ZONE check.*/
while ((i < MAX_ORDER_N... | 116,313,455,808,307,950,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,576 | linux | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 0 | void unlock_memory_hotplug(void)
{
unlock_system_sleep();
mutex_unlock(&mem_hotplug_mutex);
}
| 297,460,574,509,323,320,000,000,000,000,000,000,000 | memory_hotplug.c | 234,056,103,817,400,300,000,000,000,000,000,000,000 | [] | CVE-2012-5517 | The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. | https://nvd.nist.gov/vuln/detail/CVE-2012-5517 |
21,577 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static u32 alpha(struct illinois *ca, u32 da, u32 dm)
{
u32 d1 = dm / 100; /* Low threshold */
if (da <= d1) {
/* If never got out of low delay zone, then use max */
if (!ca->rtt_above)
return ALPHA_MAX;
/* Wait for 5 good RTT's before allowing alpha to go alpha max.
* This prevents one good RTT from ca... | 269,213,373,329,981,250,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,578 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static inline u32 avg_delay(const struct illinois *ca)
{
u64 t = ca->sum_rtt;
do_div(t, ca->cnt_rtt);
return t - ca->base_rtt;
}
| 174,548,158,535,444,800,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,579 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static u32 beta(u32 da, u32 dm)
{
u32 d2, d3;
d2 = dm / 10;
if (da <= d2)
return BETA_MIN;
d3 = (8 * dm) / 10;
if (da >= d3 || d3 <= d2)
return BETA_MAX;
/*
* Based on:
*
* bmin d3 - bmax d2
* k3 = -------------------
* d3 - d2
*
* bmax - bmin
* k4 = -------------
* ... | 99,845,736,615,372,400,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,580 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static inline u32 max_delay(const struct illinois *ca)
{
return ca->max_rtt - ca->base_rtt;
}
| 58,732,200,591,914,125,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,581 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void rtt_reset(struct sock *sk)
{
struct tcp_sock *tp = tcp_sk(sk);
struct illinois *ca = inet_csk_ca(sk);
ca->end_seq = tp->snd_nxt;
ca->cnt_rtt = 0;
ca->sum_rtt = 0;
/* TODO: age max_rtt? */
}
| 168,498,623,581,798,580,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,582 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void tcp_illinois_acked(struct sock *sk, u32 pkts_acked, s32 rtt)
{
struct illinois *ca = inet_csk_ca(sk);
ca->acked = pkts_acked;
/* dup ack, no rtt sample */
if (rtt < 0)
return;
/* ignore bogus values, this prevents wraparound in alpha math */
if (rtt > RTT_MAX)
rtt = RTT_MAX;
/* keep track of ... | 104,474,895,837,321,690,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,583 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void tcp_illinois_cong_avoid(struct sock *sk, u32 ack, u32 in_flight)
{
struct tcp_sock *tp = tcp_sk(sk);
struct illinois *ca = inet_csk_ca(sk);
if (after(ack, ca->end_seq))
update_params(sk);
/* RFC2861 only increase cwnd if fully utilized */
if (!tcp_is_cwnd_limited(sk, in_flight))
return;
/* In s... | 51,152,993,735,840,850,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,584 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void tcp_illinois_init(struct sock *sk)
{
struct illinois *ca = inet_csk_ca(sk);
ca->alpha = ALPHA_MAX;
ca->beta = BETA_BASE;
ca->base_rtt = 0x7fffffff;
ca->max_rtt = 0;
ca->acked = 0;
ca->rtt_low = 0;
ca->rtt_above = 0;
rtt_reset(sk);
}
| 166,072,037,282,540,810,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,585 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static int __init tcp_illinois_register(void)
{
BUILD_BUG_ON(sizeof(struct illinois) > ICSK_CA_PRIV_SIZE);
return tcp_register_congestion_control(&tcp_illinois);
}
| 295,622,923,565,813,960,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,586 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static u32 tcp_illinois_ssthresh(struct sock *sk)
{
struct tcp_sock *tp = tcp_sk(sk);
struct illinois *ca = inet_csk_ca(sk);
/* Multiplicative decrease */
return max(tp->snd_cwnd - ((tp->snd_cwnd * ca->beta) >> BETA_SHIFT), 2U);
}
| 108,348,812,466,897,500,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,587 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void tcp_illinois_state(struct sock *sk, u8 new_state)
{
struct illinois *ca = inet_csk_ca(sk);
if (new_state == TCP_CA_Loss) {
ca->alpha = ALPHA_BASE;
ca->beta = BETA_BASE;
ca->rtt_low = 0;
ca->rtt_above = 0;
rtt_reset(sk);
}
}
| 328,721,057,693,749,180,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,588 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void __exit tcp_illinois_unregister(void)
{
tcp_unregister_congestion_control(&tcp_illinois);
}
| 41,785,222,287,653,554,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,589 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 0 | static void update_params(struct sock *sk)
{
struct tcp_sock *tp = tcp_sk(sk);
struct illinois *ca = inet_csk_ca(sk);
if (tp->snd_cwnd < win_thresh) {
ca->alpha = ALPHA_BASE;
ca->beta = BETA_BASE;
} else if (ca->cnt_rtt > 0) {
u32 dm = max_delay(ca);
u32 da = avg_delay(ca);
ca->alpha = alpha(ca, da, dm)... | 102,840,911,344,518,630,000,000,000,000,000,000,000 | tcp_illinois.c | 332,081,189,501,460,950,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
21,652 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE2(listen, int, fd, int, backlog)
{
struct socket *sock;
int err, fput_needed;
int somaxconn;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock) {
somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
if ((unsigned int)backlog > somaxconn)
backlog = somaxconn;
err = security_soc... | 183,554,383,754,479,600,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,653 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE2(shutdown, int, fd, int, how)
{
int err, fput_needed;
struct socket *sock;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock != NULL) {
err = security_socket_shutdown(sock, how);
if (!err)
err = sock->ops->shutdown(sock, how);
fput_light(sock->file, fput_needed);
}
return err;
... | 109,729,444,998,086,600,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,654 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
{
int retval;
struct socket *sock;
int flags;
/* Check the SOCK_* constants for consistency. */
BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
BUIL... | 301,223,713,679,658,550,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,655 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
{
struct socket *sock;
struct sockaddr_storage address;
int err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock) {
err = move_addr_to_kernel(umyaddr, addrlen, &address);
if (err >= 0) {
err = security... | 166,834,260,272,054,920,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,656 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
int, addrlen)
{
struct socket *sock;
struct sockaddr_storage address;
int err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = move_addr_to_kernel(uservaddr, addrlen, &address);
if (err < 0)
... | 114,730,531,196,545,260,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,657 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
int __user *, usockaddr_len)
{
struct socket *sock;
struct sockaddr_storage address;
int len, err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = security_socket_getsockname(sock);
if (er... | 6,761,547,869,686,874,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,658 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
int __user *, usockaddr_len)
{
struct socket *sock;
struct sockaddr_storage address;
int len, err, fput_needed;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock != NULL) {
err = security_socket_getpeername(sock);
if (err)... | 75,770,114,521,998,310,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,659 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned int, flags)
{
int fput_needed, err;
struct msghdr msg_sys;
struct socket *sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = __sys_sendmsg(sock, msg, &msg_sys, flags, NULL);
fput_light(sock->file, fput_needed)... | 244,750,970,220,436,880,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,660 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE3(recvmsg, int, fd, struct msghdr __user *, msg,
unsigned int, flags)
{
int fput_needed, err;
struct msghdr msg_sys;
struct socket *sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (!sock)
goto out;
err = __sys_recvmsg(sock, msg, &msg_sys, flags, 0);
fput_light(sock->file, fput_needed);... | 326,996,564,297,690,950,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,661 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
int __user *, usockvec)
{
struct socket *sock1, *sock2;
int fd1, fd2, err;
struct file *newfile1, *newfile2;
int flags;
flags = type & ~SOCK_TYPE_MASK;
if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
return -EINVAL;
type &= SOCK_TYPE_MASK;
if... | 194,819,499,021,053,400,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,662 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
int __user *, upeer_addrlen, int, flags)
{
struct socket *sock, *newsock;
struct file *newfile;
int err, len, newfd, fput_needed;
struct sockaddr_storage address;
if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
return -EINVAL;
if (SOCK... | 32,735,664,406,787,680,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,663 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
unsigned int, vlen, unsigned int, flags)
{
return __sys_sendmmsg(fd, mmsg, vlen, flags);
}
| 226,896,755,484,001,240,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,664 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
char __user *, optval, int, optlen)
{
int err, fput_needed;
struct socket *sock;
if (optlen < 0)
return -EINVAL;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock != NULL) {
err = security_socket_setsockopt(sock, level, optname);
i... | 189,089,540,143,901,750,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,665 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
char __user *, optval, int __user *, optlen)
{
int err, fput_needed;
struct socket *sock;
sock = sockfd_lookup_light(fd, &err, &fput_needed);
if (sock != NULL) {
err = security_socket_getsockopt(sock, level, optname);
if (err)
goto out_put;
... | 168,102,954,246,918,340,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,666 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
unsigned int, vlen, unsigned int, flags,
struct timespec __user *, timeout)
{
int datagrams;
struct timespec timeout_sys;
if (!timeout)
return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL);
if (copy_from_user(&timeout_sys, timeout, sizeof(timeo... | 58,235,888,195,955,510,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,667 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
unsigned int, flags, struct sockaddr __user *, addr,
int, addr_len)
{
struct socket *sock;
struct sockaddr_storage address;
int err;
struct msghdr msg;
struct iovec iov;
int fput_needed;
if (len > INT_MAX)
len = INT_MAX;
sock = sockfd_loo... | 219,945,376,795,102,600,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
21,668 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 0 | void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
struct sk_buff *skb)
{
int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
struct timespec ts[3];
int empty = 1;
struct skb_shared_hwtstamps *shhwtstamps =
skb_hwtstamps(skb);
/* Race occurred between timestamp enabling and packet
receiv... | 234,832,476,226,041,340,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.