idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
21,669
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { sock_recv_timestamp(msg, sk, skb); sock_recv_drops(msg, sk, skb); }
86,024,845,928,158,980,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,670
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { int ack; if (!sock_flag(sk, SOCK_WIFI_STATUS)) return; if (!skb->wifi_acked_valid) return; ack = skb->wifi_acked; put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack); }
293,228,245,314,551,170,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,671
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) { int err = security_socket_recvmsg(sock, msg, size, flags); return err ?: __sock_recvmsg_nosec(iocb, sock, msg, size, flags); }
222,730,993,369,332,000,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,672
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static inline int __sock_recvmsg_nosec(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct sock_iocb *si = kiocb_to_siocb(iocb); sock_update_classid(sock->sk); si->sock = sock; si->scm = NULL; si->msg = msg; si->size = size; si->flags = flags; return sock-...
1,930,803,136,103,954,700,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,673
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size) { int err = security_socket_sendmsg(sock, msg, size); return err ?: __sock_sendmsg_nosec(iocb, sock, msg, size); }
71,935,286,529,418,310,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,674
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static inline int __sock_sendmsg_nosec(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size) { struct sock_iocb *si = kiocb_to_siocb(iocb); sock_update_classid(sock->sk); si->sock = sock; si->scm = NULL; si->msg = msg; si->size = size; return sock->ops->sendmsg(iocb, sock, msg, ...
289,760,307,913,444,920,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,675
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen, unsigned int flags, struct timespec *timeout) { int fput_needed, err, datagrams; struct socket *sock; struct mmsghdr __user *entry; struct compat_mmsghdr __user *compat_entry; struct msghdr msg_sys; struct timespec end_time; if (tim...
299,180,960,819,353,450,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,676
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int __sys_recvmsg(struct socket *sock, struct msghdr __user *msg, struct msghdr *msg_sys, unsigned int flags, int nosec) { struct compat_msghdr __user *msg_compat = (struct compat_msghdr __user *)msg; struct iovec iovstack[UIO_FASTIOV]; struct iovec *iov = iovstack; unsigned long cmsg_ptr; int err,...
75,164,561,640,778,100,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,677
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen, unsigned int flags) { int fput_needed, err, datagrams; struct socket *sock; struct mmsghdr __user *entry; struct compat_mmsghdr __user *compat_entry; struct msghdr msg_sys; struct used_address used_address; if (vlen > UIO_MAXIOV) ...
25,904,677,814,329,977,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,678
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int __sys_sendmsg(struct socket *sock, struct msghdr __user *msg, struct msghdr *msg_sys, unsigned int flags, struct used_address *used_address) { struct compat_msghdr __user *msg_compat = (struct compat_msghdr __user *)msg; struct sockaddr_storage address; struct iovec iovstack[UIO_FASTIOV], *io...
320,006,163,254,916,900,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,679
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb, struct sock_iocb *siocb) { if (!is_sync_kiocb(iocb)) { siocb = kmalloc(sizeof(*siocb), GFP_KERNEL); if (!siocb) return NULL; iocb->ki_dtor = sock_aio_dtor; } siocb->kiocb = iocb; iocb->private = siocb; return siocb; }
306,983,921,964,600,200,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,680
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int bond_ioctl(struct net *net, unsigned int cmd, struct compat_ifreq __user *ifr32) { struct ifreq kifr; struct ifreq __user *uifr; mm_segment_t old_fs; int err; u32 data; void __user *datap; switch (cmd) { case SIOCBONDENSLAVE: case SIOCBONDRELEASE: case SIOCBONDSETHWADDR: case SIOCBONDCHANGEAC...
218,794,546,258,087,650,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,681
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *)) { mutex_lock(&br_ioctl_mutex); br_ioctl_hook = hook; mutex_unlock(&br_ioctl_mutex); }
26,519,292,645,299,640,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,682
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int compat_sioc_ifmap(struct net *net, unsigned int cmd, struct compat_ifreq __user *uifr32) { struct ifreq ifr; struct compat_ifmap __user *uifmap32; mm_segment_t old_fs; int err; uifmap32 = &uifr32->ifr_ifru.ifru_map; err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name)); err |= __get_user(ifr.if...
106,089,011,930,420,740,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,683
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int compat_siocshwtstamp(struct net *net, struct compat_ifreq __user *uifr32) { void __user *uptr; compat_uptr_t uptr32; struct ifreq __user *uifr; uifr = compat_alloc_user_space(sizeof(*uifr)); if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq))) return -EFAULT; if (get_user(uptr32, &uifr32->i...
39,022,501,250,642,150,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,684
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32) { void __user *uptr; compat_uptr_t uptr32; struct ifreq __user *uifr; uifr = compat_alloc_user_space(sizeof(*uifr)); if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq))) return -EFAULT; if (get_user(uptr32, &uifr32->ifr_...
14,821,581,068,141,555,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,685
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static long compat_sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg) { struct socket *sock = file->private_data; int ret = -ENOIOCTLCMD; struct sock *sk; struct net *net; sk = sock->sk; net = sock_net(sk); if (sock->ops->compat_ioctl) ret = sock->ops->compat_ioctl(sock, cmd, arg); ...
278,381,201,654,567,100,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,686
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int compat_sock_ioctl_trans(struct file *file, struct socket *sock, unsigned int cmd, unsigned long arg) { void __user *argp = compat_ptr(arg); struct sock *sk = sock->sk; struct net *net = sock_net(sk); if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) return siocdevprivate_ioctl(net, cmd, a...
119,656,984,182,098,580,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,687
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32) { struct compat_ifconf ifc32; struct ifconf ifc; struct ifconf __user *uifc; struct compat_ifreq __user *ifr32; struct ifreq __user *ifr; unsigned int i, j; int err; if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf))) r...
190,165,563,876,560,080,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,688
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int dev_ifname32(struct net *net, struct compat_ifreq __user *uifr32) { struct ifreq __user *uifr; int err; uifr = compat_alloc_user_space(sizeof(struct ifreq)); if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq))) return -EFAULT; err = dev_ioctl(net, SIOCGIFNAME, uifr); if (err) return err; ...
203,194,558,909,394,200,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,689
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void dlci_ioctl_set(int (*hook) (unsigned int, void __user *)) { mutex_lock(&dlci_ioctl_mutex); dlci_ioctl_hook = hook; mutex_unlock(&dlci_ioctl_mutex); }
244,269,001,179,189,400,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,690
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb, struct file *file, const struct iovec *iov, unsigned long nr_segs) { struct socket *sock = file->private_data; size_t size = 0; int i; for (i = 0; i < nr_segs; i++) size += iov[i].iov_len; msg->msg_name = NULL; msg->msg_namelen = 0; msg-...
125,753,150,599,730,680,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,691
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb, struct file *file, const struct iovec *iov, unsigned long nr_segs) { struct socket *sock = file->private_data; size_t size = 0; int i; for (i = 0; i < nr_segs; i++) size += iov[i].iov_len; msg->msg_name = NULL; msg->msg_namelen = 0; m...
223,278,258,048,851,280,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,692
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32) { struct compat_ethtool_rxnfc __user *compat_rxnfc; bool convert_in = false, convert_out = false; size_t buf_size = ALIGN(sizeof(struct ifreq), 8); struct ethtool_rxnfc __user *rxnfc; struct ifreq __user *ifr; u32 rule_cnt = 0, actual_ru...
181,009,941,595,336,550,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,693
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int init_inodecache(void) { sock_inode_cachep = kmem_cache_create("sock_inode_cache", sizeof(struct socket_alloc), 0, (SLAB_HWCACHE_ALIGN | SLAB_RECLAIM_ACCOUNT | SLAB_MEM_SPREAD), init_once); if (sock_inode_cachep == NULL) return -ENOMEM; ...
100,228,312,986,203,940,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,694
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static void init_once(void *foo) { struct socket_alloc *ei = (struct socket_alloc *)foo; inode_init_once(&ei->vfs_inode); }
5,497,848,968,613,360,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,695
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_accept(struct socket *sock, struct socket **newsock, int flags) { struct sock *sk = sock->sk; int err; err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol, newsock); if (err < 0) goto done; err = sock->ops->accept(sock, *newsock, flags); if (err < 0) { sock_release(*newso...
42,694,434,375,842,970,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,696
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen) { return sock->ops->bind(sock, addr, addrlen); }
196,134,348,925,401,300,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,697
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen, int flags) { return sock->ops->connect(sock, addr, addrlen, flags); }
202,102,262,942,729,130,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,698
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_getpeername(struct socket *sock, struct sockaddr *addr, int *addrlen) { return sock->ops->getname(sock, addr, addrlen, 1); }
95,620,633,527,613,630,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,699
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_getsockname(struct socket *sock, struct sockaddr *addr, int *addrlen) { return sock->ops->getname(sock, addr, addrlen, 0); }
284,325,258,822,794,600,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,700
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_getsockopt(struct socket *sock, int level, int optname, char *optval, int *optlen) { mm_segment_t oldfs = get_fs(); char __user *uoptval; int __user *uoptlen; int err; uoptval = (char __user __force *) optval; uoptlen = (int __user __force *) optlen; set_fs(KERNEL_DS); if (level == SOL_SOCKET) ...
195,017,901,980,171,400,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,701
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_listen(struct socket *sock, int backlog) { return sock->ops->listen(sock, backlog); }
2,780,930,516,972,889,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,702
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_recvmsg(struct socket *sock, struct msghdr *msg, struct kvec *vec, size_t num, size_t size, int flags) { mm_segment_t oldfs = get_fs(); int result; set_fs(KERNEL_DS); /* * the following is safe, since for compiler definitions of kvec and * iovec are identical, yielding the same in-core layout a...
213,246,692,678,468,160,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,703
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_sendmsg(struct socket *sock, struct msghdr *msg, struct kvec *vec, size_t num, size_t size) { mm_segment_t oldfs = get_fs(); int result; set_fs(KERNEL_DS); /* * the following is safe, since for compiler definitions of kvec and * iovec are identical, yielding the same in-core layout and alignmen...
5,315,874,060,661,061,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,704
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_setsockopt(struct socket *sock, int level, int optname, char *optval, unsigned int optlen) { mm_segment_t oldfs = get_fs(); char __user *uoptval; int err; uoptval = (char __user __force *) optval; set_fs(KERNEL_DS); if (level == SOL_SOCKET) err = sock_setsockopt(sock, level, optname, uoptval, op...
101,535,778,300,762,050,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,705
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg) { mm_segment_t oldfs = get_fs(); int err; set_fs(KERNEL_DS); err = sock->ops->ioctl(sock, cmd, arg); set_fs(oldfs); return err; }
51,920,908,416,005,700,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,706
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how) { return sock->ops->shutdown(sock, how); }
54,418,953,034,434,870,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,707
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int ktime2ts(ktime_t kt, struct timespec *ts) { if (kt.tv64) { *ts = ktime_to_timespec(kt); return 1; } else { return 0; } }
339,771,829,737,826,000,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,708
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen, void __user *uaddr, int __user *ulen) { int err; int len; err = get_user(len, ulen); if (err) return err; if (len > klen) len = klen; if (len < 0 || len > sizeof(struct sockaddr_storage)) return -EINVAL; if (len) { if (audit_...
122,262,005,531,680,150,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,709
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int old_bridge_ioctl(compat_ulong_t __user *argp) { compat_ulong_t tmp; if (get_user(tmp, argp)) return -EFAULT; if (tmp == BRCTL_GET_VERSION) return BRCTL_VERSION + 1; return -EINVAL; }
82,990,207,813,145,415,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,710
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int routing_ioctl(struct net *net, struct socket *sock, unsigned int cmd, void __user *argp) { int ret; void *r = NULL; struct in6_rtmsg r6; struct rtentry r4; char devname[16]; u32 rtdev; mm_segment_t old_fs = get_fs(); if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */ struct ...
96,204,579,197,502,720,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,711
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int siocdevprivate_ioctl(struct net *net, unsigned int cmd, struct compat_ifreq __user *u_ifreq32) { struct ifreq __user *u_ifreq64; char tmp_buf[IFNAMSIZ]; void __user *data64; u32 data32; if (copy_from_user(&tmp_buf[0], &(u_ifreq32->ifr_ifrn.ifrn_name[0]), IFNAMSIZ)) return -EFAULT; if (__g...
59,530,263,166,960,720,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,712
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static void sock_aio_dtor(struct kiocb *iocb) { kfree(iocb->private); }
245,984,908,878,733,950,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,713
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov, unsigned long nr_segs, loff_t pos) { struct sock_iocb siocb, *x; if (pos != 0) return -ESPIPE; if (iocb->ki_left == 0) /* Match SYS5 behaviour */ return 0; x = alloc_sock_iocb(iocb, &siocb); if (!x) return -ENOMEM; return do_s...
140,057,351,732,927,500,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,714
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov, unsigned long nr_segs, loff_t pos) { struct sock_iocb siocb, *x; if (pos != 0) return -ESPIPE; x = alloc_sock_iocb(iocb, &siocb); if (!x) return -ENOMEM; return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs); }
224,761,250,961,150,120,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,715
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static struct socket *sock_alloc(void) { struct inode *inode; struct socket *sock; inode = new_inode_pseudo(sock_mnt->mnt_sb); if (!inode) return NULL; sock = SOCKET_I(inode); kmemcheck_annotate_bitfield(sock, type); inode->i_ino = get_next_ino(); inode->i_mode = S_IFSOCK | S_IRWXUGO; inode->i_uid = curre...
72,236,304,691,493,115,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,716
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_alloc_file(struct socket *sock, struct file **f, int flags) { struct qstr name = { .name = "" }; struct path path; struct file *file; int fd; fd = get_unused_fd_flags(flags); if (unlikely(fd < 0)) return fd; path.dentry = d_alloc_pseudo(sock_mnt->mnt_sb, &name); if (unlikely(!path.dentry)) {...
326,230,759,817,920,400,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,717
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static struct inode *sock_alloc_inode(struct super_block *sb) { struct socket_alloc *ei; struct socket_wq *wq; ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL); if (!ei) return NULL; wq = kmalloc(sizeof(*wq), GFP_KERNEL); if (!wq) { kmem_cache_free(sock_inode_cachep, ei); return NULL; } init_waitqueu...
44,634,062,114,915,550,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,718
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_close(struct inode *inode, struct file *filp) { /* * It was possible the inode is NULL we were * closing an unfinished socket. */ if (!inode) { printk(KERN_DEBUG "sock_close: NULL inode\n"); return 0; } sock_release(SOCKET_I(inode)); return 0; }
296,361,184,895,911,900,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,719
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_create(int family, int type, int protocol, struct socket **res) { return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0); }
339,364,915,163,120,460,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,720
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_create_kern(int family, int type, int protocol, struct socket **res) { return __sock_create(&init_net, family, type, protocol, res, 1); }
247,253,002,719,554,000,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,721
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_create_lite(int family, int type, int protocol, struct socket **res) { int err; struct socket *sock = NULL; err = security_socket_create(family, type, protocol, 1); if (err) goto out; sock = sock_alloc(); if (!sock) { err = -ENOMEM; goto out; } sock->type = type; err = security_socket_post_cr...
141,142,602,175,871,670,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,722
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static void sock_destroy_inode(struct inode *inode) { struct socket_alloc *ei; struct socket_wq *wq; ei = container_of(inode, struct socket_alloc, vfs_inode); wq = rcu_dereference_protected(ei->socket.wq, 1); kfree_rcu(wq, rcu); kmem_cache_free(sock_inode_cachep, ei); }
256,665,562,658,165,270,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,723
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_fasync(int fd, struct file *filp, int on) { struct socket *sock = filp->private_data; struct sock *sk = sock->sk; struct socket_wq *wq; if (sk == NULL) return -EINVAL; lock_sock(sk); wq = rcu_dereference_protected(sock->wq, sock_owned_by_user(sk)); fasync_helper(fd, filp, on, &wq->fasync_list...
249,144,668,474,067,570,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,724
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
struct socket *sock_from_file(struct file *file, int *err) { if (file->f_op == &socket_file_ops) return file->private_data; /* set in sock_map_fd */ *err = -ENOTSOCK; return NULL; }
72,789,664,708,323,330,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,725
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int __init sock_init(void) { int err; /* * Initialize the network sysctl infrastructure. */ err = net_sysctl_init(); if (err) goto out; /* * Initialize sock SLAB cache. */ sk_init(); /* * Initialize skbuff SLAB cache */ skb_init(); /* * Initialize the protocols mo...
79,246,143,452,554,550,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,726
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg) { struct socket *sock; struct sock *sk; void __user *argp = (void __user *)arg; int pid, err; struct net *net; sock = file->private_data; sk = sock->sk; net = sock_net(sk); if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) { ...
236,550,259,789,596,100,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,727
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_map_fd(struct socket *sock, int flags) { struct file *newfile; int fd = sock_alloc_file(sock, &newfile, flags); if (likely(fd >= 0)) fd_install(fd, newfile); return fd; }
249,215,771,151,387,350,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,728
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_mmap(struct file *file, struct vm_area_struct *vma) { struct socket *sock = file->private_data; return sock->ops->mmap(file, sock, vma); }
211,349,252,857,858,420,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,729
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_no_open(struct inode *irrelevant, struct file *dontcare) { return -ENXIO; }
232,290,803,760,380,950,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,730
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static unsigned int sock_poll(struct file *file, poll_table *wait) { struct socket *sock; /* * We can't return errors to poll, so it's either yes or no. */ sock = file->private_data; return sock->ops->poll(file, sock, wait); }
33,768,827,226,605,267,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,731
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && skb->dropcount) put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL, sizeof(__u32), &skb->dropcount); }
165,412,313,256,585,620,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,732
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct kiocb iocb; struct sock_iocb siocb; int ret; init_sync_kiocb(&iocb, NULL); iocb.private = &siocb; ret = __sock_recvmsg(&iocb, sock, msg, size, flags); if (-EIOCBQUEUED == ret) ret = wait_on_sync_kiocb(&iocb); return...
151,294,641,417,579,970,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,733
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct kiocb iocb; struct sock_iocb siocb; int ret; init_sync_kiocb(&iocb, NULL); iocb.private = &siocb; ret = __sock_recvmsg_nosec(&iocb, sock, msg, size, flags); if (-EIOCBQUEUED == ret) ret = wait_on_s...
234,395,701,495,243,630,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,734
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void sock_release(struct socket *sock) { if (sock->ops) { struct module *owner = sock->ops->owner; sock->ops->release(sock); sock->ops = NULL; module_put(owner); } if (rcu_dereference_protected(sock->wq, 1)->fasync_list) printk(KERN_ERR "sock_release: fasync list not empty!\n"); if (test_bit(SOCK_EXTER...
237,730,788,435,666,400,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,735
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size) { struct kiocb iocb; struct sock_iocb siocb; int ret; init_sync_kiocb(&iocb, NULL); iocb.private = &siocb; ret = __sock_sendmsg(&iocb, sock, msg, size); if (-EIOCBQUEUED == ret) ret = wait_on_sync_kiocb(&iocb); return ret; }
287,869,892,626,997,760,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,736
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg, size_t size) { struct kiocb iocb; struct sock_iocb siocb; int ret; init_sync_kiocb(&iocb, NULL); iocb.private = &siocb; ret = __sock_sendmsg_nosec(&iocb, sock, msg, size); if (-EIOCBQUEUED == ret) ret = wait_on_sync_kiocb(&iocb); return r...
163,977,823,167,626,470,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,737
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static ssize_t sock_sendpage(struct file *file, struct page *page, int offset, size_t size, loff_t *ppos, int more) { struct socket *sock; int flags; sock = file->private_data; flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0; /* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */ flags...
17,409,526,986,970,474,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,738
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_tx_timestamp(struct sock *sk, __u8 *tx_flags) { *tx_flags = 0; if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE)) *tx_flags |= SKBTX_HW_TSTAMP; if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE)) *tx_flags |= SKBTX_SW_TSTAMP; if (sock_flag(sk, SOCK_WIFI_STATUS)) *tx_flags |= SKBTX_WIFI_STATUS; return 0...
11,784,980,902,144,874,000,000,000,000,000,000,000
socket.c
340,153,205,578,084,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,739
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
int sock_wake_async(struct socket *sock, int how, int band) { struct socket_wq *wq; if (!sock) return -1; rcu_read_lock(); wq = rcu_dereference(sock->wq); if (!wq || !wq->fasync_list) { rcu_read_unlock(); return -1; } switch (how) { case SOCK_WAKE_WAITD: if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))...
27,351,308,248,438,413,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,740
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
struct socket *sockfd_lookup(int fd, int *err) { struct file *file; struct socket *sock; file = fget(fd); if (!file) { *err = -EBADF; return NULL; } sock = sock_from_file(file, err); if (!sock) fput(file); return sock; }
257,943,623,152,923,730,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,741
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed) { struct file *file; struct socket *sock; *err = -EBADF; file = fget_light(fd, fput_needed); if (file) { sock = sock_from_file(file, err); if (sock) return sock; fput_light(file, *fput_needed); } return NULL; }
37,536,590,940,726,904,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,742
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen) { return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]", dentry->d_inode->i_ino); }
281,849,968,309,531,400,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,743
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
static struct dentry *sockfs_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) { return mount_pseudo(fs_type, "socket:", &sockfs_ops, &sockfs_dentry_operations, SOCKFS_MAGIC); }
298,075,064,256,700,300,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,744
linux
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
0
void vlan_ioctl_set(int (*hook) (struct net *, void __user *)) { mutex_lock(&vlan_ioctl_mutex); vlan_ioctl_hook = hook; mutex_unlock(&vlan_ioctl_mutex); }
325,428,192,873,383,860,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-4467
The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2012-4467
21,745
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
fq_find(struct net *net, __be32 id, struct in6_addr *src, struct in6_addr *dst) { struct inet_frag_queue *q; struct ip6_create_arg arg; unsigned int hash; arg.id = id; arg.user = IP6_DEFRAG_LOCAL_DELIVER; arg.src = src; arg.dst = dst; read_lock(&ip6_frags.lock); hash = inet6_hash_frag(id, src, dst, ip6_frags...
281,630,731,245,162,200,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,746
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static __inline__ void fq_kill(struct frag_queue *fq) { inet_frag_kill(&fq->q, &ip6_frags); }
292,733,778,411,274,840,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,747
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static __inline__ void fq_put(struct frag_queue *fq) { inet_frag_put(&fq->q, &ip6_frags); }
325,178,182,011,115,340,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,748
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
unsigned int inet6_hash_frag(__be32 id, const struct in6_addr *saddr, const struct in6_addr *daddr, u32 rnd) { u32 a, b, c; a = (__force u32)saddr->s6_addr32[0]; b = (__force u32)saddr->s6_addr32[1]; c = (__force u32)saddr->s6_addr32[2]; a += JHASH_GOLDEN_RATIO; b += JHASH_GOLDEN_RATIO; c += rnd; __jh...
70,209,944,624,251,800,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,749
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void ip6_evictor(struct net *net, struct inet6_dev *idev) { int evicted; evicted = inet_frag_evictor(&net->ipv6.frags, &ip6_frags); if (evicted) IP6_ADD_STATS_BH(net, idev, IPSTATS_MIB_REASMFAILS, evicted); }
189,206,446,748,169,650,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,750
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void ip6_frag_expire(unsigned long data) { struct frag_queue *fq; struct net_device *dev = NULL; struct net *net; fq = container_of((struct inet_frag_queue *)data, struct frag_queue, q); spin_lock(&fq->q.lock); if (fq->q.last_in & INET_FRAG_COMPLETE) goto out; fq_kill(fq); net = container_of(fq->q...
151,790,056,290,609,370,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,751
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ip6_frag_init(struct inet_frag_queue *q, void *a) { struct frag_queue *fq = container_of(q, struct frag_queue, q); struct ip6_create_arg *arg = a; fq->id = arg->id; fq->user = arg->user; ipv6_addr_copy(&fq->saddr, arg->src); ipv6_addr_copy(&fq->daddr, arg->dst); }
59,338,517,404,718,590,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,752
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ip6_frag_match(struct inet_frag_queue *q, void *a) { struct frag_queue *fq; struct ip6_create_arg *arg = a; fq = container_of(q, struct frag_queue, q); return (fq->id == arg->id && fq->user == arg->user && ipv6_addr_equal(&fq->saddr, arg->src) && ipv6_addr_equal(&fq->daddr, arg->dst)); }
35,215,653,950,276,820,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,753
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ip6_frag_mem(struct net *net) { return atomic_read(&net->ipv6.frags.mem); }
9,453,049,505,335,080,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,754
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int ip6_frag_nqueues(struct net *net) { return net->ipv6.frags.nqueues; }
202,873,712,247,528,330,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,755
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ip6_frag_reasm(struct frag_queue *fq, struct sk_buff *prev, struct net_device *dev) { struct net *net = container_of(fq->q.net, struct net, ipv6.frags); struct sk_buff *fp, *head = fq->q.fragments; int payload_len; unsigned int nhoff; fq_kill(fq); /* Make the one we just received the head. */...
137,622,715,575,668,560,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,756
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int __net_init ip6_frags_ns_sysctl_register(struct net *net) { struct ctl_table *table; struct ctl_table_header *hdr; table = ip6_frags_ns_ctl_table; if (!net_eq(net, &init_net)) { table = kmemdup(table, sizeof(ip6_frags_ns_ctl_table), GFP_KERNEL); if (table == NULL) goto err_alloc; table[0].data ...
187,961,923,675,258,940,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,757
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline int ip6_frags_ns_sysctl_register(struct net *net) { return 0; }
99,406,121,986,164,010,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,758
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void __net_exit ip6_frags_ns_sysctl_unregister(struct net *net) { struct ctl_table *table; table = net->ipv6.sysctl.frags_hdr->ctl_table_arg; unregister_net_sysctl_table(net->ipv6.sysctl.frags_hdr); if (!net_eq(net, &init_net)) kfree(table); }
80,761,471,457,161,890,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,759
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline void ip6_frags_ns_sysctl_unregister(struct net *net) { }
202,846,998,771,455,200,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,760
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ip6_frags_sysctl_register(void) { ip6_ctl_header = register_net_sysctl_rotable(net_ipv6_ctl_path, ip6_frags_ctl_table); return ip6_ctl_header == NULL ? -ENOMEM : 0; }
175,760,619,890,847,880,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,761
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline int ip6_frags_sysctl_register(void) { return 0; }
141,524,027,225,661,160,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,762
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void ip6_frags_sysctl_unregister(void) { unregister_net_sysctl_table(ip6_ctl_header); }
148,716,145,577,807,030,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,763
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static unsigned int ip6_hashfn(struct inet_frag_queue *q) { struct frag_queue *fq; fq = container_of(q, struct frag_queue, q); return inet6_hash_frag(fq->id, &fq->saddr, &fq->daddr, ip6_frags.rnd); }
265,981,267,348,033,700,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,764
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void ipv6_frag_exit(void) { inet_frags_fini(&ip6_frags); ip6_frags_sysctl_unregister(); unregister_pernet_subsys(&ip6_frags_ops); inet6_del_protocol(&frag_protocol, IPPROTO_FRAGMENT); }
300,094,756,879,644,200,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,765
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
int __init ipv6_frag_init(void) { int ret; ret = inet6_add_protocol(&frag_protocol, IPPROTO_FRAGMENT); if (ret) goto out; ret = ip6_frags_sysctl_register(); if (ret) goto err_sysctl; ret = register_pernet_subsys(&ip6_frags_ops); if (ret) goto err_pernet; ip6_frags.hashfn = ip6_hashfn; ip6_frags.const...
146,213,786,215,899,700,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,766
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int ipv6_frag_rcv(struct sk_buff *skb) { struct frag_hdr *fhdr; struct frag_queue *fq; struct ipv6hdr *hdr = ipv6_hdr(skb); struct net *net = dev_net(skb_dst(skb)->dev); IP6_INC_STATS_BH(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_REASMREQDS); /* Jumbo payload inhibits frag. header */ if (hdr->payload_...
141,313,591,701,300,450,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,767
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void __net_exit ipv6_frags_exit_net(struct net *net) { ip6_frags_ns_sysctl_unregister(net); inet_frags_exit_net(&net->ipv6.frags, &ip6_frags); }
321,841,111,021,060,600,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444
21,768
linux
70789d7052239992824628db8133de08dc78e593
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70789d7052239992824628db8133de08dc78e593
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int __net_init ipv6_frags_init_net(struct net *net) { net->ipv6.frags.high_thresh = IPV6_FRAG_HIGH_THRESH; net->ipv6.frags.low_thresh = IPV6_FRAG_LOW_THRESH; net->ipv6.frags.timeout = IPV6_FRAG_TIMEOUT; inet_frags_init_net(&net->ipv6.frags); return ip6_frags_ns_sysctl_register(net); }
180,063,036,124,636,850,000,000,000,000,000,000,000
reassembly.c
211,639,011,391,093,820,000,000,000,000,000,000,000
[ "NVD-CWE-noinfo" ]
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
https://nvd.nist.gov/vuln/detail/CVE-2012-4444