idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
22,528
linux
13d518074a952d33d47c428419693f63389547e9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9
epoll: clear the tfile_check_list on -ELOOP An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent circular epoll dependencies from being created. However, in that case we do not properly clear the 'tfile_check_list'. Thus, add a call to clear_tfile_check_list() for the -ELOOP case. Signed-off-by: ...
0
static void path_count_init(void) { int i; for (i = 0; i < PATH_ARR_SIZE; i++) path_count[i] = 0; }
269,313,371,594,384,000,000,000,000,000,000,000,000
eventpoll.c
305,502,646,873,515,640,000,000,000,000,000,000,000
[]
CVE-2012-3375
The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll depende...
https://nvd.nist.gov/vuln/detail/CVE-2012-3375
22,529
linux
13d518074a952d33d47c428419693f63389547e9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9
epoll: clear the tfile_check_list on -ELOOP An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent circular epoll dependencies from being created. However, in that case we do not properly clear the 'tfile_check_list'. Thus, add a call to clear_tfile_check_list() for the -ELOOP case. Signed-off-by: ...
0
static int reverse_path_check(void) { int error = 0; struct file *current_file; /* let's call this for all tfiles */ list_for_each_entry(current_file, &tfile_check_list, f_tfile_llink) { path_count_init(); error = ep_call_nested(&poll_loop_ncalls, EP_MAX_NESTS, reverse_path_check_proc, current_file, ...
311,887,058,586,251,940,000,000,000,000,000,000,000
eventpoll.c
305,502,646,873,515,640,000,000,000,000,000,000,000
[]
CVE-2012-3375
The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll depende...
https://nvd.nist.gov/vuln/detail/CVE-2012-3375
22,530
linux
13d518074a952d33d47c428419693f63389547e9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9
epoll: clear the tfile_check_list on -ELOOP An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent circular epoll dependencies from being created. However, in that case we do not properly clear the 'tfile_check_list'. Thus, add a call to clear_tfile_check_list() for the -ELOOP case. Signed-off-by: ...
0
static int reverse_path_check_proc(void *priv, void *cookie, int call_nests) { int error = 0; struct file *file = priv; struct file *child_file; struct epitem *epi; list_for_each_entry(epi, &file->f_ep_links, fllink) { child_file = epi->ep->file; if (is_file_epoll(child_file)) { if (list_empty(&child_file-...
295,429,429,341,225,420,000,000,000,000,000,000,000
eventpoll.c
305,502,646,873,515,640,000,000,000,000,000,000,000
[]
CVE-2012-3375
The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll depende...
https://nvd.nist.gov/vuln/detail/CVE-2012-3375
22,531
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
void __invalid_creds(const struct cred *cred, const char *file, unsigned line) { printk(KERN_ERR "CRED: Invalid credentials\n"); printk(KERN_ERR "CRED: At %s:%u\n", file, line); dump_invalid_creds(cred, "Specified", current); BUG(); }
217,505,547,758,700,800,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,532
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
void __put_cred(struct cred *cred) { kdebug("__put_cred(%p{%d,%d})", cred, atomic_read(&cred->usage), read_cred_subscribers(cred)); BUG_ON(atomic_read(&cred->usage) != 0); #ifdef CONFIG_DEBUG_CREDENTIALS BUG_ON(read_cred_subscribers(cred) != 0); cred->magic = CRED_MAGIC_DEAD; cred->put_addr = __bu...
131,475,695,434,069,250,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,533
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
void __validate_process_creds(struct task_struct *tsk, const char *file, unsigned line) { if (tsk->cred == tsk->real_cred) { if (unlikely(read_cred_subscribers(tsk->cred) < 2 || creds_are_invalid(tsk->cred))) goto invalid_creds; } else { if (unlikely(read_cred_subscribers(tsk->real_cred) < 1 |...
161,463,163,575,306,180,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,534
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
int commit_creds(struct cred *new) { struct task_struct *task = current; const struct cred *old = task->real_cred; kdebug("commit_creds(%p{%d,%d})", new, atomic_read(&new->usage), read_cred_subscribers(new)); BUG_ON(task->cred != old); #ifdef CONFIG_DEBUG_CREDENTIALS BUG_ON(read_cred_subscribers(...
260,410,301,045,525,200,000,000,000,000,000,000,000
cred.c
192,217,264,892,189,970,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,535
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
bool creds_are_invalid(const struct cred *cred) { if (cred->magic != CRED_MAGIC) return true; #ifdef CONFIG_SECURITY_SELINUX /* * cred->security == NULL if security_cred_alloc_blank() or * security_prepare_creds() returned an error. */ if (selinux_is_enabled() && cred->security) { if ((unsigned long) cred-...
169,178,123,320,732,280,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,536
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
static void dump_invalid_creds(const struct cred *cred, const char *label, const struct task_struct *tsk) { printk(KERN_ERR "CRED: %s credentials: %p %s%s%s\n", label, cred, cred == &init_cred ? "[init]" : "", cred == tsk->real_cred ? "[real]" : "", cred == tsk->cred ? "[eff]"...
25,726,076,309,968,140,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,537
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
void exit_creds(struct task_struct *tsk) { struct cred *cred; kdebug("exit_creds(%u,%p,%p,{%d,%d})", tsk->pid, tsk->real_cred, tsk->cred, atomic_read(&tsk->cred->usage), read_cred_subscribers(tsk->cred)); cred = (struct cred *) tsk->real_cred; tsk->real_cred = NULL; validate_creds(cred); alter_c...
120,656,544,735,168,790,000,000,000,000,000,000,000
cred.c
192,217,264,892,189,970,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,538
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
const struct cred *get_task_cred(struct task_struct *task) { const struct cred *cred; rcu_read_lock(); do { cred = __task_cred((task)); BUG_ON(!cred); } while (!atomic_inc_not_zero(&((struct cred *)cred)->usage)); rcu_read_unlock(); return cred; }
192,586,859,336,657,040,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,539
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
const struct cred *override_creds(const struct cred *new) { const struct cred *old = current->cred; kdebug("override_creds(%p{%d,%d})", new, atomic_read(&new->usage), read_cred_subscribers(new)); validate_creds(old); validate_creds(new); get_cred(new); alter_cred_subscribers(new, 1); rcu_assign...
195,074,806,102,616,980,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,540
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
struct cred *prepare_creds(void) { struct task_struct *task = current; const struct cred *old; struct cred *new; validate_process_creds(); new = kmem_cache_alloc(cred_jar, GFP_KERNEL); if (!new) return NULL; kdebug("prepare_creds() alloc %p", new); old = task->cred; memcpy(new, old, sizeof(struct cred));...
30,499,582,123,587,943,000,000,000,000,000,000,000
cred.c
192,217,264,892,189,970,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,541
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
struct cred *prepare_exec_creds(void) { struct thread_group_cred *tgcred = NULL; struct cred *new; #ifdef CONFIG_KEYS tgcred = kmalloc(sizeof(*tgcred), GFP_KERNEL); if (!tgcred) return NULL; #endif new = prepare_creds(); if (!new) { kfree(tgcred); return new; } #ifdef CONFIG_KEYS /* newly exec'd tasks ...
326,367,417,671,435,540,000,000,000,000,000,000,000
cred.c
137,445,093,302,874,820,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,542
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
struct cred *prepare_kernel_cred(struct task_struct *daemon) { #ifdef CONFIG_KEYS struct thread_group_cred *tgcred; #endif const struct cred *old; struct cred *new; new = kmem_cache_alloc(cred_jar, GFP_KERNEL); if (!new) return NULL; #ifdef CONFIG_KEYS tgcred = kmalloc(sizeof(*tgcred), GFP_KERNEL); if (!tgcr...
153,023,409,938,486,840,000,000,000,000,000,000,000
cred.c
192,217,264,892,189,970,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,543
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
static void put_cred_rcu(struct rcu_head *rcu) { struct cred *cred = container_of(rcu, struct cred, rcu); kdebug("put_cred_rcu(%p)", cred); #ifdef CONFIG_DEBUG_CREDENTIALS if (cred->magic != CRED_MAGIC_DEAD || atomic_read(&cred->usage) != 0 || read_cred_subscribers(cred) != 0) panic("CRED: put_cred_rcu...
299,022,720,800,099,360,000,000,000,000,000,000,000
cred.c
192,217,264,892,189,970,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,544
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
static inline int read_cred_subscribers(const struct cred *cred) { #ifdef CONFIG_DEBUG_CREDENTIALS return atomic_read(&cred->subscribers); #else return 0; #endif }
171,216,698,756,354,700,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,545
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
static void release_tgcred(struct cred *cred) { #ifdef CONFIG_KEYS struct thread_group_cred *tgcred = cred->tgcred; if (atomic_dec_and_test(&tgcred->usage)) call_rcu(&tgcred->rcu, release_tgcred_rcu); #endif }
233,304,164,087,160,650,000,000,000,000,000,000,000
cred.c
137,445,093,302,874,820,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,546
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
void revert_creds(const struct cred *old) { const struct cred *override = current->cred; kdebug("revert_creds(%p{%d,%d})", old, atomic_read(&old->usage), read_cred_subscribers(old)); validate_creds(old); validate_creds(override); alter_cred_subscribers(old, 1); rcu_assign_pointer(current->cred, ...
179,446,810,855,885,870,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,547
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
int set_create_files_as(struct cred *new, struct inode *inode) { new->fsuid = inode->i_uid; new->fsgid = inode->i_gid; return security_kernel_create_files_as(new, inode); }
188,919,073,485,235,970,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,548
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
static inline void set_cred_subscribers(struct cred *cred, int n) { #ifdef CONFIG_DEBUG_CREDENTIALS atomic_set(&cred->subscribers, n); #endif }
256,933,888,850,285,160,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,549
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
int set_security_override(struct cred *new, u32 secid) { return security_kernel_act_as(new, secid); }
269,487,665,926,910,400,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,550
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
int set_security_override_from_ctx(struct cred *new, const char *secctx) { u32 secid; int ret; ret = security_secctx_to_secid(secctx, strlen(secctx), &secid); if (ret < 0) return ret; return set_security_override(new, secid); }
256,544,590,273,200,960,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,551
linux
79549c6dfda0603dba9a70a53467ce62d9335c33
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
0
void validate_creds_for_do_exit(struct task_struct *tsk) { kdebug("validate_creds_for_do_exit(%p,%p{%d,%d})", tsk->real_cred, tsk->cred, atomic_read(&tsk->cred->usage), read_cred_subscribers(tsk->cred)); __validate_process_creds(tsk, __FILE__, __LINE__); }
249,339,182,468,642,460,000,000,000,000,000,000,000
cred.c
258,355,486,268,991,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-2745
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
https://nvd.nist.gov/vuln/detail/CVE-2012-2745
22,563
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
static void kvp_acquire_lock(int pool) { struct flock fl = {F_WRLCK, SEEK_SET, 0, 0, 0}; fl.l_pid = getpid(); if (fcntl(kvp_file_info[pool].fd, F_SETLKW, &fl) == -1) { syslog(LOG_ERR, "Failed to acquire the lock pool: %d", pool); exit(-1); } }
335,612,539,123,819,070,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,564
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
static int kvp_file_init(void) { int ret, fd; FILE *filep; size_t records_read; __u8 *fname; struct kvp_record *record; struct kvp_record *readp; int num_blocks; int i; int alloc_unit = sizeof(struct kvp_record) * ENTRIES_PER_BLOCK; if (access("/var/opt/hyperv", F_OK)) { if (mkdir("/var/opt/hyperv", S_IRUS...
294,352,425,697,393,060,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,565
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
void kvp_get_os_info(void) { FILE *file; char *p, buf[512]; uname(&uts_buf); os_build = uts_buf.release; processor_arch = uts_buf.machine; /* * The current windows host (win7) expects the build * string to be of the form: x.y.z * Strip additional information we may have. */ p = strchr(os_build, '-'); ...
27,115,904,255,886,060,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,566
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
static int kvp_key_add_or_modify(int pool, __u8 *key, int key_size, __u8 *value, int value_size) { int i; int j, k; int num_records; struct kvp_record *record; int num_blocks; if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || (value_size > HV_KVP_EXCHANGE_MAX_VALUE_SIZE)) return 1; /* * First update th...
331,609,132,948,364,800,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,567
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
static void kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, __u8 *value, int value_size) { struct kvp_record *record; /* * First update our in-memory database. */ kvp_update_mem_state(pool); record = kvp_file_info[pool].records; if (index >= kvp_file_info[pool].num_records) { /* * T...
173,672,958,527,089,240,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,568
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
static void kvp_release_lock(int pool) { struct flock fl = {F_UNLCK, SEEK_SET, 0, 0, 0}; fl.l_pid = getpid(); if (fcntl(kvp_file_info[pool].fd, F_SETLK, &fl) == -1) { perror("fcntl"); syslog(LOG_ERR, "Failed to release the lock pool: %d", pool); exit(-1); } }
179,047,880,057,339,930,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,569
linux
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
0
static void kvp_update_file(int pool) { FILE *filep; size_t bytes_written; /* * We are going to write our in-memory registry out to * disk; acquire the lock first. */ kvp_acquire_lock(pool); filep = fopen(kvp_file_info[pool].fname, "w"); if (!filep) { kvp_release_lock(pool); syslog(LOG_ERR, "Failed to...
191,948,001,740,023,260,000,000,000,000,000,000,000
hv_kvp_daemon.c
116,130,904,297,105,750,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
https://nvd.nist.gov/vuln/detail/CVE-2012-2669
22,669
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
eb_add_object(struct eb_objects *eb, struct drm_i915_gem_object *obj) { hlist_add_head(&obj->exec_node, &eb->buckets[obj->exec_handle & eb->and]); }
4,665,223,243,484,755,700,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,670
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
eb_create(int size) { struct eb_objects *eb; int count = PAGE_SIZE / sizeof(struct hlist_head) / 2; while (count > size) count >>= 1; eb = kzalloc(count*sizeof(struct hlist_head) + sizeof(struct eb_objects), GFP_KERNEL); if (eb == NULL) return eb; eb->and = count - 1; return eb; }
327,344,081,924,704,200,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,671
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
eb_destroy(struct eb_objects *eb) { kfree(eb); }
107,316,221,565,420,700,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,672
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
eb_reset(struct eb_objects *eb) { memset(eb->buckets, 0, (eb->and+1)*sizeof(struct hlist_head)); }
139,046,621,418,072,130,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,673
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_check_execbuffer(struct drm_i915_gem_execbuffer2 *exec) { return ((exec->batch_start_offset | exec->batch_len) & 0x7) == 0; }
165,900,091,965,205,460,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,674
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer(struct drm_device *dev, void *data, struct drm_file *file) { struct drm_i915_gem_execbuffer *args = data; struct drm_i915_gem_execbuffer2 exec2; struct drm_i915_gem_exec_object *exec_list = NULL; struct drm_i915_gem_exec_object2 *exec2_list = NULL; int ret, i; if (args->buffer_count < 1...
8,532,822,008,694,941,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,675
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer2(struct drm_device *dev, void *data, struct drm_file *file) { struct drm_i915_gem_execbuffer2 *args = data; struct drm_i915_gem_exec_object2 *exec2_list = NULL; int ret; if (args->buffer_count < 1 || args->buffer_count > UINT_MAX / sizeof(*exec2_list)) { DRM_DEBUG("execbuf2 with %...
314,842,501,112,712,680,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,676
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer_flush(struct drm_device *dev, uint32_t invalidate_domains, uint32_t flush_domains, uint32_t flush_rings) { drm_i915_private_t *dev_priv = dev->dev_private; int i, ret; if (flush_domains & I915_GEM_DOMAIN_CPU) intel_gtt_chipset_flush(); if (flush_domains & I915_GEM_DOMAIN_GTT) ...
99,781,652,971,009,570,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,677
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer_move_to_gpu(struct intel_ring_buffer *ring, struct list_head *objects) { struct drm_i915_gem_object *obj; struct change_domains cd; int ret; memset(&cd, 0, sizeof(cd)); list_for_each_entry(obj, objects, exec_list) i915_gem_object_set_to_gpu_domain(obj, ring, &cd); if (cd.invalidate_dom...
72,197,993,682,817,920,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,678
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer_reserve(struct intel_ring_buffer *ring, struct drm_file *file, struct list_head *objects) { drm_i915_private_t *dev_priv = ring->dev->dev_private; struct drm_i915_gem_object *obj; int ret, retry; bool has_fenced_gpu_access = INTEL_INFO(ring->dev)->gen < 4; struct list_head ordered...
217,890,278,380,884,860,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,679
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer_retire_commands(struct drm_device *dev, struct drm_file *file, struct intel_ring_buffer *ring) { struct drm_i915_gem_request *request; u32 invalidate; /* * Ensure that the commands in the batch buffer are * finished before the interrupt fires. * * The sampler always gets ...
253,668,242,173,936,240,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,680
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer_sync_rings(struct drm_i915_gem_object *obj, struct intel_ring_buffer *to) { struct intel_ring_buffer *from = obj->ring; u32 seqno; int ret, idx; if (from == NULL || to == from) return 0; /* XXX gpu semaphores are implicated in various hard hangs on SNB */ if (!intel_enable_semaph...
184,795,109,521,745,880,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,681
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_execbuffer_wait_for_flips(struct intel_ring_buffer *ring, u32 flips) { u32 plane, flip_mask; int ret; /* Check for any pending flips. As we only maintain a flip queue depth * of 1, we can simply insert a WAIT for the next display flip prior * to executing the batch and avoid stalling the CPU. */ fo...
208,692,764,002,620,150,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,682
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_gem_object_set_to_gpu_domain(struct drm_i915_gem_object *obj, struct intel_ring_buffer *ring, struct change_domains *cd) { uint32_t invalidate_domains = 0, flush_domains = 0; /* * If the object isn't moving to a new write domain, * let the object stay in multiple read domains */ if (obj->base...
128,155,725,454,057,120,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,683
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
i915_reset_gen7_sol_offsets(struct drm_device *dev, struct intel_ring_buffer *ring) { drm_i915_private_t *dev_priv = dev->dev_private; int ret, i; if (!IS_GEN7(dev) || ring != &dev_priv->ring[RCS]) return 0; ret = intel_ring_begin(ring, 4 * 3); if (ret) return ret; for (i = 0; i < 4; i++) { intel_...
110,774,208,455,329,460,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,684
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
intel_enable_semaphores(struct drm_device *dev) { if (INTEL_INFO(dev)->gen < 6) return 0; if (i915_semaphores >= 0) return i915_semaphores; /* Disable semaphores on SNB */ if (INTEL_INFO(dev)->gen == 6) return 0; return 1; }
324,739,317,543,213,400,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,685
linux
44afb3a04391a74309d16180d1e4f8386fdfa745
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
0
validate_exec_list(struct drm_i915_gem_exec_object2 *exec, int count) { int i; for (i = 0; i < count; i++) { char __user *ptr = (char __user *)(uintptr_t)exec[i].relocs_ptr; int length; /* limited by fault_in_pages_readable() */ /* First check for malicious input causing overflow */ if (exec[i].relocat...
270,990,015,066,969,840,000,000,000,000,000,000,000
i915_gem_execbuffer.c
259,959,757,549,234,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a...
https://nvd.nist.gov/vuln/detail/CVE-2012-2384
22,686
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen) { struct nfs_server *server = NFS_SERVER(inode); struct page *pages[NFS4ACL_MAXPAGES]; struct nfs_setaclargs arg = { .fh = NFS_FH(inode), .acl_pages = pages, .acl_len = buflen, }; struct nfs_setaclres res; struct rpc_messag...
184,466,697,838,131,270,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,687
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
void __nfs4_read_done_cb(struct nfs_read_data *data) { nfs_invalidate_atime(data->inode); }
129,003,233,054,390,000,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,688
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void __update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, const nfs4_stateid *deleg_stateid, fmode_t fmode) { /* * Protect the call to nfs4_state_set_mode_locked and * serialise the stateid update */ write_seqlock(&state->seqlock); if (deleg_stateid != NULL) { nfs4_stateid_copy(...
14,458,206,956,644,992,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,689
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
_nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors) { struct nfs41_secinfo_no_name_args args = { .style = SECINFO_STYLE_CURRENT_FH, }; struct nfs4_secinfo_res res = { .flavors = flavors, }; struct rpc_message msg = ...
35,829,872,519,702,730,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,690
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct rpc_task *_nfs41_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred) { struct nfs4_sequence_data *calldata; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SEQUENCE], .rpc_cred = cred, }; struct rpc_task_setup task_setup_data = { .rpc_client = clp->cl_rpcclient, ...
153,009,958,340,078,740,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,691
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int _nfs4_call_sync(struct rpc_clnt *clnt, struct nfs_server *server, struct rpc_message *msg, struct nfs4_sequence_args *args, struct nfs4_sequence_res *res, int cache_reply) { nfs41_init_sequence(args, res, cache_reply); return rpc_call_sync(clnt, msg, 0); }
238,264,848,883,557,900,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,692
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int _nfs4_call_sync_session(struct rpc_clnt *clnt, struct nfs_server *server, struct rpc_message *msg, struct nfs4_sequence_args *args, struct nfs4_sequence_res *res, int cache_reply) { nfs41_init_sequence(args, res, cache_reply); return nfs4_call_sync_sequence(clnt, server, msg, ar...
303,525,252,946,056,350,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,693
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_do_open(struct inode *dir, struct dentry *dentry, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res) { struct nfs4_state_owner *sp; struct nfs4_state *state = NULL; struct nfs_server *server = NFS_SERVER(dir); struct nfs4_opendata *opendata; i...
163,475,871,551,695,360,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,694
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state) { struct nfs_delegation *delegation; struct nfs4_opendata *opendata; fmode_t delegation_type = 0; int status; opendata = nfs4_open_recoverdata_alloc(ctx, state); if (IS_ERR(opendata)) return PTR_ERR(opendata); opendata->o...
161,156,832,462,425,940,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,695
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred, struct nfs_fattr *fattr, struct iattr *sattr, struct nfs4_state *state) { struct nfs_server *server = NFS_SERVER(inode); struct nfs_setattrargs arg = { .fh = NFS_FH(inode), .iap ...
268,785,834,678,354,500,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,696
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int recovery_type) { struct nfs4_lockdata *data; struct rpc_task *task; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK], .rpc_cred = state->owner->so_cred, }; struct rpc_task_setup task_setup_data = {...
328,197,226,405,447,550,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,697
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_free_stateid(struct nfs_server *server, nfs4_stateid *stateid) { struct nfs41_free_stateid_args args = { .stateid = stateid, }; struct nfs41_free_stateid_res res; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FREE_STATEID], .rpc_argp = &args, .rpc_resp = &res, }; ...
23,962,385,488,392,110,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,698
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_getdevicelist(struct nfs_server *server, const struct nfs_fh *fh, struct pnfs_devicelist *devlist) { struct nfs4_getdevicelist_args args = { .fh = fh, .layoutclass = server->pnfs_curr_ld->id, }; struct nfs4_getdevicelist_res res = { .devlist = devlist, }; struct rpc_message m...
221,562,880,418,353,360,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,699
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info) { struct nfs4_lookup_root_arg args = { .bitmask = nfs4_fattr_bitmap, }; struct nfs4_lookup_res res = { .server = server, .fattr = info->fattr, .fh = fhandle, }; struct rpc_message msg = { .rpc_proc ...
44,430,369,142,606,120,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,700
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid) { struct nfs4_opendata *opendata; int ret; opendata = nfs4_open_recoverdata_alloc(ctx, state); if (IS_ERR(opendata)) return PTR_ERR(opendata); opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELE...
12,900,539,521,056,723,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,701
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry) { struct nfs_server *server = NFS_SERVER(inode); struct nfs4_accessargs args = { .fh = NFS_FH(inode), .bitmask = server->cache_consistency_bitmask, }; struct nfs4_accessres res = { .server = server, }; struct rpc_message msg =...
318,960,518,106,974,100,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,702
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_create_session(struct nfs_client *clp) { struct nfs4_session *session = clp->cl_session; struct nfs41_create_session_args args = { .client = clp, .cb_program = NFS4_CALLBACK, }; struct nfs41_create_session_res res = { .client = clp, }; struct rpc_message msg = { .rpc_proc = &nfs4_pro...
128,129,506,426,054,260,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,703
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync) { struct nfs4_delegreturndata *data; struct nfs_server *server = NFS_SERVER(inode); struct rpc_task *task; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN], .r...
185,048,870,866,744,700,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,704
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr) { struct nfs4_getattr_arg args = { .fh = fhandle, .bitmask = server->attr_bitmask, }; struct nfs4_getattr_res res = { .fattr = fattr, .server = server, }; struct rpc_message msg = { .rpc_proc = &nfs4...
208,746,926,650,027,430,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,705
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
_nfs4_proc_getdeviceinfo(struct nfs_server *server, struct pnfs_device *pdev) { struct nfs4_getdeviceinfo_args args = { .pdev = pdev, }; struct nfs4_getdeviceinfo_res res = { .pdev = pdev, }; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICEINFO], .rpc_argp = &args, .rpc_res...
321,074,626,267,359,630,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,706
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request) { struct inode *inode = state->inode; struct nfs_server *server = NFS_SERVER(inode); struct nfs_client *clp = server->nfs_client; struct nfs_lockt_args arg = { .fh = NFS_FH(inode), .fl = request, }; struct nfs_lockt_res ...
34,777,414,656,863,126,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,707
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name) { struct nfs_server *server = NFS_SERVER(inode); struct nfs4_link_arg arg = { .fh = NFS_FH(inode), .dir_fh = NFS_FH(dir), .name = name, .bitmask = server->attr_bitmask, }; struct nfs4_link_res res = { .server = ser...
239,729,701,146,973,740,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,708
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry, struct iattr *sattr) { struct nfs4_createdata *data; int status = -ENOMEM; data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4DIR); if (data == NULL) goto out; status = nfs4_do_create(dir, dentry, data); nfs4_free_createdata(da...
138,974,690,826,065,050,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,709
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry, struct iattr *sattr, dev_t rdev) { struct nfs4_createdata *data; int mode = sattr->ia_mode; int status = -ENOMEM; BUG_ON(!(sattr->ia_valid & ATTR_MODE)); BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode)); data =...
70,423,920,664,423,010,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,710
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_open(struct nfs4_opendata *data) { struct inode *dir = data->dir->d_inode; struct nfs_server *server = NFS_SERVER(dir); struct nfs_openargs *o_arg = &data->o_arg; struct nfs_openres *o_res = &data->o_res; int status; status = nfs4_run_open_task(data, 0); if (!data->rpc_done) return statu...
205,957,613,854,364,200,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,711
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_pathconf *pathconf) { struct nfs4_pathconf_arg args = { .fh = fhandle, .bitmask = server->attr_bitmask, }; struct nfs4_pathconf_res res = { .pathconf = pathconf, }; struct rpc_message msg = { .rpc_proc = &nfs4_pr...
158,907,878,503,491,680,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,712
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred, u64 cookie, struct page **pages, unsigned int count, int plus) { struct inode *dir = dentry->d_inode; struct nfs4_readdir_arg args = { .fh = NFS_FH(dir), .pages = pages, .pgbase = 0, .count = count, .bitmask = NFS_SERVER(dentry->...
65,108,232,389,590,440,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,713
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_readlink(struct inode *inode, struct page *page, unsigned int pgbase, unsigned int pglen) { struct nfs4_readlink args = { .fh = NFS_FH(inode), .pgbase = pgbase, .pglen = pglen, .pages = &page, }; struct nfs4_readlink_res res; struct rpc_message msg = { .rpc_proc = &nf...
79,891,535,302,133,300,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,714
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_remove(struct inode *dir, struct qstr *name) { struct nfs_server *server = NFS_SERVER(dir); struct nfs_removeargs args = { .fh = NFS_FH(dir), .name.len = name->len, .name.name = name->name, .bitmask = server->attr_bitmask, }; struct nfs_removeres res = { .server = server, }; struct...
216,809,122,323,001,350,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,715
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name, struct inode *new_dir, struct qstr *new_name) { struct nfs_server *server = NFS_SERVER(old_dir); struct nfs_renameargs arg = { .old_dir = NFS_FH(old_dir), .new_dir = NFS_FH(new_dir), .old_name = old_name, .new_name = new_name, .bit...
317,520,340,168,987,800,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,716
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors) { int status; struct nfs4_secinfo_arg args = { .dir_fh = NFS_FH(dir), .name = name, }; struct nfs4_secinfo_res res = { .flavors = flavors, }; struct rpc_message msg = { .rpc_proc = &nfs4_p...
116,438,478,858,133,740,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,717
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request) { struct nfs_inode *nfsi = NFS_I(state->inode); unsigned char fl_flags = request->fl_flags; int status = -ENOLCK; if ((fl_flags & FL_POSIX) && !test_bit(NFS_STATE_POSIX_LOCKS, &state->flags)) goto out; /* Is this a dele...
232,872,365,078,451,660,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,718
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat) { struct nfs4_statfs_arg args = { .fh = fhandle, .bitmask = server->attr_bitmask, }; struct nfs4_statfs_res res = { .fsstat = fsstat, }; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSP...
217,906,297,219,527,470,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,719
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry, struct page *page, unsigned int len, struct iattr *sattr) { struct nfs4_createdata *data; int status = -ENAMETOOLONG; if (len > NFS4_MAXPATHLEN) goto out; status = -ENOMEM; data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4LNK...
235,771,286,083,414,460,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,720
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int _nfs4_recover_proc_open(struct nfs4_opendata *data) { struct inode *dir = data->dir->d_inode; struct nfs_openres *o_res = &data->o_res; int status; status = nfs4_run_open_task(data, 1); if (status != 0 || !data->rpc_done) return status; nfs_fattr_map_and_free_names(NFS_SERVER(dir), &data->f_...
129,921,670,264,179,220,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,721
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int can_open_cached(struct nfs4_state *state, fmode_t mode, int open_mode) { int ret = 0; if (open_mode & (O_EXCL|O_TRUNC)) goto out; switch (mode & (FMODE_READ|FMODE_WRITE)) { case FMODE_READ: ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0 && state->n_rdonly != 0; break; case FMODE_...
157,972,469,414,956,850,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,722
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int can_open_delegated(struct nfs_delegation *delegation, fmode_t fmode) { if (delegation == NULL) return 0; if ((delegation->type & fmode) != fmode) return 0; if (test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags)) return 0; nfs_mark_delegation_referenced(delegation); return 1; }
336,767,480,292,025,670,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,723
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void do_renew_lease(struct nfs_client *clp, unsigned long timestamp) { spin_lock(&clp->cl_lock); if (time_before(clp->cl_last_renewal,timestamp)) clp->cl_last_renewal = timestamp; spin_unlock(&clp->cl_lock); }
277,351,330,228,888,440,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,724
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_call_priv_sync_prepare(struct rpc_task *task, void *calldata) { rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED); nfs41_call_sync_prepare(task, calldata); }
113,271,652,797,440,930,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,725
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_call_sync_done(struct rpc_task *task, void *calldata) { struct nfs41_call_sync_data *data = calldata; nfs41_sequence_done(task, data->seq_res); }
87,457,884,045,431,440,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,726
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_call_sync_prepare(struct rpc_task *task, void *calldata) { struct nfs41_call_sync_data *data = calldata; dprintk("--> %s data->seq_server %p\n", __func__, data->seq_server); if (nfs4_setup_sequence(data->seq_server, data->seq_args, data->seq_res, task)) return; rpc_call_start(task); }
241,143,122,568,280,160,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,727
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_check_expired_stateid(struct nfs4_state *state, nfs4_stateid *stateid, unsigned int flags) { int status = NFS_OK; struct nfs_server *server = NFS_SERVER(state->inode); if (state->flags & flags) { status = nfs41_test_stateid(server, stateid); if (status != NFS_OK) { nfs41_free_stateid(server,...
59,661,633,650,013,240,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,728
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs41_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info) { int err; struct page *page; rpc_authflavor_t flavor; struct nfs4_secinfo_flavors *flavors; page = alloc_page(GFP_KERNEL); if (!page) { err = -ENOMEM; goto out; } flavors = page_address(page); err = nfs...
145,395,385,322,286,610,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,729
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
void nfs41_init_sequence(struct nfs4_sequence_args *args, struct nfs4_sequence_res *res, int cache_reply) { }
131,994,990,628,663,120,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,730
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_lock_expired(struct nfs4_state *state, struct file_lock *request) { int status = NFS_OK; if (test_bit(LK_STATE_IN_USE, &state->flags)) status = nfs41_check_expired_locks(state); if (status == NFS_OK) return status; return nfs4_lock_expired(state, request); }
230,267,570,724,481,370,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,731
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static bool nfs41_match_stateid(const nfs4_stateid *s1, const nfs4_stateid *s2) { if (memcmp(s1->other, s2->other, sizeof(s1->other)) != 0) return false; if (s1->seqid == s2->seqid) return true; if (s1->seqid == 0 || s2->seqid == 0) return true; return false; }
12,141,862,043,618,606,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,732
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state) { int deleg_status, open_status; int deleg_flags = 1 << NFS_DELEGATED_STATE; int open_flags = (1 << NFS_O_RDONLY_STATE) | (1 << NFS_O_WRONLY_STATE) | (1 << NFS_O_RDWR_STATE); deleg_status = nfs41_check_expired_stateid(state, &stat...
88,077,586,458,719,300,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,733
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags) { struct rpc_task *task; int ret = 0; if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0) return 0; task = _nfs41_proc_sequence(clp, cred); if (IS_ERR(task)) ret = PTR_ERR(task); else rpc_put_task_async(task)...
49,133,858,038,278,230,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,734
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_proc_reclaim_complete(struct nfs_client *clp) { struct nfs4_reclaim_complete_data *calldata; struct rpc_task *task; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RECLAIM_COMPLETE], }; struct rpc_task_setup task_setup_data = { .rpc_client = clp->cl_rpcclient, .rpc_mess...
123,295,957,721,396,530,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,735
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors) { struct nfs4_exception exception = { }; int err; do { err = _nfs41_proc_secinfo_no_name(server, fhandle, info, flavors); switch (err) { case 0: case -NFS4ERR_WRO...
158,077,019,944,139,160,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,736
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_reclaim_complete_handle_errors(struct rpc_task *task, struct nfs_client *clp) { switch(task->tk_status) { case 0: case -NFS4ERR_COMPLETE_ALREADY: case -NFS4ERR_WRONG_CRED: /* What to do here? */ break; case -NFS4ERR_DELAY: rpc_delay(task, NFS4_POLL_RETRY_MAX); /* fall through */ case -NFS4E...
311,231,456,566,347,900,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,737
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs41_same_server_scope(struct server_scope *a, struct server_scope *b) { if (a->server_scope_sz == b->server_scope_sz && memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0) return true; return false; }
220,696,042,284,835,000,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375