idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
22,528 | linux | 13d518074a952d33d47c428419693f63389547e9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9 | epoll: clear the tfile_check_list on -ELOOP
An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent
circular epoll dependencies from being created. However, in that case we
do not properly clear the 'tfile_check_list'. Thus, add a call to
clear_tfile_check_list() for the -ELOOP case.
Signed-off-by: ... | 0 | static void path_count_init(void)
{
int i;
for (i = 0; i < PATH_ARR_SIZE; i++)
path_count[i] = 0;
}
| 269,313,371,594,384,000,000,000,000,000,000,000,000 | eventpoll.c | 305,502,646,873,515,640,000,000,000,000,000,000,000 | [] | CVE-2012-3375 | The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll depende... | https://nvd.nist.gov/vuln/detail/CVE-2012-3375 |
22,529 | linux | 13d518074a952d33d47c428419693f63389547e9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9 | epoll: clear the tfile_check_list on -ELOOP
An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent
circular epoll dependencies from being created. However, in that case we
do not properly clear the 'tfile_check_list'. Thus, add a call to
clear_tfile_check_list() for the -ELOOP case.
Signed-off-by: ... | 0 | static int reverse_path_check(void)
{
int error = 0;
struct file *current_file;
/* let's call this for all tfiles */
list_for_each_entry(current_file, &tfile_check_list, f_tfile_llink) {
path_count_init();
error = ep_call_nested(&poll_loop_ncalls, EP_MAX_NESTS,
reverse_path_check_proc, current_file,
... | 311,887,058,586,251,940,000,000,000,000,000,000,000 | eventpoll.c | 305,502,646,873,515,640,000,000,000,000,000,000,000 | [] | CVE-2012-3375 | The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll depende... | https://nvd.nist.gov/vuln/detail/CVE-2012-3375 |
22,530 | linux | 13d518074a952d33d47c428419693f63389547e9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9 | epoll: clear the tfile_check_list on -ELOOP
An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent
circular epoll dependencies from being created. However, in that case we
do not properly clear the 'tfile_check_list'. Thus, add a call to
clear_tfile_check_list() for the -ELOOP case.
Signed-off-by: ... | 0 | static int reverse_path_check_proc(void *priv, void *cookie, int call_nests)
{
int error = 0;
struct file *file = priv;
struct file *child_file;
struct epitem *epi;
list_for_each_entry(epi, &file->f_ep_links, fllink) {
child_file = epi->ep->file;
if (is_file_epoll(child_file)) {
if (list_empty(&child_file-... | 295,429,429,341,225,420,000,000,000,000,000,000,000 | eventpoll.c | 305,502,646,873,515,640,000,000,000,000,000,000,000 | [] | CVE-2012-3375 | The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll depende... | https://nvd.nist.gov/vuln/detail/CVE-2012-3375 |
22,531 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | void __invalid_creds(const struct cred *cred, const char *file, unsigned line)
{
printk(KERN_ERR "CRED: Invalid credentials\n");
printk(KERN_ERR "CRED: At %s:%u\n", file, line);
dump_invalid_creds(cred, "Specified", current);
BUG();
}
| 217,505,547,758,700,800,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,532 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | void __put_cred(struct cred *cred)
{
kdebug("__put_cred(%p{%d,%d})", cred,
atomic_read(&cred->usage),
read_cred_subscribers(cred));
BUG_ON(atomic_read(&cred->usage) != 0);
#ifdef CONFIG_DEBUG_CREDENTIALS
BUG_ON(read_cred_subscribers(cred) != 0);
cred->magic = CRED_MAGIC_DEAD;
cred->put_addr = __bu... | 131,475,695,434,069,250,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,533 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | void __validate_process_creds(struct task_struct *tsk,
const char *file, unsigned line)
{
if (tsk->cred == tsk->real_cred) {
if (unlikely(read_cred_subscribers(tsk->cred) < 2 ||
creds_are_invalid(tsk->cred)))
goto invalid_creds;
} else {
if (unlikely(read_cred_subscribers(tsk->real_cred) < 1 |... | 161,463,163,575,306,180,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,534 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | int commit_creds(struct cred *new)
{
struct task_struct *task = current;
const struct cred *old = task->real_cred;
kdebug("commit_creds(%p{%d,%d})", new,
atomic_read(&new->usage),
read_cred_subscribers(new));
BUG_ON(task->cred != old);
#ifdef CONFIG_DEBUG_CREDENTIALS
BUG_ON(read_cred_subscribers(... | 260,410,301,045,525,200,000,000,000,000,000,000,000 | cred.c | 192,217,264,892,189,970,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,535 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | bool creds_are_invalid(const struct cred *cred)
{
if (cred->magic != CRED_MAGIC)
return true;
#ifdef CONFIG_SECURITY_SELINUX
/*
* cred->security == NULL if security_cred_alloc_blank() or
* security_prepare_creds() returned an error.
*/
if (selinux_is_enabled() && cred->security) {
if ((unsigned long) cred-... | 169,178,123,320,732,280,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,536 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | static void dump_invalid_creds(const struct cred *cred, const char *label,
const struct task_struct *tsk)
{
printk(KERN_ERR "CRED: %s credentials: %p %s%s%s\n",
label, cred,
cred == &init_cred ? "[init]" : "",
cred == tsk->real_cred ? "[real]" : "",
cred == tsk->cred ? "[eff]"... | 25,726,076,309,968,140,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,537 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | void exit_creds(struct task_struct *tsk)
{
struct cred *cred;
kdebug("exit_creds(%u,%p,%p,{%d,%d})", tsk->pid, tsk->real_cred, tsk->cred,
atomic_read(&tsk->cred->usage),
read_cred_subscribers(tsk->cred));
cred = (struct cred *) tsk->real_cred;
tsk->real_cred = NULL;
validate_creds(cred);
alter_c... | 120,656,544,735,168,790,000,000,000,000,000,000,000 | cred.c | 192,217,264,892,189,970,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,538 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | const struct cred *get_task_cred(struct task_struct *task)
{
const struct cred *cred;
rcu_read_lock();
do {
cred = __task_cred((task));
BUG_ON(!cred);
} while (!atomic_inc_not_zero(&((struct cred *)cred)->usage));
rcu_read_unlock();
return cred;
}
| 192,586,859,336,657,040,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,539 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | const struct cred *override_creds(const struct cred *new)
{
const struct cred *old = current->cred;
kdebug("override_creds(%p{%d,%d})", new,
atomic_read(&new->usage),
read_cred_subscribers(new));
validate_creds(old);
validate_creds(new);
get_cred(new);
alter_cred_subscribers(new, 1);
rcu_assign... | 195,074,806,102,616,980,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,540 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | struct cred *prepare_creds(void)
{
struct task_struct *task = current;
const struct cred *old;
struct cred *new;
validate_process_creds();
new = kmem_cache_alloc(cred_jar, GFP_KERNEL);
if (!new)
return NULL;
kdebug("prepare_creds() alloc %p", new);
old = task->cred;
memcpy(new, old, sizeof(struct cred));... | 30,499,582,123,587,943,000,000,000,000,000,000,000 | cred.c | 192,217,264,892,189,970,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,541 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | struct cred *prepare_exec_creds(void)
{
struct thread_group_cred *tgcred = NULL;
struct cred *new;
#ifdef CONFIG_KEYS
tgcred = kmalloc(sizeof(*tgcred), GFP_KERNEL);
if (!tgcred)
return NULL;
#endif
new = prepare_creds();
if (!new) {
kfree(tgcred);
return new;
}
#ifdef CONFIG_KEYS
/* newly exec'd tasks ... | 326,367,417,671,435,540,000,000,000,000,000,000,000 | cred.c | 137,445,093,302,874,820,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,542 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | struct cred *prepare_kernel_cred(struct task_struct *daemon)
{
#ifdef CONFIG_KEYS
struct thread_group_cred *tgcred;
#endif
const struct cred *old;
struct cred *new;
new = kmem_cache_alloc(cred_jar, GFP_KERNEL);
if (!new)
return NULL;
#ifdef CONFIG_KEYS
tgcred = kmalloc(sizeof(*tgcred), GFP_KERNEL);
if (!tgcr... | 153,023,409,938,486,840,000,000,000,000,000,000,000 | cred.c | 192,217,264,892,189,970,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,543 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | static void put_cred_rcu(struct rcu_head *rcu)
{
struct cred *cred = container_of(rcu, struct cred, rcu);
kdebug("put_cred_rcu(%p)", cred);
#ifdef CONFIG_DEBUG_CREDENTIALS
if (cred->magic != CRED_MAGIC_DEAD ||
atomic_read(&cred->usage) != 0 ||
read_cred_subscribers(cred) != 0)
panic("CRED: put_cred_rcu... | 299,022,720,800,099,360,000,000,000,000,000,000,000 | cred.c | 192,217,264,892,189,970,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,544 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | static inline int read_cred_subscribers(const struct cred *cred)
{
#ifdef CONFIG_DEBUG_CREDENTIALS
return atomic_read(&cred->subscribers);
#else
return 0;
#endif
}
| 171,216,698,756,354,700,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,545 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | static void release_tgcred(struct cred *cred)
{
#ifdef CONFIG_KEYS
struct thread_group_cred *tgcred = cred->tgcred;
if (atomic_dec_and_test(&tgcred->usage))
call_rcu(&tgcred->rcu, release_tgcred_rcu);
#endif
}
| 233,304,164,087,160,650,000,000,000,000,000,000,000 | cred.c | 137,445,093,302,874,820,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,546 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | void revert_creds(const struct cred *old)
{
const struct cred *override = current->cred;
kdebug("revert_creds(%p{%d,%d})", old,
atomic_read(&old->usage),
read_cred_subscribers(old));
validate_creds(old);
validate_creds(override);
alter_cred_subscribers(old, 1);
rcu_assign_pointer(current->cred, ... | 179,446,810,855,885,870,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,547 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | int set_create_files_as(struct cred *new, struct inode *inode)
{
new->fsuid = inode->i_uid;
new->fsgid = inode->i_gid;
return security_kernel_create_files_as(new, inode);
}
| 188,919,073,485,235,970,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,548 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | static inline void set_cred_subscribers(struct cred *cred, int n)
{
#ifdef CONFIG_DEBUG_CREDENTIALS
atomic_set(&cred->subscribers, n);
#endif
}
| 256,933,888,850,285,160,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,549 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | int set_security_override(struct cred *new, u32 secid)
{
return security_kernel_act_as(new, secid);
}
| 269,487,665,926,910,400,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,550 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | int set_security_override_from_ctx(struct cred *new, const char *secctx)
{
u32 secid;
int ret;
ret = security_secctx_to_secid(secctx, strlen(secctx), &secid);
if (ret < 0)
return ret;
return set_security_override(new, secid);
}
| 256,544,590,273,200,960,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,551 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 0 | void validate_creds_for_do_exit(struct task_struct *tsk)
{
kdebug("validate_creds_for_do_exit(%p,%p{%d,%d})",
tsk->real_cred, tsk->cred,
atomic_read(&tsk->cred->usage),
read_cred_subscribers(tsk->cred));
__validate_process_creds(tsk, __FILE__, __LINE__);
}
| 249,339,182,468,642,460,000,000,000,000,000,000,000 | cred.c | 258,355,486,268,991,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
22,563 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | static void kvp_acquire_lock(int pool)
{
struct flock fl = {F_WRLCK, SEEK_SET, 0, 0, 0};
fl.l_pid = getpid();
if (fcntl(kvp_file_info[pool].fd, F_SETLKW, &fl) == -1) {
syslog(LOG_ERR, "Failed to acquire the lock pool: %d", pool);
exit(-1);
}
}
| 335,612,539,123,819,070,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,564 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | static int kvp_file_init(void)
{
int ret, fd;
FILE *filep;
size_t records_read;
__u8 *fname;
struct kvp_record *record;
struct kvp_record *readp;
int num_blocks;
int i;
int alloc_unit = sizeof(struct kvp_record) * ENTRIES_PER_BLOCK;
if (access("/var/opt/hyperv", F_OK)) {
if (mkdir("/var/opt/hyperv", S_IRUS... | 294,352,425,697,393,060,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,565 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | void kvp_get_os_info(void)
{
FILE *file;
char *p, buf[512];
uname(&uts_buf);
os_build = uts_buf.release;
processor_arch = uts_buf.machine;
/*
* The current windows host (win7) expects the build
* string to be of the form: x.y.z
* Strip additional information we may have.
*/
p = strchr(os_build, '-');
... | 27,115,904,255,886,060,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,566 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | static int kvp_key_add_or_modify(int pool, __u8 *key, int key_size, __u8 *value,
int value_size)
{
int i;
int j, k;
int num_records;
struct kvp_record *record;
int num_blocks;
if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) ||
(value_size > HV_KVP_EXCHANGE_MAX_VALUE_SIZE))
return 1;
/*
* First update th... | 331,609,132,948,364,800,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,567 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | static void kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size,
__u8 *value, int value_size)
{
struct kvp_record *record;
/*
* First update our in-memory database.
*/
kvp_update_mem_state(pool);
record = kvp_file_info[pool].records;
if (index >= kvp_file_info[pool].num_records) {
/*
* T... | 173,672,958,527,089,240,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,568 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | static void kvp_release_lock(int pool)
{
struct flock fl = {F_UNLCK, SEEK_SET, 0, 0, 0};
fl.l_pid = getpid();
if (fcntl(kvp_file_info[pool].fd, F_SETLK, &fl) == -1) {
perror("fcntl");
syslog(LOG_ERR, "Failed to release the lock pool: %d", pool);
exit(-1);
}
}
| 179,047,880,057,339,930,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,569 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 0 | static void kvp_update_file(int pool)
{
FILE *filep;
size_t bytes_written;
/*
* We are going to write our in-memory registry out to
* disk; acquire the lock first.
*/
kvp_acquire_lock(pool);
filep = fopen(kvp_file_info[pool].fname, "w");
if (!filep) {
kvp_release_lock(pool);
syslog(LOG_ERR, "Failed to... | 191,948,001,740,023,260,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 116,130,904,297,105,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
22,669 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | eb_add_object(struct eb_objects *eb, struct drm_i915_gem_object *obj)
{
hlist_add_head(&obj->exec_node,
&eb->buckets[obj->exec_handle & eb->and]);
}
| 4,665,223,243,484,755,700,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,670 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | eb_create(int size)
{
struct eb_objects *eb;
int count = PAGE_SIZE / sizeof(struct hlist_head) / 2;
while (count > size)
count >>= 1;
eb = kzalloc(count*sizeof(struct hlist_head) +
sizeof(struct eb_objects),
GFP_KERNEL);
if (eb == NULL)
return eb;
eb->and = count - 1;
return eb;
}
| 327,344,081,924,704,200,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,671 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | eb_destroy(struct eb_objects *eb)
{
kfree(eb);
}
| 107,316,221,565,420,700,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,672 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | eb_reset(struct eb_objects *eb)
{
memset(eb->buckets, 0, (eb->and+1)*sizeof(struct hlist_head));
}
| 139,046,621,418,072,130,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,673 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_check_execbuffer(struct drm_i915_gem_execbuffer2 *exec)
{
return ((exec->batch_start_offset | exec->batch_len) & 0x7) == 0;
}
| 165,900,091,965,205,460,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,674 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer(struct drm_device *dev, void *data,
struct drm_file *file)
{
struct drm_i915_gem_execbuffer *args = data;
struct drm_i915_gem_execbuffer2 exec2;
struct drm_i915_gem_exec_object *exec_list = NULL;
struct drm_i915_gem_exec_object2 *exec2_list = NULL;
int ret, i;
if (args->buffer_count < 1... | 8,532,822,008,694,941,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,675 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer2(struct drm_device *dev, void *data,
struct drm_file *file)
{
struct drm_i915_gem_execbuffer2 *args = data;
struct drm_i915_gem_exec_object2 *exec2_list = NULL;
int ret;
if (args->buffer_count < 1 ||
args->buffer_count > UINT_MAX / sizeof(*exec2_list)) {
DRM_DEBUG("execbuf2 with %... | 314,842,501,112,712,680,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,676 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer_flush(struct drm_device *dev,
uint32_t invalidate_domains,
uint32_t flush_domains,
uint32_t flush_rings)
{
drm_i915_private_t *dev_priv = dev->dev_private;
int i, ret;
if (flush_domains & I915_GEM_DOMAIN_CPU)
intel_gtt_chipset_flush();
if (flush_domains & I915_GEM_DOMAIN_GTT)
... | 99,781,652,971,009,570,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,677 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer_move_to_gpu(struct intel_ring_buffer *ring,
struct list_head *objects)
{
struct drm_i915_gem_object *obj;
struct change_domains cd;
int ret;
memset(&cd, 0, sizeof(cd));
list_for_each_entry(obj, objects, exec_list)
i915_gem_object_set_to_gpu_domain(obj, ring, &cd);
if (cd.invalidate_dom... | 72,197,993,682,817,920,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,678 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer_reserve(struct intel_ring_buffer *ring,
struct drm_file *file,
struct list_head *objects)
{
drm_i915_private_t *dev_priv = ring->dev->dev_private;
struct drm_i915_gem_object *obj;
int ret, retry;
bool has_fenced_gpu_access = INTEL_INFO(ring->dev)->gen < 4;
struct list_head ordered... | 217,890,278,380,884,860,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,679 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer_retire_commands(struct drm_device *dev,
struct drm_file *file,
struct intel_ring_buffer *ring)
{
struct drm_i915_gem_request *request;
u32 invalidate;
/*
* Ensure that the commands in the batch buffer are
* finished before the interrupt fires.
*
* The sampler always gets ... | 253,668,242,173,936,240,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,680 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer_sync_rings(struct drm_i915_gem_object *obj,
struct intel_ring_buffer *to)
{
struct intel_ring_buffer *from = obj->ring;
u32 seqno;
int ret, idx;
if (from == NULL || to == from)
return 0;
/* XXX gpu semaphores are implicated in various hard hangs on SNB */
if (!intel_enable_semaph... | 184,795,109,521,745,880,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,681 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_execbuffer_wait_for_flips(struct intel_ring_buffer *ring, u32 flips)
{
u32 plane, flip_mask;
int ret;
/* Check for any pending flips. As we only maintain a flip queue depth
* of 1, we can simply insert a WAIT for the next display flip prior
* to executing the batch and avoid stalling the CPU.
*/
fo... | 208,692,764,002,620,150,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,682 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_gem_object_set_to_gpu_domain(struct drm_i915_gem_object *obj,
struct intel_ring_buffer *ring,
struct change_domains *cd)
{
uint32_t invalidate_domains = 0, flush_domains = 0;
/*
* If the object isn't moving to a new write domain,
* let the object stay in multiple read domains
*/
if (obj->base... | 128,155,725,454,057,120,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,683 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | i915_reset_gen7_sol_offsets(struct drm_device *dev,
struct intel_ring_buffer *ring)
{
drm_i915_private_t *dev_priv = dev->dev_private;
int ret, i;
if (!IS_GEN7(dev) || ring != &dev_priv->ring[RCS])
return 0;
ret = intel_ring_begin(ring, 4 * 3);
if (ret)
return ret;
for (i = 0; i < 4; i++) {
intel_... | 110,774,208,455,329,460,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,684 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | intel_enable_semaphores(struct drm_device *dev)
{
if (INTEL_INFO(dev)->gen < 6)
return 0;
if (i915_semaphores >= 0)
return i915_semaphores;
/* Disable semaphores on SNB */
if (INTEL_INFO(dev)->gen == 6)
return 0;
return 1;
}
| 324,739,317,543,213,400,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,685 | linux | 44afb3a04391a74309d16180d1e4f8386fdfa745 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 | drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 0 | validate_exec_list(struct drm_i915_gem_exec_object2 *exec,
int count)
{
int i;
for (i = 0; i < count; i++) {
char __user *ptr = (char __user *)(uintptr_t)exec[i].relocs_ptr;
int length; /* limited by fault_in_pages_readable() */
/* First check for malicious input causing overflow */
if (exec[i].relocat... | 270,990,015,066,969,840,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 259,959,757,549,234,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2384 | Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2012-2384 |
22,686 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
{
struct nfs_server *server = NFS_SERVER(inode);
struct page *pages[NFS4ACL_MAXPAGES];
struct nfs_setaclargs arg = {
.fh = NFS_FH(inode),
.acl_pages = pages,
.acl_len = buflen,
};
struct nfs_setaclres res;
struct rpc_messag... | 184,466,697,838,131,270,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,687 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | void __nfs4_read_done_cb(struct nfs_read_data *data)
{
nfs_invalidate_atime(data->inode);
}
| 129,003,233,054,390,000,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,688 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static void __update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, const nfs4_stateid *deleg_stateid, fmode_t fmode)
{
/*
* Protect the call to nfs4_state_set_mode_locked and
* serialise the stateid update
*/
write_seqlock(&state->seqlock);
if (deleg_stateid != NULL) {
nfs4_stateid_copy(... | 14,458,206,956,644,992,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,689 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | _nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
{
struct nfs41_secinfo_no_name_args args = {
.style = SECINFO_STYLE_CURRENT_FH,
};
struct nfs4_secinfo_res res = {
.flavors = flavors,
};
struct rpc_message msg = ... | 35,829,872,519,702,730,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,690 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static struct rpc_task *_nfs41_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
{
struct nfs4_sequence_data *calldata;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SEQUENCE],
.rpc_cred = cred,
};
struct rpc_task_setup task_setup_data = {
.rpc_client = clp->cl_rpcclient,
... | 153,009,958,340,078,740,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,691 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | int _nfs4_call_sync(struct rpc_clnt *clnt,
struct nfs_server *server,
struct rpc_message *msg,
struct nfs4_sequence_args *args,
struct nfs4_sequence_res *res,
int cache_reply)
{
nfs41_init_sequence(args, res, cache_reply);
return rpc_call_sync(clnt, msg, 0);
}
| 238,264,848,883,557,900,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,692 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | int _nfs4_call_sync_session(struct rpc_clnt *clnt,
struct nfs_server *server,
struct rpc_message *msg,
struct nfs4_sequence_args *args,
struct nfs4_sequence_res *res,
int cache_reply)
{
nfs41_init_sequence(args, res, cache_reply);
return nfs4_call_sync_sequence(clnt, server, msg, ar... | 303,525,252,946,056,350,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,693 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_do_open(struct inode *dir, struct dentry *dentry, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res)
{
struct nfs4_state_owner *sp;
struct nfs4_state *state = NULL;
struct nfs_server *server = NFS_SERVER(dir);
struct nfs4_opendata *opendata;
i... | 163,475,871,551,695,360,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,694 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
{
struct nfs_delegation *delegation;
struct nfs4_opendata *opendata;
fmode_t delegation_type = 0;
int status;
opendata = nfs4_open_recoverdata_alloc(ctx, state);
if (IS_ERR(opendata))
return PTR_ERR(opendata);
opendata->o... | 161,156,832,462,425,940,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,695 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
struct nfs_fattr *fattr, struct iattr *sattr,
struct nfs4_state *state)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs_setattrargs arg = {
.fh = NFS_FH(inode),
.iap ... | 268,785,834,678,354,500,000,000,000,000,000,000,000 | nfs4proc.c | 152,084,679,731,241,390,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,696 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int recovery_type)
{
struct nfs4_lockdata *data;
struct rpc_task *task;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
.rpc_cred = state->owner->so_cred,
};
struct rpc_task_setup task_setup_data = {... | 328,197,226,405,447,550,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,697 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_free_stateid(struct nfs_server *server, nfs4_stateid *stateid)
{
struct nfs41_free_stateid_args args = {
.stateid = stateid,
};
struct nfs41_free_stateid_res res;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FREE_STATEID],
.rpc_argp = &args,
.rpc_resp = &res,
};
... | 23,962,385,488,392,110,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,698 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_getdevicelist(struct nfs_server *server,
const struct nfs_fh *fh,
struct pnfs_devicelist *devlist)
{
struct nfs4_getdevicelist_args args = {
.fh = fh,
.layoutclass = server->pnfs_curr_ld->id,
};
struct nfs4_getdevicelist_res res = {
.devlist = devlist,
};
struct rpc_message m... | 221,562,880,418,353,360,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,699 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_fsinfo *info)
{
struct nfs4_lookup_root_arg args = {
.bitmask = nfs4_fattr_bitmap,
};
struct nfs4_lookup_res res = {
.server = server,
.fattr = info->fattr,
.fh = fhandle,
};
struct rpc_message msg = {
.rpc_proc ... | 44,430,369,142,606,120,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,700 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
{
struct nfs4_opendata *opendata;
int ret;
opendata = nfs4_open_recoverdata_alloc(ctx, state);
if (IS_ERR(opendata))
return PTR_ERR(opendata);
opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELE... | 12,900,539,521,056,723,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,701 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs4_accessargs args = {
.fh = NFS_FH(inode),
.bitmask = server->cache_consistency_bitmask,
};
struct nfs4_accessres res = {
.server = server,
};
struct rpc_message msg =... | 318,960,518,106,974,100,000,000,000,000,000,000,000 | nfs4proc.c | 152,084,679,731,241,390,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,702 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_create_session(struct nfs_client *clp)
{
struct nfs4_session *session = clp->cl_session;
struct nfs41_create_session_args args = {
.client = clp,
.cb_program = NFS4_CALLBACK,
};
struct nfs41_create_session_res res = {
.client = clp,
};
struct rpc_message msg = {
.rpc_proc = &nfs4_pro... | 128,129,506,426,054,260,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,703 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
{
struct nfs4_delegreturndata *data;
struct nfs_server *server = NFS_SERVER(inode);
struct rpc_task *task;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
.r... | 185,048,870,866,744,700,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,704 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
{
struct nfs4_getattr_arg args = {
.fh = fhandle,
.bitmask = server->attr_bitmask,
};
struct nfs4_getattr_res res = {
.fattr = fattr,
.server = server,
};
struct rpc_message msg = {
.rpc_proc = &nfs4... | 208,746,926,650,027,430,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,705 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | _nfs4_proc_getdeviceinfo(struct nfs_server *server, struct pnfs_device *pdev)
{
struct nfs4_getdeviceinfo_args args = {
.pdev = pdev,
};
struct nfs4_getdeviceinfo_res res = {
.pdev = pdev,
};
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICEINFO],
.rpc_argp = &args,
.rpc_res... | 321,074,626,267,359,630,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,706 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
{
struct inode *inode = state->inode;
struct nfs_server *server = NFS_SERVER(inode);
struct nfs_client *clp = server->nfs_client;
struct nfs_lockt_args arg = {
.fh = NFS_FH(inode),
.fl = request,
};
struct nfs_lockt_res ... | 34,777,414,656,863,126,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,707 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
{
struct nfs_server *server = NFS_SERVER(inode);
struct nfs4_link_arg arg = {
.fh = NFS_FH(inode),
.dir_fh = NFS_FH(dir),
.name = name,
.bitmask = server->attr_bitmask,
};
struct nfs4_link_res res = {
.server = ser... | 239,729,701,146,973,740,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,708 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
struct iattr *sattr)
{
struct nfs4_createdata *data;
int status = -ENOMEM;
data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4DIR);
if (data == NULL)
goto out;
status = nfs4_do_create(dir, dentry, data);
nfs4_free_createdata(da... | 138,974,690,826,065,050,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,709 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
struct iattr *sattr, dev_t rdev)
{
struct nfs4_createdata *data;
int mode = sattr->ia_mode;
int status = -ENOMEM;
BUG_ON(!(sattr->ia_valid & ATTR_MODE));
BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode));
data =... | 70,423,920,664,423,010,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,710 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_open(struct nfs4_opendata *data)
{
struct inode *dir = data->dir->d_inode;
struct nfs_server *server = NFS_SERVER(dir);
struct nfs_openargs *o_arg = &data->o_arg;
struct nfs_openres *o_res = &data->o_res;
int status;
status = nfs4_run_open_task(data, 0);
if (!data->rpc_done)
return statu... | 205,957,613,854,364,200,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,711 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_pathconf *pathconf)
{
struct nfs4_pathconf_arg args = {
.fh = fhandle,
.bitmask = server->attr_bitmask,
};
struct nfs4_pathconf_res res = {
.pathconf = pathconf,
};
struct rpc_message msg = {
.rpc_proc = &nfs4_pr... | 158,907,878,503,491,680,000,000,000,000,000,000,000 | nfs4proc.c | 206,563,598,646,579,670,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,712 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
u64 cookie, struct page **pages, unsigned int count, int plus)
{
struct inode *dir = dentry->d_inode;
struct nfs4_readdir_arg args = {
.fh = NFS_FH(dir),
.pages = pages,
.pgbase = 0,
.count = count,
.bitmask = NFS_SERVER(dentry->... | 65,108,232,389,590,440,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,713 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
unsigned int pgbase, unsigned int pglen)
{
struct nfs4_readlink args = {
.fh = NFS_FH(inode),
.pgbase = pgbase,
.pglen = pglen,
.pages = &page,
};
struct nfs4_readlink_res res;
struct rpc_message msg = {
.rpc_proc = &nf... | 79,891,535,302,133,300,000,000,000,000,000,000,000 | nfs4proc.c | 206,563,598,646,579,670,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,714 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
{
struct nfs_server *server = NFS_SERVER(dir);
struct nfs_removeargs args = {
.fh = NFS_FH(dir),
.name.len = name->len,
.name.name = name->name,
.bitmask = server->attr_bitmask,
};
struct nfs_removeres res = {
.server = server,
};
struct... | 216,809,122,323,001,350,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,715 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
struct inode *new_dir, struct qstr *new_name)
{
struct nfs_server *server = NFS_SERVER(old_dir);
struct nfs_renameargs arg = {
.old_dir = NFS_FH(old_dir),
.new_dir = NFS_FH(new_dir),
.old_name = old_name,
.new_name = new_name,
.bit... | 317,520,340,168,987,800,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,716 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors)
{
int status;
struct nfs4_secinfo_arg args = {
.dir_fh = NFS_FH(dir),
.name = name,
};
struct nfs4_secinfo_res res = {
.flavors = flavors,
};
struct rpc_message msg = {
.rpc_proc = &nfs4_p... | 116,438,478,858,133,740,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,717 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
{
struct nfs_inode *nfsi = NFS_I(state->inode);
unsigned char fl_flags = request->fl_flags;
int status = -ENOLCK;
if ((fl_flags & FL_POSIX) &&
!test_bit(NFS_STATE_POSIX_LOCKS, &state->flags))
goto out;
/* Is this a dele... | 232,872,365,078,451,660,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,718 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_fsstat *fsstat)
{
struct nfs4_statfs_arg args = {
.fh = fhandle,
.bitmask = server->attr_bitmask,
};
struct nfs4_statfs_res res = {
.fsstat = fsstat,
};
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSP... | 217,906,297,219,527,470,000,000,000,000,000,000,000 | nfs4proc.c | 206,563,598,646,579,670,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,719 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
struct page *page, unsigned int len, struct iattr *sattr)
{
struct nfs4_createdata *data;
int status = -ENAMETOOLONG;
if (len > NFS4_MAXPATHLEN)
goto out;
status = -ENOMEM;
data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4LNK... | 235,771,286,083,414,460,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,720 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int _nfs4_recover_proc_open(struct nfs4_opendata *data)
{
struct inode *dir = data->dir->d_inode;
struct nfs_openres *o_res = &data->o_res;
int status;
status = nfs4_run_open_task(data, 1);
if (status != 0 || !data->rpc_done)
return status;
nfs_fattr_map_and_free_names(NFS_SERVER(dir), &data->f_... | 129,921,670,264,179,220,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,721 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int can_open_cached(struct nfs4_state *state, fmode_t mode, int open_mode)
{
int ret = 0;
if (open_mode & (O_EXCL|O_TRUNC))
goto out;
switch (mode & (FMODE_READ|FMODE_WRITE)) {
case FMODE_READ:
ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0
&& state->n_rdonly != 0;
break;
case FMODE_... | 157,972,469,414,956,850,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,722 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int can_open_delegated(struct nfs_delegation *delegation, fmode_t fmode)
{
if (delegation == NULL)
return 0;
if ((delegation->type & fmode) != fmode)
return 0;
if (test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags))
return 0;
nfs_mark_delegation_referenced(delegation);
return 1;
}
| 336,767,480,292,025,670,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,723 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static void do_renew_lease(struct nfs_client *clp, unsigned long timestamp)
{
spin_lock(&clp->cl_lock);
if (time_before(clp->cl_last_renewal,timestamp))
clp->cl_last_renewal = timestamp;
spin_unlock(&clp->cl_lock);
}
| 277,351,330,228,888,440,000,000,000,000,000,000,000 | nfs4proc.c | 206,563,598,646,579,670,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,724 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static void nfs41_call_priv_sync_prepare(struct rpc_task *task, void *calldata)
{
rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
nfs41_call_sync_prepare(task, calldata);
}
| 113,271,652,797,440,930,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,725 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static void nfs41_call_sync_done(struct rpc_task *task, void *calldata)
{
struct nfs41_call_sync_data *data = calldata;
nfs41_sequence_done(task, data->seq_res);
}
| 87,457,884,045,431,440,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,726 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static void nfs41_call_sync_prepare(struct rpc_task *task, void *calldata)
{
struct nfs41_call_sync_data *data = calldata;
dprintk("--> %s data->seq_server %p\n", __func__, data->seq_server);
if (nfs4_setup_sequence(data->seq_server, data->seq_args,
data->seq_res, task))
return;
rpc_call_start(task);
}
| 241,143,122,568,280,160,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,727 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int nfs41_check_expired_stateid(struct nfs4_state *state, nfs4_stateid *stateid, unsigned int flags)
{
int status = NFS_OK;
struct nfs_server *server = NFS_SERVER(state->inode);
if (state->flags & flags) {
status = nfs41_test_stateid(server, stateid);
if (status != NFS_OK) {
nfs41_free_stateid(server,... | 59,661,633,650,013,240,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,728 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | nfs41_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_fsinfo *info)
{
int err;
struct page *page;
rpc_authflavor_t flavor;
struct nfs4_secinfo_flavors *flavors;
page = alloc_page(GFP_KERNEL);
if (!page) {
err = -ENOMEM;
goto out;
}
flavors = page_address(page);
err = nfs... | 145,395,385,322,286,610,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,729 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | void nfs41_init_sequence(struct nfs4_sequence_args *args,
struct nfs4_sequence_res *res, int cache_reply)
{
}
| 131,994,990,628,663,120,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,730 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int nfs41_lock_expired(struct nfs4_state *state, struct file_lock *request)
{
int status = NFS_OK;
if (test_bit(LK_STATE_IN_USE, &state->flags))
status = nfs41_check_expired_locks(state);
if (status == NFS_OK)
return status;
return nfs4_lock_expired(state, request);
}
| 230,267,570,724,481,370,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,731 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static bool nfs41_match_stateid(const nfs4_stateid *s1,
const nfs4_stateid *s2)
{
if (memcmp(s1->other, s2->other, sizeof(s1->other)) != 0)
return false;
if (s1->seqid == s2->seqid)
return true;
if (s1->seqid == 0 || s2->seqid == 0)
return true;
return false;
}
| 12,141,862,043,618,606,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,732 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int nfs41_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
{
int deleg_status, open_status;
int deleg_flags = 1 << NFS_DELEGATED_STATE;
int open_flags = (1 << NFS_O_RDONLY_STATE) | (1 << NFS_O_WRONLY_STATE) | (1 << NFS_O_RDWR_STATE);
deleg_status = nfs41_check_expired_stateid(state, &stat... | 88,077,586,458,719,300,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,733 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
{
struct rpc_task *task;
int ret = 0;
if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
return 0;
task = _nfs41_proc_sequence(clp, cred);
if (IS_ERR(task))
ret = PTR_ERR(task);
else
rpc_put_task_async(task)... | 49,133,858,038,278,230,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,734 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int nfs41_proc_reclaim_complete(struct nfs_client *clp)
{
struct nfs4_reclaim_complete_data *calldata;
struct rpc_task *task;
struct rpc_message msg = {
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RECLAIM_COMPLETE],
};
struct rpc_task_setup task_setup_data = {
.rpc_client = clp->cl_rpcclient,
.rpc_mess... | 123,295,957,721,396,530,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,735 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
{
struct nfs4_exception exception = { };
int err;
do {
err = _nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
switch (err) {
case 0:
case -NFS4ERR_WRO... | 158,077,019,944,139,160,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,736 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | static int nfs41_reclaim_complete_handle_errors(struct rpc_task *task, struct nfs_client *clp)
{
switch(task->tk_status) {
case 0:
case -NFS4ERR_COMPLETE_ALREADY:
case -NFS4ERR_WRONG_CRED: /* What to do here? */
break;
case -NFS4ERR_DELAY:
rpc_delay(task, NFS4_POLL_RETRY_MAX);
/* fall through */
case -NFS4E... | 311,231,456,566,347,900,000,000,000,000,000,000,000 | nfs4proc.c | 14,944,009,785,801,696,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
22,737 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | nfs41_same_server_scope(struct server_scope *a, struct server_scope *b)
{
if (a->server_scope_sz == b->server_scope_sz &&
memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0)
return true;
return false;
}
| 220,696,042,284,835,000,000,000,000,000,000,000,000 | nfs4proc.c | 10,126,859,884,048,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.