idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
22,738
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_sequence_call_done(struct rpc_task *task, void *data) { struct nfs4_sequence_data *calldata = data; struct nfs_client *clp = calldata->clp; if (!nfs41_sequence_done(task, task->tk_msg.rpc_resp)) return; if (task->tk_status < 0) { dprintk("%s ERROR %d\n", __func__, task->tk_status); if (ato...
311,375,615,371,503,800,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,739
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_sequence_done(struct rpc_task *task, struct nfs4_sequence_res *res) { unsigned long timestamp; struct nfs_client *clp; /* * sr_status remains 1 if an RPC level error occurred. The server * may or may not have processed the sequence operation.. * Proceed as if the server received and processed...
267,041,192,102,091,350,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,740
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_sequence_free_slot(struct nfs4_sequence_res *res) { struct nfs4_slot_table *tbl; tbl = &res->sr_session->fc_slot_table; if (!res->sr_slot) { /* just wake up the next guy waiting since * we may have not consumed a slot after all */ dprintk("%s: No slot\n", __func__); return; } spin_lock...
198,092,813,624,178,460,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,741
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_sequence_handle_errors(struct rpc_task *task, struct nfs_client *clp) { switch(task->tk_status) { case -NFS4ERR_DELAY: rpc_delay(task, NFS4_POLL_RETRY_MAX); return -EAGAIN; default: nfs4_schedule_lease_recovery(clp); } return 0; }
94,080,605,158,118,840,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,742
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_sequence_prepare(struct rpc_task *task, void *data) { struct nfs4_sequence_data *calldata = data; struct nfs_client *clp = calldata->clp; struct nfs4_sequence_args *args; struct nfs4_sequence_res *res; args = task->tk_msg.rpc_argp; res = task->tk_msg.rpc_resp; if (nfs41_setup_sequence(clp->cl...
253,770,855,744,704,460,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,743
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs41_sequence_release(void *data) { struct nfs4_sequence_data *calldata = data; struct nfs_client *clp = calldata->clp; if (atomic_read(&clp->cl_count) > 1) nfs4_schedule_state_renewal(clp); nfs_put_client(clp); kfree(calldata); }
158,248,986,904,295,020,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,744
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs41_setup_sequence(struct nfs4_session *session, struct nfs4_sequence_args *args, struct nfs4_sequence_res *res, struct rpc_task *task) { struct nfs4_slot *slot; struct nfs4_slot_table *tbl; u32 slotid; dprintk("--> %s\n", __func__); /* slot already allocated? */ if (res->sr_slot != NULL) ret...
304,097,285,307,532,800,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,745
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs41_test_stateid(struct nfs_server *server, nfs4_stateid *stateid) { struct nfs4_exception exception = { }; int err; do { err = nfs4_handle_exception(server, _nfs41_test_stateid(server, stateid), &exception); } while (exception.retry); return err; }
93,337,758,987,444,570,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,746
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_add_and_init_slots(struct nfs4_slot_table *tbl, struct nfs4_slot *new, u32 max_slots, u32 ivalue) { struct nfs4_slot *old = NULL; u32 i; spin_lock(&tbl->slot_tbl_lock); if (new) { old = tbl->slots; tbl->slots = new; tbl->max_slots = max_slots; } tbl->highest_used_slotid = -1; /* no s...
159,980,894,923,777,240,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,747
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_createdata *nfs4_alloc_createdata(struct inode *dir, struct qstr *name, struct iattr *sattr, u32 ftype) { struct nfs4_createdata *data; data = kzalloc(sizeof(*data), GFP_KERNEL); if (data != NULL) { struct nfs_server *server = NFS_SERVER(dir); data->msg.rpc_proc = &nfs4_procedures[NFSPROC4...
282,124,382,959,378,300,000,000,000,000,000,000,000
nfs4proc.c
163,538,799,766,705,700,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,748
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl, struct nfs_open_context *ctx, struct nfs4_lock_state *lsp, gfp_t gfp_mask) { struct nfs4_lockdata *p; struct inode *inode = lsp->ls_state->inode; struct nfs_server *server = NFS_SERVER(inode); p = kzalloc(sizeof(*p), gfp_mask); if (p == NU...
325,059,737,040,945,430,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,749
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
struct nfs4_session *nfs4_alloc_session(struct nfs_client *clp) { struct nfs4_session *session; struct nfs4_slot_table *tbl; session = kzalloc(sizeof(struct nfs4_session), GFP_NOFS); if (!session) return NULL; tbl = &session->fc_slot_table; tbl->highest_used_slotid = NFS4_NO_SLOT; spin_lock_init(&tbl->slot_t...
42,875,963,944,005,040,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,750
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_slot *nfs4_alloc_slots(u32 max_slots, gfp_t gfp_flags) { return kcalloc(max_slots, sizeof(struct nfs4_slot), gfp_flags); }
33,345,418,654,231,060,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,751
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl, struct nfs_open_context *ctx, struct nfs4_lock_state *lsp, struct nfs_seqid *seqid) { struct nfs4_unlockdata *p; struct inode *inode = lsp->ls_state->inode; p = kzalloc(sizeof(*p), GFP_NOFS); if (p == NULL) return NULL; p->arg.fh =...
146,797,742,066,034,500,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,752
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server, struct nfs4_state *state) { struct nfs_client *clp = server->nfs_client; if (task->tk_status >= 0) return 0; switch(task->tk_status) { case -NFS4ERR_DELEG_REVOKED: case -NFS4ERR_ADMIN_REVOKED: case -NFS4ERR_BAD_STATEID: if (s...
323,026,064,015,229,000,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,753
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_call_sync_sequence(struct rpc_clnt *clnt, struct nfs_server *server, struct rpc_message *msg, struct nfs4_sequence_args *args, struct nfs4_sequence_res *res, int privileged) { int ret; struct rpc_task *task; struct nfs41_call_sync_data data = { .seq_server = serve...
241,110,640,385,648,300,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,754
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
void nfs4_check_drain_bc_complete(struct nfs4_session *ses) { if (!test_bit(NFS4_SESSION_DRAINING, &ses->session_state) || ses->bc_slot_table.highest_used_slotid != NFS4_NO_SLOT) return; dprintk("%s COMPLETE: Session Back Channel Drained\n", __func__); complete(&ses->bc_slot_table.complete); }
170,378,373,592,458,070,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,755
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_close_clear_stateid_flags(struct nfs4_state *state, fmode_t fmode) { spin_lock(&state->owner->so_lock); if (!(fmode & FMODE_READ)) clear_bit(NFS_O_RDONLY_STATE, &state->flags); if (!(fmode & FMODE_WRITE)) clear_bit(NFS_O_WRONLY_STATE, &state->flags); clear_bit(NFS_O_RDWR_STATE, &state->flags)...
103,694,439,676,482,810,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,756
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_close_context(struct nfs_open_context *ctx, int is_sync) { if (ctx->state == NULL) return; if (is_sync) nfs4_close_sync(ctx->state, ctx->mode); else nfs4_close_state(ctx->state, ctx->mode); }
282,385,471,214,059,870,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,757
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_close_done(struct rpc_task *task, void *data) { struct nfs4_closedata *calldata = data; struct nfs4_state *state = calldata->state; struct nfs_server *server = NFS_SERVER(calldata->inode); dprintk("%s: begin!\n", __func__); if (!nfs4_sequence_done(task, &calldata->res.seq_res)) return; ...
30,019,117,113,535,425,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,758
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_close_prepare(struct rpc_task *task, void *data) { struct nfs4_closedata *calldata = data; struct nfs4_state *state = calldata->state; int call_close = 0; dprintk("%s: begin!\n", __func__); if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0) return; task->tk_msg.rpc_proc = &nfs4_procedu...
25,230,302,263,448,014,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,759
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_commit_done(struct rpc_task *task, struct nfs_write_data *data) { if (!nfs4_sequence_done(task, &data->res.seq_res)) return -EAGAIN; return data->write_done_cb(task, data); }
207,697,623,722,300,800,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,760
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_commit_done_cb(struct rpc_task *task, struct nfs_write_data *data) { struct inode *inode = data->inode; if (nfs4_async_handle_error(task, NFS_SERVER(inode), NULL) == -EAGAIN) { rpc_restart_call_prepare(task); return -EAGAIN; } nfs_refresh_inode(inode, data->res.fattr); return 0; }
227,031,848,695,446,970,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,761
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_construct_boot_verifier(struct nfs_client *clp, nfs4_verifier *bootverf) { __be32 verf[2]; verf[0] = htonl((u32)clp->cl_boot_time.tv_sec); verf[1] = htonl((u32)clp->cl_boot_time.tv_nsec); memcpy(bootverf->data, verf, sizeof(bootverf->data)); }
171,746,913,923,148,880,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,762
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_delay(struct rpc_clnt *clnt, long *timeout) { int res = 0; might_sleep(); if (*timeout <= 0) *timeout = NFS4_POLL_RETRY_MIN; if (*timeout > NFS4_POLL_RETRY_MAX) *timeout = NFS4_POLL_RETRY_MAX; freezable_schedule_timeout_killable(*timeout); if (fatal_signal_pending(current)) res = -ERESTART...
203,601,709,534,690,800,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,763
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata) { struct nfs4_delegreturndata *data = calldata; if (!nfs4_sequence_done(task, &data->res.seq_res)) return; switch (task->tk_status) { case -NFS4ERR_STALE_STATEID: case -NFS4ERR_EXPIRED: case 0: renew_lease(data->res.server, data->times...
195,281,023,377,731,730,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,764
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_delegreturn_prepare(struct rpc_task *task, void *data) { struct nfs4_delegreturndata *d_data; d_data = (struct nfs4_delegreturndata *)data; if (nfs4_setup_sequence(d_data->res.server, &d_data->args.seq_args, &d_data->res.seq_res, task)) return; rpc_call_start(task); }
229,549,985,278,476,100,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,765
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_delegreturn_release(void *calldata) { kfree(calldata); }
283,297,846,159,550,380,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,766
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
void nfs4_destroy_session(struct nfs4_session *session) { struct rpc_xprt *xprt; nfs4_proc_destroy_session(session); rcu_read_lock(); xprt = rcu_dereference(session->clp->cl_rpcclient->cl_xprt); rcu_read_unlock(); dprintk("%s Destroy backchannel for xprt %p\n", __func__, xprt); xprt_destroy_backchannel(xprt,...
34,258,676,580,578,312,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,767
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_destroy_slot_tables(struct nfs4_session *session) { if (session->fc_slot_table.slots != NULL) { kfree(session->fc_slot_table.slots); session->fc_slot_table.slots = NULL; } if (session->bc_slot_table.slots != NULL) { kfree(session->bc_slot_table.slots); session->bc_slot_table.slots = NULL; }...
52,286,573,375,438,160,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,768
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_do_close(struct nfs4_state *state, gfp_t gfp_mask, int wait, bool roc) { struct nfs_server *server = NFS_SERVER(state->inode); struct nfs4_closedata *calldata; struct nfs4_state_owner *sp = state->owner; struct rpc_task *task; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],...
338,412,867,305,869,030,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,769
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_do_create(struct inode *dir, struct dentry *dentry, struct nfs4_createdata *data) { int status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &data->msg, &data->arg.seq_args, &data->res.seq_res, 1); if (status == 0) { update_changeattr(dir, &data->res.dir_cinfo); nfs_post_op_up...
200,865,795,273,907,330,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,770
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo) { struct nfs4_exception exception = { }; int err; do { err = nfs4_handle_exception(server, _nfs4_do_fsinfo(server, fhandle, fsinfo), &exception); } while (exception.retry); return err; }
78,873,343,052,203,160,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,771
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_state *nfs4_do_open(struct inode *dir, struct dentry *dentry, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred) { struct nfs4_exception exception = { }; struct nfs4_state *res; int status; do { status = _nfs4_do_open(dir, dentry, fmode, flags, sattr, cred, &res); if (stat...
184,510,848,464,723,080,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,772
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state) { struct nfs_server *server = NFS_SERVER(state->inode); struct nfs4_exception exception = { }; int err; do { err = _nfs4_open_expired(ctx, state); switch (err) { default: goto out; case -NFS4ERR_GRACE: case -NFS4ER...
312,772,802,203,211,900,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,773
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state) { struct nfs_server *server = NFS_SERVER(state->inode); struct nfs4_exception exception = { }; int err; do { err = _nfs4_do_open_reclaim(ctx, state); if (err != -NFS4ERR_DELAY) break; nfs4_handle_exception(server, err, ...
128,591,285,479,788,630,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,774
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred, struct nfs_fattr *fattr, struct iattr *sattr, struct nfs4_state *state) { struct nfs_server *server = NFS_SERVER(inode); struct nfs4_exception exception = { .state = state, .inode = inode, }; int err; do { err = nfs4_handle_ex...
193,961,413,903,904,570,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,775
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct rpc_task *nfs4_do_unlck(struct file_lock *fl, struct nfs_open_context *ctx, struct nfs4_lock_state *lsp, struct nfs_seqid *seqid) { struct nfs4_unlockdata *data; struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU], .rpc_cred = ctx->cred, }; struct rpc_task_setup task...
121,154,099,281,292,760,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,776
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr) { if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) && !(sattr->ia_valid & ATTR_ATIME_SET)) sattr->ia_valid |= ATTR_ATIME; if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) && !(sattr->ia_va...
219,030,607,768,788,700,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,777
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info) { int i, len, status = 0; rpc_authflavor_t flav_array[NFS_MAX_SECFLAVORS]; len = gss_mech_list_pseudoflavors(&flav_array[0]); flav_array[len] = RPC_AUTH_NULL; len += 1; for (i = 0; i < len; i++) { ...
337,396,573,807,672,940,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,778
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_find_slot(struct nfs4_slot_table *tbl) { u32 slotid; u32 ret_id = NFS4_NO_SLOT; dprintk("--> %s used_slots=%04lx highest_used=%u max_slots=%u\n", __func__, tbl->used_slots[0], tbl->highest_used_slotid, tbl->max_slots); slotid = find_first_zero_bit(tbl->used_slots, tbl->max_slots); if (slotid >= tbl->max_...
40,452,034,668,425,484,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,779
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_free_closedata(void *data) { struct nfs4_closedata *calldata = data; struct nfs4_state_owner *sp = calldata->state->owner; struct super_block *sb = calldata->state->inode->i_sb; if (calldata->roc) pnfs_roc_release(calldata->state->inode); nfs4_put_open_state(calldata->state); nfs_free_seqid(ca...
179,359,955,931,124,330,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,780
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_free_createdata(struct nfs4_createdata *data) { kfree(data); }
219,995,736,166,159,100,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,781
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_free_reclaim_complete_data(void *data) { struct nfs4_reclaim_complete_data *calldata = data; kfree(calldata); }
196,553,629,290,401,400,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,782
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_free_slot(struct nfs4_slot_table *tbl, u32 slotid) { BUG_ON(slotid >= NFS4_MAX_SLOT_TABLE); /* clear used bit in bitmap */ __clear_bit(slotid, tbl->used_slots); /* update highest_used_slotid when it is freed */ if (slotid == tbl->highest_used_slotid) { slotid = find_last_bit(tbl->used_slots, tbl->max_slots...
107,916,881,942,267,020,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,783
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen) { struct nfs4_exception exception = { }; ssize_t ret; do { ret = __nfs4_get_acl_uncached(inode, buf, buflen); if (ret >= 0) break; ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception); } while (exception.retry); ...
306,593,991,873,131,200,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,784
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_get_lease_time_done(struct rpc_task *task, void *calldata) { struct nfs4_get_lease_time_data *data = (struct nfs4_get_lease_time_data *)calldata; dprintk("--> %s\n", __func__); if (!nfs41_sequence_done(task, &data->res->lr_seq_res)) return; switch (task->tk_status) { case -NFS4ERR_DELAY: ca...
210,348,419,359,100,600,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,785
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_get_lease_time_prepare(struct rpc_task *task, void *calldata) { int ret; struct nfs4_get_lease_time_data *data = (struct nfs4_get_lease_time_data *)calldata; dprintk("--> %s\n", __func__); rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED); /* just setup sequence, do not trigger session...
324,116,562,591,803,760,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,786
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_get_referral(struct inode *dir, const struct qstr *name, struct nfs_fattr *fattr, struct nfs_fh *fhandle) { int status = -ENOMEM; struct page *page = NULL; struct nfs4_fs_locations *locations = NULL; page = alloc_page(GFP_KERNEL); if (page == NULL) goto out; locations = kmalloc(sizeof(s...
330,151,341,741,726,440,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,787
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_init_channel_attrs(struct nfs41_create_session_args *args) { struct nfs4_session *session = args->client->cl_session; unsigned int mxrqst_sz = session->fc_attrs.max_rqst_sz, mxresp_sz = session->fc_attrs.max_resp_sz; if (mxrqst_sz == 0) mxrqst_sz = NFS_MAX_FILE_IO_SIZE; if (mxresp_sz == 0...
321,592,451,667,501,700,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,788
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_init_ds_session(struct nfs_client *clp) { struct nfs4_session *session = clp->cl_session; int ret; if (!test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state)) return 0; ret = nfs4_client_recover_expired_lease(clp); if (!ret) /* Test for the DS role */ if (!is_ds_client(clp)) ret = -...
338,319,374,303,269,070,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,789
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_init_opendata_res(struct nfs4_opendata *p) { p->o_res.f_attr = &p->f_attr; p->o_res.dir_attr = &p->dir_attr; p->o_res.seqid = p->o_arg.seqid; p->c_res.seqid = p->c_arg.seqid; p->o_res.server = p->o_arg.server; nfs_fattr_init(&p->f_attr); nfs_fattr_init(&p->dir_attr); nfs_fattr_init_names(&p->f_...
12,641,530,980,025,017,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,790
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_init_session(struct nfs_server *server) { struct nfs_client *clp = server->nfs_client; struct nfs4_session *session; unsigned int rsize, wsize; int ret; if (!nfs4_has_session(clp)) return 0; session = clp->cl_session; if (!test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state)) return 0...
175,873,304,890,452,000,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,791
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_layoutcommit_done(struct rpc_task *task, void *calldata) { struct nfs4_layoutcommit_data *data = calldata; struct nfs_server *server = NFS_SERVER(data->args.inode); if (!nfs4_sequence_done(task, &data->res.seq_res)) return; switch (task->tk_status) { /* Just ignore these failures */ case NFS4ERR_DELEG_REV...
229,133,042,572,152,070,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,792
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_layoutcommit_prepare(struct rpc_task *task, void *calldata) { struct nfs4_layoutcommit_data *data = calldata; struct nfs_server *server = NFS_SERVER(data->args.inode); if (nfs4_setup_sequence(server, &data->args.seq_args, &data->res.seq_res, task)) return; rpc_call_start(task); }
179,901,980,467,873,670,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,793
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_layoutcommit_release(void *calldata) { struct nfs4_layoutcommit_data *data = calldata; struct pnfs_layout_segment *lseg, *tmp; unsigned long *bitlock = &NFS_I(data->args.inode)->flags; pnfs_cleanup_layoutcommit(data); /* Matched by references in pnfs_set_layoutcommit */ list_for_each_entry_safe(...
231,522,452,656,410,360,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,794
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_layoutget_done(struct rpc_task *task, void *calldata) { struct nfs4_layoutget *lgp = calldata; struct nfs_server *server = NFS_SERVER(lgp->args.inode); dprintk("--> %s\n", __func__); if (!nfs4_sequence_done(task, &lgp->res.seq_res)) return; switch (task->tk_status) { case 0: break; case -...
177,898,688,056,021,530,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,795
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_layoutget_prepare(struct rpc_task *task, void *calldata) { struct nfs4_layoutget *lgp = calldata; struct nfs_server *server = NFS_SERVER(lgp->args.inode); dprintk("--> %s\n", __func__); /* Note the is a race here, where a CB_LAYOUTRECALL can come in * right now covering the LAYOUTGET we are about to send. ...
279,909,734,355,765,740,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,796
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_layoutget_release(void *calldata) { struct nfs4_layoutget *lgp = calldata; dprintk("--> %s\n", __func__); put_nfs_open_context(lgp->args.ctx); kfree(calldata); dprintk("<-- %s\n", __func__); }
268,021,996,653,345,020,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,797
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_layoutreturn_done(struct rpc_task *task, void *calldata) { struct nfs4_layoutreturn *lrp = calldata; struct nfs_server *server; struct pnfs_layout_hdr *lo = lrp->args.layout; dprintk("--> %s\n", __func__); if (!nfs4_sequence_done(task, &lrp->res.seq_res)) return; server = NFS_SERVER(lrp->arg...
160,787,998,822,504,260,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,798
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_layoutreturn_prepare(struct rpc_task *task, void *calldata) { struct nfs4_layoutreturn *lrp = calldata; dprintk("--> %s\n", __func__); if (nfs41_setup_sequence(lrp->clp->cl_session, &lrp->args.seq_args, &lrp->res.seq_res, task)) return; rpc_call_start(task); }
44,215,248,593,641,100,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,799
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_layoutreturn_release(void *calldata) { struct nfs4_layoutreturn *lrp = calldata; dprintk("--> %s\n", __func__); put_layout_hdr(lrp->args.layout); kfree(calldata); dprintk("<-- %s\n", __func__); }
8,999,882,524,198,606,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,800
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl) { struct nfs_server *server = NFS_SERVER(state->inode); struct nfs4_exception exception = { }; int err; err = nfs4_set_lock_state(state, fl); if (err != 0) goto out; do { err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW); ...
111,913,987,515,597,820,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,801
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_lock_done(struct rpc_task *task, void *calldata) { struct nfs4_lockdata *data = calldata; dprintk("%s: begin!\n", __func__); if (!nfs4_sequence_done(task, &data->res.seq_res)) return; data->rpc_status = task->tk_status; if (data->arg.new_lock_owner != 0) { if (data->rpc_status == 0) nfs_...
172,188,125,756,983,270,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,802
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request) { struct nfs_server *server = NFS_SERVER(state->inode); struct nfs4_exception exception = { }; int err; err = nfs4_set_lock_state(state, request); if (err != 0) return err; do { if (test_bit(NFS_DELEGATED_STATE, &state->flags) ...
114,964,985,747,562,560,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,803
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_lock_prepare(struct rpc_task *task, void *calldata) { struct nfs4_lockdata *data = calldata; struct nfs4_state *state = data->lsp->ls_state; dprintk("%s: begin!\n", __func__); if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0) return; /* Do we need to do an open_to_lock_owner? */ if (!...
327,405,963,737,030,230,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,804
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request) { struct nfs_server *server = NFS_SERVER(state->inode); struct nfs4_exception exception = { }; int err; do { /* Cache the lock if possible... */ if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0) return 0; err = _nfs4_do...
209,519,408,966,323,000,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,805
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_lock_release(void *calldata) { struct nfs4_lockdata *data = calldata; dprintk("%s: begin!\n", __func__); nfs_free_seqid(data->arg.open_seqid); if (data->cancelled != 0) { struct rpc_task *task; task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp, data->arg.lock_seqid); if (!IS_ERR(task)...
156,710,692,235,312,870,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,806
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_locku_done(struct rpc_task *task, void *data) { struct nfs4_unlockdata *calldata = data; if (!nfs4_sequence_done(task, &calldata->res.seq_res)) return; switch (task->tk_status) { case 0: nfs4_stateid_copy(&calldata->lsp->ls_stateid, &calldata->res.stateid); renew_lease(calldata->serv...
7,773,125,063,091,524,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,807
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_locku_prepare(struct rpc_task *task, void *data) { struct nfs4_unlockdata *calldata = data; if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0) return; if ((calldata->lsp->ls_flags & NFS_LOCK_INITIALIZED) == 0) { /* Note: exit _without_ running nfs4_locku_done */ task->tk_action = NULL;...
85,620,152,433,752,090,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,808
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info) { struct nfs4_exception exception = { }; int err; do { err = _nfs4_lookup_root(server, fhandle, info); switch (err) { case 0: case -NFS4ERR_WRONGSEC: break; default: err = nfs4_handle_exception(s...
132,527,597,117,377,650,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,809
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_lookup_root_sec(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info, rpc_authflavor_t flavor) { struct rpc_auth *auth; int ret; auth = rpcauth_create(flavor, server->client); if (!auth) { ret = -EIO; goto out; } ret = nfs4_lookup_root(server, fhandle, info); out: r...
127,484,538,302,881,390,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,810
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static bool nfs4_match_stateid(const nfs4_stateid *s1, const nfs4_stateid *s2) { return nfs4_stateid_match(s1, s2); }
64,489,157,877,646,680,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,811
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata) { struct nfs4_opendata *data = calldata; data->rpc_status = task->tk_status; if (data->rpc_status == 0) { nfs4_stateid_copy(&data->o_res.stateid, &data->c_res.stateid); nfs_confirm_seqid(&data->owner->so_seqid, 0); renew_lease(data->o_r...
166,853,728,171,387,430,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,812
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_open_confirm_release(void *calldata) { struct nfs4_opendata *data = calldata; struct nfs4_state *state = NULL; /* If this request hasn't been cancelled, do nothing */ if (data->cancelled == 0) goto out_free; /* In case of error, no cleanup! */ if (!data->rpc_done) goto out_free; state = nfs...
327,996,436,463,938,300,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,813
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid) { struct nfs4_exception exception = { }; struct nfs_server *server = NFS_SERVER(state->inode); int err; do { err = _nfs4_open_delegation_recall(ctx, state, stateid); switch (err) { case 0: ...
225,547,269,952,078,520,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,814
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_open_done(struct rpc_task *task, void *calldata) { struct nfs4_opendata *data = calldata; data->rpc_status = task->tk_status; if (!nfs4_sequence_done(task, &data->o_res.seq_res)) return; if (task->tk_status == 0) { switch (data->o_res.f_attr->mode & S_IFMT) { case S_IFREG: break; c...
321,910,082,445,130,580,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,815
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state) { struct nfs_open_context *ctx; int ret; ctx = nfs4_state_find_open_context(state); if (IS_ERR(ctx)) return PTR_ERR(ctx); ret = nfs4_do_open_expired(ctx, state); put_nfs_open_context(ctx); return ret; }
78,551,286,628,343,330,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,816
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_open_prepare(struct rpc_task *task, void *calldata) { struct nfs4_opendata *data = calldata; struct nfs4_state_owner *sp = data->owner; if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0) return; /* * Check if we still need to send an OPEN call, or if we can use * a delegation instead. ...
269,564,339,896,717,170,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,817
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, fmode_t fmode, struct nfs4_state **res) { struct nfs4_state *newstate; int ret; opendata->o_arg.open_flags = 0; opendata->o_arg.fmode = fmode; memset(&opendata->o_res, 0, sizeof(opendata->o_res)); memset(&opendata->c_res, 0, sizeof(opendata->c_r...
67,959,740,745,873,910,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,818
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_opendata *nfs4_open_recoverdata_alloc(struct nfs_open_context *ctx, struct nfs4_state *state) { struct nfs4_opendata *opendata; opendata = nfs4_opendata_alloc(ctx->dentry, state->owner, 0, 0, NULL, GFP_NOFS); if (opendata == NULL) return ERR_PTR(-ENOMEM); opendata->state = state; atomic_inc(&...
101,072,406,869,457,830,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,819
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_opendata *nfs4_opendata_alloc(struct dentry *dentry, struct nfs4_state_owner *sp, fmode_t fmode, int flags, const struct iattr *attrs, gfp_t gfp_mask) { struct dentry *parent = dget_parent(dentry); struct inode *dir = parent->d_inode; struct nfs_server *server = NFS_SERVER(dir); struct nfs4...
124,474,432,014,589,220,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,820
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_opendata_free(struct kref *kref) { struct nfs4_opendata *p = container_of(kref, struct nfs4_opendata, kref); struct super_block *sb = p->dentry->d_sb; nfs_free_seqid(p->o_arg.seqid); if (p->state != NULL) nfs4_put_open_state(p->state); nfs4_put_state_owner(p->owner); dput(p->dir); dput(p->...
209,129,734,005,680,680,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,821
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_opendata_put(struct nfs4_opendata *p) { if (p != NULL) kref_put(&p->kref, nfs4_opendata_free); }
6,555,272,810,585,816,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,822
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static struct nfs4_state *nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data) { struct inode *inode; struct nfs4_state *state = NULL; struct nfs_delegation *delegation; int ret; if (!data->rpc_done) { state = nfs4_try_open_cached(data); goto out; } ret = -EAGAIN; if (!(data->f_attr.valid & NFS_ATTR_FA...
233,355,414,385,534,950,000,000,000,000,000,000,000
nfs4proc.c
152,084,679,731,241,390,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,823
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry) { struct nfs4_exception exception = { }; int err; do { err = nfs4_handle_exception(NFS_SERVER(inode), _nfs4_proc_access(inode, entry), &exception); } while (exception.retry); return err; }
295,549,636,089,213,340,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,824
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags) { struct rpc_message msg = { .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW], .rpc_argp = clp, .rpc_cred = cred, }; struct nfs4_renewdata *data; if (renew_flags == 0) return 0; if (!atomic_inc_not_zero(...
280,677,180,572,187,120,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,825
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static void nfs4_proc_commit_setup(struct nfs_write_data *data, struct rpc_message *msg) { struct nfs_server *server = NFS_SERVER(data->inode); if (data->lseg) { data->args.bitmask = NULL; data->res.fattr = NULL; } else data->args.bitmask = server->cache_consistency_bitmask; if (!data->write_done_cb) data-...
44,890,107,399,567,255,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,826
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr, int flags, struct nfs_open_context *ctx) { struct dentry *de = dentry; struct nfs4_state *state; struct rpc_cred *cred = NULL; fmode_t fmode = 0; int status = 0; if (ctx != NULL) { cred = ctx->cred; de = ctx->den...
203,614,645,762,338,620,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,827
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_proc_create_session(struct nfs_client *clp) { int status; unsigned *ptr; struct nfs4_session *session = clp->cl_session; dprintk("--> %s clp=%p session=%p\n", __func__, clp, session); status = _nfs4_proc_create_session(clp); if (status) goto out; /* Init or reset the session slot tables */ status ...
240,351,830,793,228,650,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,828
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync) { struct nfs_server *server = NFS_SERVER(inode); struct nfs4_exception exception = { }; int err; do { err = _nfs4_proc_delegreturn(inode, cred, stateid, issync); switch (err) { case -NFS4ERR_STALE_S...
165,388,910,773,347,940,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,829
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_proc_destroy_session(struct nfs4_session *session) { int status = 0; struct rpc_message msg; dprintk("--> nfs4_proc_destroy_session\n"); /* session is still being setup */ if (session->clp->cl_cons_state != NFS_CS_READY) return status; msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_SESSION]; ...
285,452,855,813,430,470,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,830
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_proc_fs_locations(struct inode *dir, const struct qstr *name, struct nfs4_fs_locations *fs_locations, struct page *page) { struct nfs_server *server = NFS_SERVER(dir); u32 bitmask[2] = { [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS, }; struct nfs4_fs_locations_arg args = { .dir_fh = NFS_FH(dir...
7,819,345,395,257,022,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,831
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo) { nfs_fattr_init(fsinfo->fattr); return nfs4_do_fsinfo(server, fhandle, fsinfo); }
41,018,541,191,949,000,000,000,000,000,000,000,000
nfs4proc.c
163,538,799,766,705,700,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,832
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen) { struct nfs_server *server = NFS_SERVER(inode); int ret; if (!nfs4_server_supports_acls(server)) return -EOPNOTSUPP; ret = nfs_revalidate_inode(server, inode); if (ret < 0) return ret; if (NFS_I(inode)->cache_validity & NFS_INO_...
293,974,442,963,878,300,000,000,000,000,000,000,000
nfs4proc.c
206,563,598,646,579,670,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,833
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_proc_get_lease_time(struct nfs_client *clp, struct nfs_fsinfo *fsinfo) { struct rpc_task *task; struct nfs4_get_lease_time_args args; struct nfs4_get_lease_time_res res = { .lr_fsinfo = fsinfo, }; struct nfs4_get_lease_time_data data = { .args = &args, .res = &res, .clp = clp, }; struct rpc_mess...
167,926,264,626,166,730,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,834
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *info) { int minor_version = server->nfs_client->cl_minorversion; int status = nfs4_lookup_root(server, fhandle, info); if ((status == -NFS4ERR_WRONGSEC) && !(server->flags & NFS_MOUNT_SECFLAVOUR)) /* * A...
181,400,592,191,674,540,000,000,000,000,000,000,000
nfs4proc.c
10,126,859,884,048,500,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,835
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr) { struct nfs4_exception exception = { }; int err; do { err = nfs4_handle_exception(server, _nfs4_proc_getattr(server, fhandle, fattr), &exception); } while (exception.retry); return err; }
47,519,477,161,220,920,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,836
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
int nfs4_proc_getdevicelist(struct nfs_server *server, const struct nfs_fh *fh, struct pnfs_devicelist *devlist) { struct nfs4_exception exception = { }; int err; do { err = nfs4_handle_exception(server, _nfs4_getdevicelist(server, fh, devlist), &exception); } while (exception.retry); dpr...
228,987,572,488,788,400,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375
22,837
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request) { struct nfs4_exception exception = { }; int err; do { err = nfs4_handle_exception(NFS_SERVER(state->inode), _nfs4_proc_getlk(state, cmd, request), &exception); } while (exception.retry); return err; }
62,492,701,559,542,880,000,000,000,000,000,000,000
nfs4proc.c
14,944,009,785,801,696,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
https://nvd.nist.gov/vuln/detail/CVE-2012-2375