idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
23,313 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static loff_t ext4_max_bitmap_size(int bits, int has_huge_files)
{
loff_t res = EXT4_NDIR_BLOCKS;
int meta_blocks;
loff_t upper_limit;
/* This is calculated to be the largest file size for a dense, block
* mapped file such that the file's total number of 512-byte sectors,
* including data and all indirect block... | 15,839,139,010,445,950,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,314 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static struct dentry *ext4_mount(struct file_system_type *fs_type, int flags,
const char *dev_name, void *data)
{
return mount_bdev(fs_type, flags, dev_name, data, ext4_fill_super);
}
| 154,924,739,739,761,940,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,315 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | void ext4_msg(struct super_block *sb, const char *prefix, const char *fmt, ...)
{
struct va_format vaf;
va_list args;
va_start(args, fmt);
vaf.fmt = fmt;
vaf.va = &args;
printk("%sEXT4-fs (%s): %pV\n", prefix, sb->s_id, &vaf);
va_end(args);
}
| 12,005,075,718,224,130,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,316 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static struct inode *ext4_nfs_get_inode(struct super_block *sb,
u64 ino, u32 generation)
{
struct inode *inode;
if (ino < EXT4_FIRST_INO(sb) && ino != EXT4_ROOT_INO)
return ERR_PTR(-ESTALE);
if (ino > le32_to_cpu(EXT4_SB(sb)->s_es->s_inodes_count))
return ERR_PTR(-ESTALE);
/* iget isn't really right if t... | 239,845,694,133,380,060,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,317 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_orphan_cleanup(struct super_block *sb,
struct ext4_super_block *es)
{
unsigned int s_flags = sb->s_flags;
int nr_orphans = 0, nr_truncates = 0;
#ifdef CONFIG_QUOTA
int i;
#endif
if (!es->s_last_orphan) {
jbd_debug(4, "no orphan inodes to clean up\n");
return;
}
if (bdev_read_only(sb->s_b... | 195,158,824,247,191,100,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,318 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_put_nojournal(handle_t *handle)
{
unsigned long ref_cnt = (unsigned long)handle;
BUG_ON(ref_cnt == 0);
ref_cnt--;
handle = (handle_t *)ref_cnt;
current->journal_info = handle;
}
| 268,465,965,898,064,800,000,000,000,000,000,000,000 | ext4_jbd2.c | 96,099,892,552,996,080,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,319 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_put_super(struct super_block *sb)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_super_block *es = sbi->s_es;
int i, err;
ext4_unregister_li_request(sb);
dquot_disable(sb, -1, DQUOT_USAGE_ENABLED | DQUOT_LIMITS_ENABLED);
flush_workqueue(sbi->dio_unwritten_wq);
destroy_workqueue(sbi->dio... | 219,390,841,350,577,100,000,000,000,000,000,000,000 | super.c | 263,073,866,316,452,960,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,320 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_quota_off(struct super_block *sb, int type)
{
struct inode *inode = sb_dqopt(sb)->files[type];
handle_t *handle;
/* Force all delayed allocation blocks to be allocated.
* Caller already holds s_umount sem */
if (test_opt(sb, DELALLOC))
sync_filesystem(sb);
if (!inode)
goto out;
/* Update ... | 134,598,214,264,929,740,000,000,000,000,000,000,000 | super.c | 153,991,305,486,688,540,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,321 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_quota_on(struct super_block *sb, int type, int format_id,
struct path *path)
{
int err;
if (!test_opt(sb, QUOTA))
return -EINVAL;
/* Quotafile not on the same filesystem? */
if (path->mnt->mnt_sb != sb)
return -EXDEV;
/* Journaling quota? */
if (EXT4_SB(sb)->s_qf_names[type]) {
/* Quot... | 46,319,308,156,556,000,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,322 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_quota_on_mount(struct super_block *sb, int type)
{
return dquot_quota_on_mount(sb, EXT4_SB(sb)->s_qf_names[type],
EXT4_SB(sb)->s_jquota_fmt, type);
}
| 180,735,366,481,320,200,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,323 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ssize_t ext4_quota_read(struct super_block *sb, int type, char *data,
size_t len, loff_t off)
{
struct inode *inode = sb_dqopt(sb)->files[type];
ext4_lblk_t blk = off >> EXT4_BLOCK_SIZE_BITS(sb);
int err = 0;
int offset = off & (sb->s_blocksize - 1);
int tocopy;
size_t toread;
struct buffer_head... | 62,247,126,085,695,050,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,324 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ssize_t ext4_quota_write(struct super_block *sb, int type,
const char *data, size_t len, loff_t off)
{
struct inode *inode = sb_dqopt(sb)->files[type];
ext4_lblk_t blk = off >> EXT4_BLOCK_SIZE_BITS(sb);
int err = 0;
int offset = off & (sb->s_blocksize - 1);
struct buffer_head *bh;
handle_t *handle = jo... | 325,883,843,163,850,230,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,325 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_register_li_request(struct super_block *sb,
ext4_group_t first_not_zeroed)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_li_request *elr;
ext4_group_t ngroups = EXT4_SB(sb)->s_groups_count;
int ret = 0;
if (sbi->s_li_request != NULL) {
/*
* Reset timeout so it can be computed ... | 188,613,697,341,043,600,000,000,000,000,000,000,000 | super.c | 153,991,305,486,688,540,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,326 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_release_dquot(struct dquot *dquot)
{
int ret, err;
handle_t *handle;
handle = ext4_journal_start(dquot_to_inode(dquot),
EXT4_QUOTA_DEL_BLOCKS(dquot->dq_sb));
if (IS_ERR(handle)) {
/* Release dquot anyway to avoid endless cycle in dqput() */
dquot_release(dquot);
return PTR_ERR(handle)... | 42,314,432,165,523,780,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,327 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_remount(struct super_block *sb, int *flags, char *data)
{
struct ext4_super_block *es;
struct ext4_sb_info *sbi = EXT4_SB(sb);
ext4_fsblk_t n_blocks_count = 0;
unsigned long old_sb_flags;
struct ext4_mount_options old_opts;
int enable_quota = 0;
ext4_group_t g;
unsigned int journal_ioprio = DEFA... | 164,229,902,789,071,570,000,000,000,000,000,000,000 | super.c | 263,073,866,316,452,960,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,328 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_remove_li_request(struct ext4_li_request *elr)
{
struct ext4_sb_info *sbi;
if (!elr)
return;
sbi = elr->lr_sbi;
list_del(&elr->lr_request);
sbi->s_li_request = NULL;
kfree(elr);
}
| 143,022,388,270,821,280,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,329 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_run_lazyinit_thread(void)
{
ext4_lazyinit_task = kthread_run(ext4_lazyinit_thread,
ext4_li_info, "ext4lazyinit");
if (IS_ERR(ext4_lazyinit_task)) {
int err = PTR_ERR(ext4_lazyinit_task);
ext4_clear_request_list();
kfree(ext4_li_info);
ext4_li_info = NULL;
printk(KERN_CRIT "EXT4: error ... | 246,169,454,082,878,630,000,000,000,000,000,000,000 | super.c | 263,073,866,316,452,960,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,330 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_run_li_request(struct ext4_li_request *elr)
{
struct ext4_group_desc *gdp = NULL;
ext4_group_t group, ngroups;
struct super_block *sb;
unsigned long timeout = 0;
int ret = 0;
sb = elr->lr_super;
ngroups = EXT4_SB(sb)->s_groups_count;
for (group = elr->lr_next_group; group < ngroups; group++) {... | 61,882,749,431,549,810,000,000,000,000,000,000,000 | super.c | 153,991,305,486,688,540,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,331 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_sb_release(struct kobject *kobj)
{
struct ext4_sb_info *sbi = container_of(kobj, struct ext4_sb_info,
s_kobj);
complete(&sbi->s_kobj_unregister);
}
| 3,867,730,162,861,905,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,332 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_setup_super(struct super_block *sb, struct ext4_super_block *es,
int read_only)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
int res = 0;
if (le32_to_cpu(es->s_rev_level) > EXT4_MAX_SUPP_REV) {
ext4_msg(sb, KERN_ERR, "revision level too high, "
"forcing read-only mode");
res = MS_RDONLY;... | 334,573,384,841,188,500,000,000,000,000,000,000,000 | super.c | 153,991,305,486,688,540,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,333 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_show_options(struct seq_file *seq, struct vfsmount *vfs)
{
int def_errors;
unsigned long def_mount_opts;
struct super_block *sb = vfs->mnt_sb;
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_super_block *es = sbi->s_es;
def_mount_opts = le32_to_cpu(es->s_default_mount_opts);
def_errors =... | 25,051,162,863,419,055,000,000,000,000,000,000,000 | super.c | 263,073,866,316,452,960,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,334 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void ext4_show_quota_options(struct seq_file *seq,
struct super_block *sb)
{
#if defined(CONFIG_QUOTA)
struct ext4_sb_info *sbi = EXT4_SB(sb);
if (sbi->s_jquota_fmt) {
char *fmtname = "";
switch (sbi->s_jquota_fmt) {
case QFMT_VFS_OLD:
fmtname = "vfsold";
break;
case QFMT_VFS_V0:... | 212,879,199,935,281,300,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,335 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_statfs(struct dentry *dentry, struct kstatfs *buf)
{
struct super_block *sb = dentry->d_sb;
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_super_block *es = sbi->s_es;
struct ext4_group_desc *gdp;
u64 fsid;
s64 bfree;
if (test_opt(sb, MINIX_DF)) {
sbi->s_overhead_last = 0;
} else if (es-... | 59,870,624,627,972,640,000,000,000,000,000,000,000 | super.c | 151,364,333,106,312,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,336 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_sync_fs(struct super_block *sb, int wait)
{
int ret = 0;
tid_t target;
struct ext4_sb_info *sbi = EXT4_SB(sb);
trace_ext4_sync_fs(sb, wait);
flush_workqueue(sbi->dio_unwritten_wq);
if (jbd2_journal_start_commit(sbi->s_journal, &target)) {
if (wait)
jbd2_log_wait_commit(sbi->s_journal, target... | 292,999,937,267,474,020,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,337 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_unfreeze(struct super_block *sb)
{
if (sb->s_flags & MS_RDONLY)
return 0;
lock_super(sb);
/* Reset the needs_recovery flag before the fs is unlocked. */
EXT4_SET_INCOMPAT_FEATURE(sb, EXT4_FEATURE_INCOMPAT_RECOVER);
ext4_commit_super(sb, 1);
unlock_super(sb);
return 0;
}
| 318,037,145,000,791,200,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,338 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_unregister_li_request(struct super_block *sb)
{
mutex_lock(&ext4_li_mtx);
if (!ext4_li_info) {
mutex_unlock(&ext4_li_mtx);
return;
}
mutex_lock(&ext4_li_info->li_list_mtx);
ext4_remove_li_request(EXT4_SB(sb)->s_li_request);
mutex_unlock(&ext4_li_info->li_list_mtx);
mutex_unlock(&ext4_li_mtx... | 280,335,253,447,032,450,000,000,000,000,000,000,000 | super.c | 301,372,642,199,140,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,339 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | void ext4_update_dynamic_rev(struct super_block *sb)
{
struct ext4_super_block *es = EXT4_SB(sb)->s_es;
if (le32_to_cpu(es->s_rev_level) > EXT4_GOOD_OLD_REV)
return;
ext4_warning(sb,
"updating to rev %d because of new feature flag, "
"running e2fsck is recommended",
EXT4_DYNAMIC_REV);
es->... | 17,404,283,803,425,879,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,340 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | __u32 ext4_used_dirs_count(struct super_block *sb,
struct ext4_group_desc *bg)
{
return le16_to_cpu(bg->bg_used_dirs_count_lo) |
(EXT4_DESC_SIZE(sb) >= EXT4_MIN_DESC_SIZE_64BIT ?
(__u32)le16_to_cpu(bg->bg_used_dirs_count_hi) << 16 : 0);
}
| 167,784,855,789,803,320,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,341 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int ext4_write_info(struct super_block *sb, int type)
{
int ret, err;
handle_t *handle;
/* Data block + inode block */
handle = ext4_journal_start(sb->s_root->d_inode, 2);
if (IS_ERR(handle))
return PTR_ERR(handle);
ret = dquot_commit_info(sb, type);
err = ext4_journal_stop(handle);
if (!ret)
ret = ... | 45,368,737,701,676,930,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,342 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void ext4_write_super(struct super_block *sb)
{
lock_super(sb);
ext4_commit_super(sb, 1);
unlock_super(sb);
}
| 314,750,650,669,887,370,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,343 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ext4_fsblk_t get_sb_block(void **data)
{
ext4_fsblk_t sb_block;
char *options = (char *) *data;
if (!options || strncmp(options, "sb=", 3) != 0)
return 1; /* Default location */
options += 3;
/* TODO: use simple_strtoll with >32bit ext4 */
sb_block = simple_strtoul(options, &options, 0);
if (*options... | 36,873,312,454,435,600,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,344 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int init_inodecache(void)
{
ext4_inode_cachep = kmem_cache_create("ext4_inode_cache",
sizeof(struct ext4_inode_info),
0, (SLAB_RECLAIM_ACCOUNT|
SLAB_MEM_SPREAD),
init_once);
if (ext4_inode_cachep == NULL)
return -ENOMEM;
return 0;
}
| 323,843,000,007,379,640,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,345 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void init_once(void *foo)
{
struct ext4_inode_info *ei = (struct ext4_inode_info *) foo;
INIT_LIST_HEAD(&ei->i_orphan);
#ifdef CONFIG_EXT4_FS_XATTR
init_rwsem(&ei->xattr_sem);
#endif
init_rwsem(&ei->i_data_sem);
inode_init_once(&ei->vfs_inode);
}
| 257,385,009,676,345,480,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,346 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ssize_t inode_readahead_blks_store(struct ext4_attr *a,
struct ext4_sb_info *sbi,
const char *buf, size_t count)
{
unsigned long t;
if (parse_strtoul(buf, 0x40000000, &t))
return -EINVAL;
if (t && !is_power_of_2(t))
return -EINVAL;
sbi->s_inode_readahead_blks = t;
return count;
}
| 180,395,226,458,842,930,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,347 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ssize_t lifetime_write_kbytes_show(struct ext4_attr *a,
struct ext4_sb_info *sbi, char *buf)
{
struct super_block *sb = sbi->s_buddy_cache->i_sb;
if (!sb->s_bdev->bd_part)
return snprintf(buf, PAGE_SIZE, "0\n");
return snprintf(buf, PAGE_SIZE, "%llu\n",
(unsigned long long)(sbi->s_kbytes_written ... | 278,889,743,751,980,300,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,348 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int parse_options(char *options, struct super_block *sb,
unsigned long *journal_devnum,
unsigned int *journal_ioprio,
ext4_fsblk_t *n_blocks_count, int is_remount)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
char *p;
substring_t args[MAX_OPT_ARGS];
int data_opt = 0;
int option;
#ifdef CONFIG_QUOTA... | 165,491,659,975,996,370,000,000,000,000,000,000,000 | super.c | 263,073,866,316,452,960,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,349 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int parse_strtoul(const char *buf,
unsigned long max, unsigned long *value)
{
char *endp;
*value = simple_strtoul(skip_spaces(buf), &endp, 0);
endp = skip_spaces(endp);
if (*endp || *value > max)
return -EINVAL;
return 0;
}
| 313,457,817,020,359,170,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,350 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void print_daily_error_info(unsigned long arg)
{
struct super_block *sb = (struct super_block *) arg;
struct ext4_sb_info *sbi;
struct ext4_super_block *es;
sbi = EXT4_SB(sb);
es = sbi->s_es;
if (es->s_error_count)
ext4_msg(sb, KERN_NOTICE, "error count: %u",
le32_to_cpu(es->s_error_count));
if (e... | 284,770,843,403,512,900,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,351 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void register_as_ext2(void)
{
int err = register_filesystem(&ext2_fs_type);
if (err)
printk(KERN_WARNING
"EXT4-fs: Unable to register as ext2 (%d)\n", err);
}
| 329,914,094,621,922,450,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,352 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void register_as_ext2(void) { }
| 60,270,300,603,727,150,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,353 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void register_as_ext3(void)
{
int err = register_filesystem(&ext3_fs_type);
if (err)
printk(KERN_WARNING
"EXT4-fs: Unable to register as ext3 (%d)\n", err);
}
| 259,978,813,351,265,860,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,354 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void register_as_ext3(void) { }
| 215,130,535,384,890,780,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,355 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static void save_error_info(struct super_block *sb, const char *func,
unsigned int line)
{
__save_error_info(sb, func, line);
ext4_commit_super(sb, 1);
}
| 333,183,483,455,530,200,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,356 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ssize_t sbi_ui_store(struct ext4_attr *a,
struct ext4_sb_info *sbi,
const char *buf, size_t count)
{
unsigned int *ui = (unsigned int *) (((char *) sbi) + a->offset);
unsigned long t;
if (parse_strtoul(buf, 0xffffffff, &t))
return -EINVAL;
*ui = t;
return count;
}
| 43,756,770,670,482,470,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,357 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static ssize_t session_write_kbytes_show(struct ext4_attr *a,
struct ext4_sb_info *sbi, char *buf)
{
struct super_block *sb = sbi->s_buddy_cache->i_sb;
if (!sb->s_bdev->bd_part)
return snprintf(buf, PAGE_SIZE, "0\n");
return snprintf(buf, PAGE_SIZE, "%lu\n",
(part_stat_read(sb->s_bdev->bd_part, sectors[1... | 129,325,951,362,317,100,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,358 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static int set_qf_name(struct super_block *sb, int qtype, substring_t *args)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
char *qname;
if (sb_any_quota_loaded(sb) &&
!sbi->s_qf_names[qtype]) {
ext4_msg(sb, KERN_ERR,
"Cannot change journaled "
"quota options when quota turned on");
return 0;
}
qname = mat... | 20,958,658,575,873,530,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,359 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void unregister_as_ext2(void)
{
unregister_filesystem(&ext2_fs_type);
}
| 115,325,843,518,672,110,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,360 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void unregister_as_ext3(void)
{
unregister_filesystem(&ext3_fs_type);
}
| 195,400,525,461,663,560,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,361 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 0 | static inline void unregister_as_ext3(void) { }
| 309,154,081,903,336,400,000,000,000,000,000,000,000 | super.c | 44,415,732,563,068,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
23,680 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static u32 __xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr)
{
u32 spi;
struct xfrm6_tunnel_spi *x6spi;
struct hlist_node *pos;
unsigned index;
if (xfrm6_tunnel_spi < XFRM6_TUNNEL_SPI_MIN ||
xfrm6_tunnel_spi >= XFRM6_TUNNEL_SPI_MAX)
xfrm6_tunnel_spi = XFRM6_TUNNEL_SPI_MIN;
else
xfrm6_tunnel_spi++;
for (... | 28,271,588,334,850,130,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,681 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static struct xfrm6_tunnel_spi *__xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr)
{
struct xfrm6_tunnel_spi *x6spi;
struct hlist_node *pos;
hlist_for_each_entry(x6spi, pos,
&xfrm6_tunnel_spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)],
list_byaddr) {
if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->ad... | 157,147,859,745,525,780,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,682 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | __be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr)
{
struct xfrm6_tunnel_spi *x6spi;
u32 spi;
write_lock_bh(&xfrm6_tunnel_spi_lock);
x6spi = __xfrm6_tunnel_spi_lookup(saddr);
if (x6spi) {
atomic_inc(&x6spi->refcnt);
spi = x6spi->spi;
} else
spi = __xfrm6_tunnel_alloc_spi(saddr);
write_unlock_bh(&xfrm6_t... | 290,756,282,289,726,650,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,683 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static void xfrm6_tunnel_destroy(struct xfrm_state *x)
{
xfrm6_tunnel_free_spi((xfrm_address_t *)&x->props.saddr);
}
| 38,365,017,609,754,553,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,684 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static void __exit xfrm6_tunnel_fini(void)
{
xfrm6_tunnel_spi_fini();
xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET);
xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6);
xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6);
}
| 94,445,122,977,237,100,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,685 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | void xfrm6_tunnel_free_spi(xfrm_address_t *saddr)
{
struct xfrm6_tunnel_spi *x6spi;
struct hlist_node *pos, *n;
write_lock_bh(&xfrm6_tunnel_spi_lock);
hlist_for_each_entry_safe(x6spi, pos, n,
&xfrm6_tunnel_spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)],
list_byaddr)
{
if (memcmp(&x6spi->addr, sadd... | 144,094,655,762,754,510,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,686 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int __init xfrm6_tunnel_init(void)
{
if (xfrm_register_type(&xfrm6_tunnel_type, AF_INET6) < 0)
return -EAGAIN;
if (xfrm6_tunnel_register(&xfrm6_tunnel_handler, AF_INET6)) {
xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6);
return -EAGAIN;
}
if (xfrm6_tunnel_register(&xfrm46_tunnel_handler, AF_INET))... | 185,543,229,844,029,130,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,687 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int xfrm6_tunnel_init_state(struct xfrm_state *x)
{
if (x->props.mode != XFRM_MODE_TUNNEL)
return -EINVAL;
if (x->encap)
return -EINVAL;
x->props.header_len = sizeof(struct ipv6hdr);
return 0;
}
| 288,528,453,830,928,170,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 275,926,104,048,556,340,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,688 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb)
{
return 0;
}
| 175,975,197,416,397,050,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,689 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int xfrm6_tunnel_output(struct xfrm_state *x, struct sk_buff *skb)
{
struct ipv6hdr *top_iph;
top_iph = (struct ipv6hdr *)skb->data;
top_iph->payload_len = htons(skb->len - sizeof(struct ipv6hdr));
return 0;
}
| 186,153,521,840,583,300,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,690 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static void xfrm6_tunnel_spi_fini(void)
{
int i;
for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++) {
if (!hlist_empty(&xfrm6_tunnel_spi_byaddr[i]))
return;
}
for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++) {
if (!hlist_empty(&xfrm6_tunnel_spi_byspi[i]))
return;
}
kmem_cache_destroy(xfrm6_tunnel_sp... | 302,666,047,197,948,950,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,691 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static inline unsigned xfrm6_tunnel_spi_hash_byspi(u32 spi)
{
return spi % XFRM6_TUNNEL_SPI_BYSPI_HSIZE;
}
| 319,097,683,666,015,550,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,692 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int xfrm6_tunnel_spi_init(void)
{
int i;
xfrm6_tunnel_spi = 0;
xfrm6_tunnel_spi_kmem = kmem_cache_create("xfrm6_tunnel_spi",
sizeof(struct xfrm6_tunnel_spi),
0, SLAB_HWCACHE_ALIGN,
NULL, NULL);
if (!xfrm6_tunnel_spi_kmem)
return -ENOMEM;
for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HS... | 22,344,872,688,581,340,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 227,152,596,054,811,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
23,706 | file | 1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b | https://github.com/file/file | https://github.com/glensc/file/commit/1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b | Fix bounds checks again. | 0 | cdf_read_short_stream(const cdf_info_t *info, const cdf_header_t *h,
const cdf_sat_t *sat, const cdf_dir_t *dir, cdf_stream_t *scn)
{
size_t i;
const cdf_directory_t *d;
for (i = 0; i < dir->dir_len; i++)
if (dir->dir_tab[i].d_type == CDF_DIR_TYPE_ROOT_STORAGE)
break;
/* If the it is not there, just fake... | 46,130,757,236,059,650,000,000,000,000,000,000,000 | cdf.c | 252,409,831,567,122,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-1571 | file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2012-1571 |
24,141 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | static void __mem_cgroup_commit_charge(struct mem_cgroup *memcg,
struct page *page,
unsigned int nr_pages,
struct page_cgroup *pc,
enum charge_type ctype)
{
lock_page_cgroup(pc);
if (unlikely(PageCgroupUsed(pc))) {
unlock_page_cgroup(pc);
__mem_cgroup_cancel_charge(memc... | 259,617,442,535,560,000,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,142 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | __mem_cgroup_commit_charge_lrucare(struct page *page, struct mem_cgroup *memcg,
enum charge_type ctype)
{
struct page_cgroup *pc = lookup_page_cgroup(page);
struct zone *zone = page_zone(page);
unsigned long flags;
bool removed = false;
/*
* In some case, SwapCache, FUSE(splice_buf->radixtree), the page
... | 202,295,957,371,363,500,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,143 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | __mem_cgroup_commit_charge_swapin(struct page *page, struct mem_cgroup *memcg,
enum charge_type ctype)
{
if (mem_cgroup_disabled())
return;
if (!memcg)
return;
cgroup_exclude_rmdir(&memcg->css);
__mem_cgroup_commit_charge_lrucare(page, memcg, ctype);
/*
* Now swap is on-memory. This means this page may... | 78,258,114,612,413,980,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,144 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | static void __mem_cgroup_free(struct mem_cgroup *memcg)
{
int node;
mem_cgroup_remove_from_trees(memcg);
free_css_id(&mem_cgroup_subsys, &memcg->css);
for_each_node(node)
free_mem_cgroup_per_zone_info(memcg, node);
free_percpu(memcg->stat);
if (sizeof(struct mem_cgroup) < PAGE_SIZE)
kfree(memcg);
else
v... | 249,577,518,320,747,100,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,145 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | static int mem_cgroup_charge_common(struct page *page, struct mm_struct *mm,
gfp_t gfp_mask, enum charge_type ctype)
{
struct mem_cgroup *memcg = NULL;
unsigned int nr_pages = 1;
struct page_cgroup *pc;
bool oom = true;
int ret;
if (PageTransHuge(page)) {
nr_pages <<= compound_order(page);
VM_BUG_ON(!Pag... | 304,593,737,213,751,950,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,146 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | int mem_cgroup_prepare_migration(struct page *page,
struct page *newpage, struct mem_cgroup **memcgp, gfp_t gfp_mask)
{
struct mem_cgroup *memcg = NULL;
struct page_cgroup *pc;
enum charge_type ctype;
int ret = 0;
*memcgp = NULL;
VM_BUG_ON(PageTransHuge(page));
if (mem_cgroup_disabled())
return 0;
pc = lo... | 12,550,957,562,014,783,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,147 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | void mem_cgroup_replace_page_cache(struct page *oldpage,
struct page *newpage)
{
struct mem_cgroup *memcg;
struct page_cgroup *pc;
enum charge_type type = MEM_CGROUP_CHARGE_TYPE_CACHE;
if (mem_cgroup_disabled())
return;
pc = lookup_page_cgroup(oldpage);
/* fix accounting on old pages */
lock_page_cgrou... | 327,712,816,001,998,970,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,148 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 0 | void mem_cgroup_reset_owner(struct page *newpage)
{
struct page_cgroup *pc;
if (mem_cgroup_disabled())
return;
pc = lookup_page_cgroup(newpage);
VM_BUG_ON(PageCgroupUsed(pc));
pc->mem_cgroup = root_mem_cgroup;
}
| 232,939,463,449,200,900,000,000,000,000,000,000,000 | memcontrol.c | 125,900,255,123,584,410,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
24,149 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int alignfile(struct file *file, loff_t *foffset)
{
static const char buf[4] = { 0, };
DUMP_WRITE(buf, roundup(*foffset, 4) - *foffset, foffset);
return 1;
}
| 192,101,474,985,372,480,000,000,000,000,000,000,000 | binfmt_elf.c | 233,173,923,575,517,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,150 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | create_elf_tables(struct linux_binprm *bprm, struct elfhdr *exec,
unsigned long load_addr, unsigned long interp_load_addr)
{
unsigned long p = bprm->p;
int argc = bprm->argc;
int envc = bprm->envc;
elf_addr_t __user *argv;
elf_addr_t __user *envp;
elf_addr_t __user *sp;
elf_addr_t __user *u_platform;
elf_addr... | 241,854,606,726,353,260,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,151 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void do_thread_regset_writeback(struct task_struct *task,
const struct user_regset *regset)
{
if (regset->writeback)
regset->writeback(task, regset, 1);
}
| 126,159,644,469,079,350,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,152 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int elf_core_dump(struct coredump_params *cprm)
{
int has_dumped = 0;
mm_segment_t fs;
int segs;
size_t size = 0;
struct vm_area_struct *vma, *gate_vma;
struct elfhdr *elf = NULL;
loff_t offset = 0, dataoff, foffset;
struct elf_note_info info;
struct elf_phdr *phdr4note = NULL;
struct elf_shdr *shdr4ex... | 273,831,812,075,114,170,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,153 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int elf_dump_thread_status(long signr, struct elf_thread_status *t)
{
int sz = 0;
struct task_struct *p = t->thread;
t->num_notes = 0;
fill_prstatus(&t->prstatus, p, signr);
elf_core_copy_task_regs(p, &t->prstatus.pr_reg);
fill_note(&t->notes[0], "CORE", NT_PRSTATUS, sizeof(t->prstatus),
&(t->prsta... | 67,526,139,795,238,320,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,154 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static unsigned long elf_map(struct file *filep, unsigned long addr,
struct elf_phdr *eppnt, int prot, int type,
unsigned long total_size)
{
unsigned long map_addr;
unsigned long size = eppnt->p_filesz + ELF_PAGEOFFSET(eppnt->p_vaddr);
unsigned long off = eppnt->p_offset - ELF_PAGEOFFSET(eppnt->p_vaddr);
addr =... | 317,479,303,130,306,530,000,000,000,000,000,000,000 | binfmt_elf.c | 233,173,923,575,517,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,155 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int elf_note_info_init(struct elf_note_info *info)
{
memset(info, 0, sizeof(*info));
INIT_LIST_HEAD(&info->thread_list);
/* Allocate space for six ELF notes */
info->notes = kmalloc(6 * sizeof(struct memelfnote), GFP_KERNEL);
if (!info->notes)
return 0;
info->psinfo = kmalloc(sizeof(*info->psinfo), GFP_... | 302,244,776,104,145,730,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,156 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void __exit exit_elf_binfmt(void)
{
/* Remove the COFF and ELF loaders. */
unregister_binfmt(&elf_format);
}
| 96,667,192,725,899,870,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,157 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void fill_auxv_note(struct memelfnote *note, struct mm_struct *mm)
{
elf_addr_t *auxv = (elf_addr_t *) mm->saved_auxv;
int i = 0;
do
i += 2;
while (auxv[i - 2] != AT_NULL);
fill_note(note, "CORE", NT_AUXV, i * sizeof(elf_addr_t), auxv);
}
| 223,995,732,148,037,000,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,158 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void fill_elf_header(struct elfhdr *elf, int segs,
u16 machine, u32 flags, u8 osabi)
{
memset(elf, 0, sizeof(*elf));
memcpy(elf->e_ident, ELFMAG, SELFMAG);
elf->e_ident[EI_CLASS] = ELF_CLASS;
elf->e_ident[EI_DATA] = ELF_DATA;
elf->e_ident[EI_VERSION] = EV_CURRENT;
elf->e_ident[EI_OSABI] = ELF_OSABI... | 127,278,164,234,333,390,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,159 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void fill_elf_note_phdr(struct elf_phdr *phdr, int sz, loff_t offset)
{
phdr->p_type = PT_NOTE;
phdr->p_offset = offset;
phdr->p_vaddr = 0;
phdr->p_paddr = 0;
phdr->p_filesz = sz;
phdr->p_memsz = 0;
phdr->p_flags = 0;
phdr->p_align = 0;
return;
}
| 262,772,109,129,112,840,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,160 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void fill_extnum_info(struct elfhdr *elf, struct elf_shdr *shdr4extnum,
elf_addr_t e_shoff, int segs)
{
elf->e_shoff = e_shoff;
elf->e_shentsize = sizeof(*shdr4extnum);
elf->e_shnum = 1;
elf->e_shstrndx = SHN_UNDEF;
memset(shdr4extnum, 0, sizeof(*shdr4extnum));
shdr4extnum->sh_type = SHT_NULL;
s... | 259,822,199,662,006,000,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,161 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void fill_note(struct memelfnote *note, const char *name, int type,
unsigned int sz, void *data)
{
note->name = name;
note->type = type;
note->datasz = sz;
note->data = data;
return;
}
| 147,568,301,482,781,560,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,162 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int fill_note_info(struct elfhdr *elf, int phdrs,
struct elf_note_info *info,
long signr, struct pt_regs *regs)
{
struct task_struct *dump_task = current;
const struct user_regset_view *view = task_user_regset_view(dump_task);
struct elf_thread_core_info *t;
struct elf_prpsinfo *psinfo;
struct cor... | 42,097,082,847,005,985,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,163 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int fill_note_info(struct elfhdr *elf, int phdrs,
struct elf_note_info *info,
long signr, struct pt_regs *regs)
{
struct list_head *t;
if (!elf_note_info_init(info))
return 0;
if (signr) {
struct core_thread *ct;
struct elf_thread_status *ets;
for (ct = current->mm->core_state->dumper.nex... | 291,990,402,231,813,770,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,164 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void fill_prstatus(struct elf_prstatus *prstatus,
struct task_struct *p, long signr)
{
prstatus->pr_info.si_signo = prstatus->pr_cursig = signr;
prstatus->pr_sigpend = p->pending.signal.sig[0];
prstatus->pr_sighold = p->blocked.sig[0];
rcu_read_lock();
prstatus->pr_ppid = task_pid_vnr(rcu_dereference(p->r... | 129,550,788,471,037,460,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,165 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int fill_psinfo(struct elf_prpsinfo *psinfo, struct task_struct *p,
struct mm_struct *mm)
{
const struct cred *cred;
unsigned int i, len;
/* first copy the parameters from user space */
memset(psinfo, 0, sizeof(struct elf_prpsinfo));
len = mm->arg_end - mm->arg_start;
if (len >= ELF_PRARGSZ)
... | 201,715,108,038,534,540,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,166 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static struct vm_area_struct *first_vma(struct task_struct *tsk,
struct vm_area_struct *gate_vma)
{
struct vm_area_struct *ret = tsk->mm->mmap;
if (ret)
return ret;
return gate_vma;
}
| 192,846,779,505,918,670,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,167 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static void free_note_info(struct elf_note_info *info)
{
while (!list_empty(&info->thread_list)) {
struct list_head *tmp = info->thread_list.next;
list_del(tmp);
kfree(list_entry(tmp, struct elf_thread_status, list));
}
kfree(info->prstatus);
kfree(info->psinfo);
kfree(info->notes);
kfree(info->fpu);
#ifde... | 141,538,673,471,664,550,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,168 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static size_t get_note_info_size(struct elf_note_info *info)
{
return info->size;
}
| 194,770,984,141,947,000,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,169 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int __init init_elf_binfmt(void)
{
return register_binfmt(&elf_format);
}
| 115,247,181,651,308,870,000,000,000,000,000,000,000 | binfmt_elf.c | 233,173,923,575,517,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,170 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int load_elf_binary(struct linux_binprm *bprm, struct pt_regs *regs)
{
struct file *interpreter = NULL; /* to shut gcc up */
unsigned long load_addr = 0, load_bias = 0;
int load_addr_set = 0;
char * elf_interpreter = NULL;
unsigned long error;
struct elf_phdr *elf_ppnt, *elf_phdata;
unsigned long elf_bss... | 241,598,876,853,896,200,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,171 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static struct vm_area_struct *next_vma(struct vm_area_struct *this_vma,
struct vm_area_struct *gate_vma)
{
struct vm_area_struct *ret;
ret = this_vma->vm_next;
if (ret)
return ret;
if (this_vma == gate_vma)
return NULL;
return gate_vma;
}
| 242,601,585,777,722,940,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,172 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int notesize(struct memelfnote *en)
{
int sz;
sz = sizeof(struct elf_note);
sz += roundup(strlen(en->name) + 1, 4);
sz += roundup(en->datasz, 4);
return sz;
}
| 7,294,977,417,483,871,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,173 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int padzero(unsigned long elf_bss)
{
unsigned long nbyte;
nbyte = ELF_PAGEOFFSET(elf_bss);
if (nbyte) {
nbyte = ELF_MIN_ALIGN - nbyte;
if (clear_user((void __user *) elf_bss, nbyte))
return -EFAULT;
}
return 0;
}
| 82,642,296,906,068,290,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,174 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int set_brk(unsigned long start, unsigned long end)
{
start = ELF_PAGEALIGN(start);
end = ELF_PAGEALIGN(end);
if (end > start) {
unsigned long addr;
down_write(¤t->mm->mmap_sem);
addr = do_brk(start, end - start);
up_write(¤t->mm->mmap_sem);
if (BAD_ADDR(addr))
return addr;
}
curren... | 157,502,320,420,616,670,000,000,000,000,000,000,000 | binfmt_elf.c | 233,173,923,575,517,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,175 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static unsigned long total_mapping_size(struct elf_phdr *cmds, int nr)
{
int i, first_idx = -1, last_idx = -1;
for (i = 0; i < nr; i++) {
if (cmds[i].p_type == PT_LOAD) {
last_idx = i;
if (first_idx == -1)
first_idx = i;
}
}
if (first_idx == -1)
return 0;
return cmds[last_idx].p_vaddr + cmds[last... | 300,406,994,696,202,900,000,000,000,000,000,000,000 | binfmt_elf.c | 32,418,080,243,984,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,176 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static unsigned long vma_dump_size(struct vm_area_struct *vma,
unsigned long mm_flags)
{
#define FILTER(type) (mm_flags & (1UL << MMF_DUMP_##type))
/* The vma can be set up to tell us the answer directly. */
if (vma->vm_flags & VM_ALWAYSDUMP)
goto whole;
/* Hugetlb memory check */
if (vma->vm_flags & VM... | 171,373,297,259,953,500,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
24,177 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 0 | static int write_note_info(struct elf_note_info *info,
struct file *file, loff_t *foffset)
{
bool first = 1;
struct elf_thread_core_info *t = info->thread;
do {
int i;
if (!writenote(&t->notes[0], file, foffset))
return 0;
if (first && !writenote(&info->psinfo, file, foffset))
return 0;
if (fi... | 14,882,902,892,572,112,000,000,000,000,000,000,000 | binfmt_elf.c | 71,468,904,637,537,330,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.