idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
23,313
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static loff_t ext4_max_bitmap_size(int bits, int has_huge_files) { loff_t res = EXT4_NDIR_BLOCKS; int meta_blocks; loff_t upper_limit; /* This is calculated to be the largest file size for a dense, block * mapped file such that the file's total number of 512-byte sectors, * including data and all indirect block...
15,839,139,010,445,950,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,314
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static struct dentry *ext4_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) { return mount_bdev(fs_type, flags, dev_name, data, ext4_fill_super); }
154,924,739,739,761,940,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,315
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
void ext4_msg(struct super_block *sb, const char *prefix, const char *fmt, ...) { struct va_format vaf; va_list args; va_start(args, fmt); vaf.fmt = fmt; vaf.va = &args; printk("%sEXT4-fs (%s): %pV\n", prefix, sb->s_id, &vaf); va_end(args); }
12,005,075,718,224,130,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,316
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static struct inode *ext4_nfs_get_inode(struct super_block *sb, u64 ino, u32 generation) { struct inode *inode; if (ino < EXT4_FIRST_INO(sb) && ino != EXT4_ROOT_INO) return ERR_PTR(-ESTALE); if (ino > le32_to_cpu(EXT4_SB(sb)->s_es->s_inodes_count)) return ERR_PTR(-ESTALE); /* iget isn't really right if t...
239,845,694,133,380,060,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,317
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_orphan_cleanup(struct super_block *sb, struct ext4_super_block *es) { unsigned int s_flags = sb->s_flags; int nr_orphans = 0, nr_truncates = 0; #ifdef CONFIG_QUOTA int i; #endif if (!es->s_last_orphan) { jbd_debug(4, "no orphan inodes to clean up\n"); return; } if (bdev_read_only(sb->s_b...
195,158,824,247,191,100,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,318
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_put_nojournal(handle_t *handle) { unsigned long ref_cnt = (unsigned long)handle; BUG_ON(ref_cnt == 0); ref_cnt--; handle = (handle_t *)ref_cnt; current->journal_info = handle; }
268,465,965,898,064,800,000,000,000,000,000,000,000
ext4_jbd2.c
96,099,892,552,996,080,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,319
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_put_super(struct super_block *sb) { struct ext4_sb_info *sbi = EXT4_SB(sb); struct ext4_super_block *es = sbi->s_es; int i, err; ext4_unregister_li_request(sb); dquot_disable(sb, -1, DQUOT_USAGE_ENABLED | DQUOT_LIMITS_ENABLED); flush_workqueue(sbi->dio_unwritten_wq); destroy_workqueue(sbi->dio...
219,390,841,350,577,100,000,000,000,000,000,000,000
super.c
263,073,866,316,452,960,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,320
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_quota_off(struct super_block *sb, int type) { struct inode *inode = sb_dqopt(sb)->files[type]; handle_t *handle; /* Force all delayed allocation blocks to be allocated. * Caller already holds s_umount sem */ if (test_opt(sb, DELALLOC)) sync_filesystem(sb); if (!inode) goto out; /* Update ...
134,598,214,264,929,740,000,000,000,000,000,000,000
super.c
153,991,305,486,688,540,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,321
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_quota_on(struct super_block *sb, int type, int format_id, struct path *path) { int err; if (!test_opt(sb, QUOTA)) return -EINVAL; /* Quotafile not on the same filesystem? */ if (path->mnt->mnt_sb != sb) return -EXDEV; /* Journaling quota? */ if (EXT4_SB(sb)->s_qf_names[type]) { /* Quot...
46,319,308,156,556,000,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,322
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_quota_on_mount(struct super_block *sb, int type) { return dquot_quota_on_mount(sb, EXT4_SB(sb)->s_qf_names[type], EXT4_SB(sb)->s_jquota_fmt, type); }
180,735,366,481,320,200,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,323
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ssize_t ext4_quota_read(struct super_block *sb, int type, char *data, size_t len, loff_t off) { struct inode *inode = sb_dqopt(sb)->files[type]; ext4_lblk_t blk = off >> EXT4_BLOCK_SIZE_BITS(sb); int err = 0; int offset = off & (sb->s_blocksize - 1); int tocopy; size_t toread; struct buffer_head...
62,247,126,085,695,050,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,324
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ssize_t ext4_quota_write(struct super_block *sb, int type, const char *data, size_t len, loff_t off) { struct inode *inode = sb_dqopt(sb)->files[type]; ext4_lblk_t blk = off >> EXT4_BLOCK_SIZE_BITS(sb); int err = 0; int offset = off & (sb->s_blocksize - 1); struct buffer_head *bh; handle_t *handle = jo...
325,883,843,163,850,230,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,325
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_register_li_request(struct super_block *sb, ext4_group_t first_not_zeroed) { struct ext4_sb_info *sbi = EXT4_SB(sb); struct ext4_li_request *elr; ext4_group_t ngroups = EXT4_SB(sb)->s_groups_count; int ret = 0; if (sbi->s_li_request != NULL) { /* * Reset timeout so it can be computed ...
188,613,697,341,043,600,000,000,000,000,000,000,000
super.c
153,991,305,486,688,540,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,326
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_release_dquot(struct dquot *dquot) { int ret, err; handle_t *handle; handle = ext4_journal_start(dquot_to_inode(dquot), EXT4_QUOTA_DEL_BLOCKS(dquot->dq_sb)); if (IS_ERR(handle)) { /* Release dquot anyway to avoid endless cycle in dqput() */ dquot_release(dquot); return PTR_ERR(handle)...
42,314,432,165,523,780,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,327
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_remount(struct super_block *sb, int *flags, char *data) { struct ext4_super_block *es; struct ext4_sb_info *sbi = EXT4_SB(sb); ext4_fsblk_t n_blocks_count = 0; unsigned long old_sb_flags; struct ext4_mount_options old_opts; int enable_quota = 0; ext4_group_t g; unsigned int journal_ioprio = DEFA...
164,229,902,789,071,570,000,000,000,000,000,000,000
super.c
263,073,866,316,452,960,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,328
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_remove_li_request(struct ext4_li_request *elr) { struct ext4_sb_info *sbi; if (!elr) return; sbi = elr->lr_sbi; list_del(&elr->lr_request); sbi->s_li_request = NULL; kfree(elr); }
143,022,388,270,821,280,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,329
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_run_lazyinit_thread(void) { ext4_lazyinit_task = kthread_run(ext4_lazyinit_thread, ext4_li_info, "ext4lazyinit"); if (IS_ERR(ext4_lazyinit_task)) { int err = PTR_ERR(ext4_lazyinit_task); ext4_clear_request_list(); kfree(ext4_li_info); ext4_li_info = NULL; printk(KERN_CRIT "EXT4: error ...
246,169,454,082,878,630,000,000,000,000,000,000,000
super.c
263,073,866,316,452,960,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,330
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_run_li_request(struct ext4_li_request *elr) { struct ext4_group_desc *gdp = NULL; ext4_group_t group, ngroups; struct super_block *sb; unsigned long timeout = 0; int ret = 0; sb = elr->lr_super; ngroups = EXT4_SB(sb)->s_groups_count; for (group = elr->lr_next_group; group < ngroups; group++) {...
61,882,749,431,549,810,000,000,000,000,000,000,000
super.c
153,991,305,486,688,540,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,331
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_sb_release(struct kobject *kobj) { struct ext4_sb_info *sbi = container_of(kobj, struct ext4_sb_info, s_kobj); complete(&sbi->s_kobj_unregister); }
3,867,730,162,861,905,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,332
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_setup_super(struct super_block *sb, struct ext4_super_block *es, int read_only) { struct ext4_sb_info *sbi = EXT4_SB(sb); int res = 0; if (le32_to_cpu(es->s_rev_level) > EXT4_MAX_SUPP_REV) { ext4_msg(sb, KERN_ERR, "revision level too high, " "forcing read-only mode"); res = MS_RDONLY;...
334,573,384,841,188,500,000,000,000,000,000,000,000
super.c
153,991,305,486,688,540,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,333
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_show_options(struct seq_file *seq, struct vfsmount *vfs) { int def_errors; unsigned long def_mount_opts; struct super_block *sb = vfs->mnt_sb; struct ext4_sb_info *sbi = EXT4_SB(sb); struct ext4_super_block *es = sbi->s_es; def_mount_opts = le32_to_cpu(es->s_default_mount_opts); def_errors =...
25,051,162,863,419,055,000,000,000,000,000,000,000
super.c
263,073,866,316,452,960,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,334
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void ext4_show_quota_options(struct seq_file *seq, struct super_block *sb) { #if defined(CONFIG_QUOTA) struct ext4_sb_info *sbi = EXT4_SB(sb); if (sbi->s_jquota_fmt) { char *fmtname = ""; switch (sbi->s_jquota_fmt) { case QFMT_VFS_OLD: fmtname = "vfsold"; break; case QFMT_VFS_V0:...
212,879,199,935,281,300,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,335
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_statfs(struct dentry *dentry, struct kstatfs *buf) { struct super_block *sb = dentry->d_sb; struct ext4_sb_info *sbi = EXT4_SB(sb); struct ext4_super_block *es = sbi->s_es; struct ext4_group_desc *gdp; u64 fsid; s64 bfree; if (test_opt(sb, MINIX_DF)) { sbi->s_overhead_last = 0; } else if (es-...
59,870,624,627,972,640,000,000,000,000,000,000,000
super.c
151,364,333,106,312,250,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,336
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_sync_fs(struct super_block *sb, int wait) { int ret = 0; tid_t target; struct ext4_sb_info *sbi = EXT4_SB(sb); trace_ext4_sync_fs(sb, wait); flush_workqueue(sbi->dio_unwritten_wq); if (jbd2_journal_start_commit(sbi->s_journal, &target)) { if (wait) jbd2_log_wait_commit(sbi->s_journal, target...
292,999,937,267,474,020,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,337
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_unfreeze(struct super_block *sb) { if (sb->s_flags & MS_RDONLY) return 0; lock_super(sb); /* Reset the needs_recovery flag before the fs is unlocked. */ EXT4_SET_INCOMPAT_FEATURE(sb, EXT4_FEATURE_INCOMPAT_RECOVER); ext4_commit_super(sb, 1); unlock_super(sb); return 0; }
318,037,145,000,791,200,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,338
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_unregister_li_request(struct super_block *sb) { mutex_lock(&ext4_li_mtx); if (!ext4_li_info) { mutex_unlock(&ext4_li_mtx); return; } mutex_lock(&ext4_li_info->li_list_mtx); ext4_remove_li_request(EXT4_SB(sb)->s_li_request); mutex_unlock(&ext4_li_info->li_list_mtx); mutex_unlock(&ext4_li_mtx...
280,335,253,447,032,450,000,000,000,000,000,000,000
super.c
301,372,642,199,140,400,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,339
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
void ext4_update_dynamic_rev(struct super_block *sb) { struct ext4_super_block *es = EXT4_SB(sb)->s_es; if (le32_to_cpu(es->s_rev_level) > EXT4_GOOD_OLD_REV) return; ext4_warning(sb, "updating to rev %d because of new feature flag, " "running e2fsck is recommended", EXT4_DYNAMIC_REV); es->...
17,404,283,803,425,879,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,340
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
__u32 ext4_used_dirs_count(struct super_block *sb, struct ext4_group_desc *bg) { return le16_to_cpu(bg->bg_used_dirs_count_lo) | (EXT4_DESC_SIZE(sb) >= EXT4_MIN_DESC_SIZE_64BIT ? (__u32)le16_to_cpu(bg->bg_used_dirs_count_hi) << 16 : 0); }
167,784,855,789,803,320,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,341
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int ext4_write_info(struct super_block *sb, int type) { int ret, err; handle_t *handle; /* Data block + inode block */ handle = ext4_journal_start(sb->s_root->d_inode, 2); if (IS_ERR(handle)) return PTR_ERR(handle); ret = dquot_commit_info(sb, type); err = ext4_journal_stop(handle); if (!ret) ret = ...
45,368,737,701,676,930,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,342
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void ext4_write_super(struct super_block *sb) { lock_super(sb); ext4_commit_super(sb, 1); unlock_super(sb); }
314,750,650,669,887,370,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,343
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ext4_fsblk_t get_sb_block(void **data) { ext4_fsblk_t sb_block; char *options = (char *) *data; if (!options || strncmp(options, "sb=", 3) != 0) return 1; /* Default location */ options += 3; /* TODO: use simple_strtoll with >32bit ext4 */ sb_block = simple_strtoul(options, &options, 0); if (*options...
36,873,312,454,435,600,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,344
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int init_inodecache(void) { ext4_inode_cachep = kmem_cache_create("ext4_inode_cache", sizeof(struct ext4_inode_info), 0, (SLAB_RECLAIM_ACCOUNT| SLAB_MEM_SPREAD), init_once); if (ext4_inode_cachep == NULL) return -ENOMEM; return 0; }
323,843,000,007,379,640,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,345
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void init_once(void *foo) { struct ext4_inode_info *ei = (struct ext4_inode_info *) foo; INIT_LIST_HEAD(&ei->i_orphan); #ifdef CONFIG_EXT4_FS_XATTR init_rwsem(&ei->xattr_sem); #endif init_rwsem(&ei->i_data_sem); inode_init_once(&ei->vfs_inode); }
257,385,009,676,345,480,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,346
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ssize_t inode_readahead_blks_store(struct ext4_attr *a, struct ext4_sb_info *sbi, const char *buf, size_t count) { unsigned long t; if (parse_strtoul(buf, 0x40000000, &t)) return -EINVAL; if (t && !is_power_of_2(t)) return -EINVAL; sbi->s_inode_readahead_blks = t; return count; }
180,395,226,458,842,930,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,347
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ssize_t lifetime_write_kbytes_show(struct ext4_attr *a, struct ext4_sb_info *sbi, char *buf) { struct super_block *sb = sbi->s_buddy_cache->i_sb; if (!sb->s_bdev->bd_part) return snprintf(buf, PAGE_SIZE, "0\n"); return snprintf(buf, PAGE_SIZE, "%llu\n", (unsigned long long)(sbi->s_kbytes_written ...
278,889,743,751,980,300,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,348
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int parse_options(char *options, struct super_block *sb, unsigned long *journal_devnum, unsigned int *journal_ioprio, ext4_fsblk_t *n_blocks_count, int is_remount) { struct ext4_sb_info *sbi = EXT4_SB(sb); char *p; substring_t args[MAX_OPT_ARGS]; int data_opt = 0; int option; #ifdef CONFIG_QUOTA...
165,491,659,975,996,370,000,000,000,000,000,000,000
super.c
263,073,866,316,452,960,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,349
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int parse_strtoul(const char *buf, unsigned long max, unsigned long *value) { char *endp; *value = simple_strtoul(skip_spaces(buf), &endp, 0); endp = skip_spaces(endp); if (*endp || *value > max) return -EINVAL; return 0; }
313,457,817,020,359,170,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,350
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void print_daily_error_info(unsigned long arg) { struct super_block *sb = (struct super_block *) arg; struct ext4_sb_info *sbi; struct ext4_super_block *es; sbi = EXT4_SB(sb); es = sbi->s_es; if (es->s_error_count) ext4_msg(sb, KERN_NOTICE, "error count: %u", le32_to_cpu(es->s_error_count)); if (e...
284,770,843,403,512,900,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,351
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void register_as_ext2(void) { int err = register_filesystem(&ext2_fs_type); if (err) printk(KERN_WARNING "EXT4-fs: Unable to register as ext2 (%d)\n", err); }
329,914,094,621,922,450,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,352
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void register_as_ext2(void) { }
60,270,300,603,727,150,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,353
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void register_as_ext3(void) { int err = register_filesystem(&ext3_fs_type); if (err) printk(KERN_WARNING "EXT4-fs: Unable to register as ext3 (%d)\n", err); }
259,978,813,351,265,860,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,354
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void register_as_ext3(void) { }
215,130,535,384,890,780,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,355
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static void save_error_info(struct super_block *sb, const char *func, unsigned int line) { __save_error_info(sb, func, line); ext4_commit_super(sb, 1); }
333,183,483,455,530,200,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,356
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ssize_t sbi_ui_store(struct ext4_attr *a, struct ext4_sb_info *sbi, const char *buf, size_t count) { unsigned int *ui = (unsigned int *) (((char *) sbi) + a->offset); unsigned long t; if (parse_strtoul(buf, 0xffffffff, &t)) return -EINVAL; *ui = t; return count; }
43,756,770,670,482,470,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,357
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static ssize_t session_write_kbytes_show(struct ext4_attr *a, struct ext4_sb_info *sbi, char *buf) { struct super_block *sb = sbi->s_buddy_cache->i_sb; if (!sb->s_bdev->bd_part) return snprintf(buf, PAGE_SIZE, "0\n"); return snprintf(buf, PAGE_SIZE, "%lu\n", (part_stat_read(sb->s_bdev->bd_part, sectors[1...
129,325,951,362,317,100,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,358
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static int set_qf_name(struct super_block *sb, int qtype, substring_t *args) { struct ext4_sb_info *sbi = EXT4_SB(sb); char *qname; if (sb_any_quota_loaded(sb) && !sbi->s_qf_names[qtype]) { ext4_msg(sb, KERN_ERR, "Cannot change journaled " "quota options when quota turned on"); return 0; } qname = mat...
20,958,658,575,873,530,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,359
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void unregister_as_ext2(void) { unregister_filesystem(&ext2_fs_type); }
115,325,843,518,672,110,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,360
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void unregister_as_ext3(void) { unregister_filesystem(&ext3_fs_type); }
195,400,525,461,663,560,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,361
linux
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
0
static inline void unregister_as_ext3(void) { }
309,154,081,903,336,400,000,000,000,000,000,000,000
super.c
44,415,732,563,068,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2100
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ...
https://nvd.nist.gov/vuln/detail/CVE-2012-2100
23,680
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static u32 __xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr) { u32 spi; struct xfrm6_tunnel_spi *x6spi; struct hlist_node *pos; unsigned index; if (xfrm6_tunnel_spi < XFRM6_TUNNEL_SPI_MIN || xfrm6_tunnel_spi >= XFRM6_TUNNEL_SPI_MAX) xfrm6_tunnel_spi = XFRM6_TUNNEL_SPI_MIN; else xfrm6_tunnel_spi++; for (...
28,271,588,334,850,130,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,681
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static struct xfrm6_tunnel_spi *__xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr) { struct xfrm6_tunnel_spi *x6spi; struct hlist_node *pos; hlist_for_each_entry(x6spi, pos, &xfrm6_tunnel_spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)], list_byaddr) { if (memcmp(&x6spi->addr, saddr, sizeof(x6spi->ad...
157,147,859,745,525,780,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,682
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
__be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr) { struct xfrm6_tunnel_spi *x6spi; u32 spi; write_lock_bh(&xfrm6_tunnel_spi_lock); x6spi = __xfrm6_tunnel_spi_lookup(saddr); if (x6spi) { atomic_inc(&x6spi->refcnt); spi = x6spi->spi; } else spi = __xfrm6_tunnel_alloc_spi(saddr); write_unlock_bh(&xfrm6_t...
290,756,282,289,726,650,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,683
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void xfrm6_tunnel_destroy(struct xfrm_state *x) { xfrm6_tunnel_free_spi((xfrm_address_t *)&x->props.saddr); }
38,365,017,609,754,553,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,684
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void __exit xfrm6_tunnel_fini(void) { xfrm6_tunnel_spi_fini(); xfrm6_tunnel_deregister(&xfrm46_tunnel_handler, AF_INET); xfrm6_tunnel_deregister(&xfrm6_tunnel_handler, AF_INET6); xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); }
94,445,122,977,237,100,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,685
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
void xfrm6_tunnel_free_spi(xfrm_address_t *saddr) { struct xfrm6_tunnel_spi *x6spi; struct hlist_node *pos, *n; write_lock_bh(&xfrm6_tunnel_spi_lock); hlist_for_each_entry_safe(x6spi, pos, n, &xfrm6_tunnel_spi_byaddr[xfrm6_tunnel_spi_hash_byaddr(saddr)], list_byaddr) { if (memcmp(&x6spi->addr, sadd...
144,094,655,762,754,510,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,686
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int __init xfrm6_tunnel_init(void) { if (xfrm_register_type(&xfrm6_tunnel_type, AF_INET6) < 0) return -EAGAIN; if (xfrm6_tunnel_register(&xfrm6_tunnel_handler, AF_INET6)) { xfrm_unregister_type(&xfrm6_tunnel_type, AF_INET6); return -EAGAIN; } if (xfrm6_tunnel_register(&xfrm46_tunnel_handler, AF_INET))...
185,543,229,844,029,130,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,687
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int xfrm6_tunnel_init_state(struct xfrm_state *x) { if (x->props.mode != XFRM_MODE_TUNNEL) return -EINVAL; if (x->encap) return -EINVAL; x->props.header_len = sizeof(struct ipv6hdr); return 0; }
288,528,453,830,928,170,000,000,000,000,000,000,000
xfrm6_tunnel.c
275,926,104,048,556,340,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,688
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int xfrm6_tunnel_input(struct xfrm_state *x, struct sk_buff *skb) { return 0; }
175,975,197,416,397,050,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,689
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int xfrm6_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) { struct ipv6hdr *top_iph; top_iph = (struct ipv6hdr *)skb->data; top_iph->payload_len = htons(skb->len - sizeof(struct ipv6hdr)); return 0; }
186,153,521,840,583,300,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,690
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static void xfrm6_tunnel_spi_fini(void) { int i; for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++) { if (!hlist_empty(&xfrm6_tunnel_spi_byaddr[i])) return; } for (i = 0; i < XFRM6_TUNNEL_SPI_BYSPI_HSIZE; i++) { if (!hlist_empty(&xfrm6_tunnel_spi_byspi[i])) return; } kmem_cache_destroy(xfrm6_tunnel_sp...
302,666,047,197,948,950,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,691
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static inline unsigned xfrm6_tunnel_spi_hash_byspi(u32 spi) { return spi % XFRM6_TUNNEL_SPI_BYSPI_HSIZE; }
319,097,683,666,015,550,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,692
linux
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int xfrm6_tunnel_spi_init(void) { int i; xfrm6_tunnel_spi = 0; xfrm6_tunnel_spi_kmem = kmem_cache_create("xfrm6_tunnel_spi", sizeof(struct xfrm6_tunnel_spi), 0, SLAB_HWCACHE_ALIGN, NULL, NULL); if (!xfrm6_tunnel_spi_kmem) return -ENOMEM; for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HS...
22,344,872,688,581,340,000,000,000,000,000,000,000
xfrm6_tunnel.c
227,152,596,054,811,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-1583
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
https://nvd.nist.gov/vuln/detail/CVE-2012-1583
23,706
file
1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b
https://github.com/file/file
https://github.com/glensc/file/commit/1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b
Fix bounds checks again.
0
cdf_read_short_stream(const cdf_info_t *info, const cdf_header_t *h, const cdf_sat_t *sat, const cdf_dir_t *dir, cdf_stream_t *scn) { size_t i; const cdf_directory_t *d; for (i = 0; i < dir->dir_len; i++) if (dir->dir_tab[i].d_type == CDF_DIR_TYPE_ROOT_STORAGE) break; /* If the it is not there, just fake...
46,130,757,236,059,650,000,000,000,000,000,000,000
cdf.c
252,409,831,567,122,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-1571
file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2012-1571
24,141
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
static void __mem_cgroup_commit_charge(struct mem_cgroup *memcg, struct page *page, unsigned int nr_pages, struct page_cgroup *pc, enum charge_type ctype) { lock_page_cgroup(pc); if (unlikely(PageCgroupUsed(pc))) { unlock_page_cgroup(pc); __mem_cgroup_cancel_charge(memc...
259,617,442,535,560,000,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,142
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
__mem_cgroup_commit_charge_lrucare(struct page *page, struct mem_cgroup *memcg, enum charge_type ctype) { struct page_cgroup *pc = lookup_page_cgroup(page); struct zone *zone = page_zone(page); unsigned long flags; bool removed = false; /* * In some case, SwapCache, FUSE(splice_buf->radixtree), the page ...
202,295,957,371,363,500,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,143
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
__mem_cgroup_commit_charge_swapin(struct page *page, struct mem_cgroup *memcg, enum charge_type ctype) { if (mem_cgroup_disabled()) return; if (!memcg) return; cgroup_exclude_rmdir(&memcg->css); __mem_cgroup_commit_charge_lrucare(page, memcg, ctype); /* * Now swap is on-memory. This means this page may...
78,258,114,612,413,980,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,144
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
static void __mem_cgroup_free(struct mem_cgroup *memcg) { int node; mem_cgroup_remove_from_trees(memcg); free_css_id(&mem_cgroup_subsys, &memcg->css); for_each_node(node) free_mem_cgroup_per_zone_info(memcg, node); free_percpu(memcg->stat); if (sizeof(struct mem_cgroup) < PAGE_SIZE) kfree(memcg); else v...
249,577,518,320,747,100,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,145
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
static int mem_cgroup_charge_common(struct page *page, struct mm_struct *mm, gfp_t gfp_mask, enum charge_type ctype) { struct mem_cgroup *memcg = NULL; unsigned int nr_pages = 1; struct page_cgroup *pc; bool oom = true; int ret; if (PageTransHuge(page)) { nr_pages <<= compound_order(page); VM_BUG_ON(!Pag...
304,593,737,213,751,950,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,146
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
int mem_cgroup_prepare_migration(struct page *page, struct page *newpage, struct mem_cgroup **memcgp, gfp_t gfp_mask) { struct mem_cgroup *memcg = NULL; struct page_cgroup *pc; enum charge_type ctype; int ret = 0; *memcgp = NULL; VM_BUG_ON(PageTransHuge(page)); if (mem_cgroup_disabled()) return 0; pc = lo...
12,550,957,562,014,783,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,147
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
void mem_cgroup_replace_page_cache(struct page *oldpage, struct page *newpage) { struct mem_cgroup *memcg; struct page_cgroup *pc; enum charge_type type = MEM_CGROUP_CHARGE_TYPE_CACHE; if (mem_cgroup_disabled()) return; pc = lookup_page_cgroup(oldpage); /* fix accounting on old pages */ lock_page_cgrou...
327,712,816,001,998,970,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,148
linux
371528caec553785c37f73fa3926ea0de84f986f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
0
void mem_cgroup_reset_owner(struct page *newpage) { struct page_cgroup *pc; if (mem_cgroup_disabled()) return; pc = lookup_page_cgroup(newpage); VM_BUG_ON(PageCgroupUsed(pc)); pc->mem_cgroup = root_mem_cgroup; }
232,939,463,449,200,900,000,000,000,000,000,000,000
memcontrol.c
125,900,255,123,584,410,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2012-1146
The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ...
https://nvd.nist.gov/vuln/detail/CVE-2012-1146
24,149
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int alignfile(struct file *file, loff_t *foffset) { static const char buf[4] = { 0, }; DUMP_WRITE(buf, roundup(*foffset, 4) - *foffset, foffset); return 1; }
192,101,474,985,372,480,000,000,000,000,000,000,000
binfmt_elf.c
233,173,923,575,517,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,150
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
create_elf_tables(struct linux_binprm *bprm, struct elfhdr *exec, unsigned long load_addr, unsigned long interp_load_addr) { unsigned long p = bprm->p; int argc = bprm->argc; int envc = bprm->envc; elf_addr_t __user *argv; elf_addr_t __user *envp; elf_addr_t __user *sp; elf_addr_t __user *u_platform; elf_addr...
241,854,606,726,353,260,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,151
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void do_thread_regset_writeback(struct task_struct *task, const struct user_regset *regset) { if (regset->writeback) regset->writeback(task, regset, 1); }
126,159,644,469,079,350,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,152
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int elf_core_dump(struct coredump_params *cprm) { int has_dumped = 0; mm_segment_t fs; int segs; size_t size = 0; struct vm_area_struct *vma, *gate_vma; struct elfhdr *elf = NULL; loff_t offset = 0, dataoff, foffset; struct elf_note_info info; struct elf_phdr *phdr4note = NULL; struct elf_shdr *shdr4ex...
273,831,812,075,114,170,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,153
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int elf_dump_thread_status(long signr, struct elf_thread_status *t) { int sz = 0; struct task_struct *p = t->thread; t->num_notes = 0; fill_prstatus(&t->prstatus, p, signr); elf_core_copy_task_regs(p, &t->prstatus.pr_reg); fill_note(&t->notes[0], "CORE", NT_PRSTATUS, sizeof(t->prstatus), &(t->prsta...
67,526,139,795,238,320,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,154
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static unsigned long elf_map(struct file *filep, unsigned long addr, struct elf_phdr *eppnt, int prot, int type, unsigned long total_size) { unsigned long map_addr; unsigned long size = eppnt->p_filesz + ELF_PAGEOFFSET(eppnt->p_vaddr); unsigned long off = eppnt->p_offset - ELF_PAGEOFFSET(eppnt->p_vaddr); addr =...
317,479,303,130,306,530,000,000,000,000,000,000,000
binfmt_elf.c
233,173,923,575,517,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,155
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int elf_note_info_init(struct elf_note_info *info) { memset(info, 0, sizeof(*info)); INIT_LIST_HEAD(&info->thread_list); /* Allocate space for six ELF notes */ info->notes = kmalloc(6 * sizeof(struct memelfnote), GFP_KERNEL); if (!info->notes) return 0; info->psinfo = kmalloc(sizeof(*info->psinfo), GFP_...
302,244,776,104,145,730,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,156
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void __exit exit_elf_binfmt(void) { /* Remove the COFF and ELF loaders. */ unregister_binfmt(&elf_format); }
96,667,192,725,899,870,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,157
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void fill_auxv_note(struct memelfnote *note, struct mm_struct *mm) { elf_addr_t *auxv = (elf_addr_t *) mm->saved_auxv; int i = 0; do i += 2; while (auxv[i - 2] != AT_NULL); fill_note(note, "CORE", NT_AUXV, i * sizeof(elf_addr_t), auxv); }
223,995,732,148,037,000,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,158
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void fill_elf_header(struct elfhdr *elf, int segs, u16 machine, u32 flags, u8 osabi) { memset(elf, 0, sizeof(*elf)); memcpy(elf->e_ident, ELFMAG, SELFMAG); elf->e_ident[EI_CLASS] = ELF_CLASS; elf->e_ident[EI_DATA] = ELF_DATA; elf->e_ident[EI_VERSION] = EV_CURRENT; elf->e_ident[EI_OSABI] = ELF_OSABI...
127,278,164,234,333,390,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,159
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void fill_elf_note_phdr(struct elf_phdr *phdr, int sz, loff_t offset) { phdr->p_type = PT_NOTE; phdr->p_offset = offset; phdr->p_vaddr = 0; phdr->p_paddr = 0; phdr->p_filesz = sz; phdr->p_memsz = 0; phdr->p_flags = 0; phdr->p_align = 0; return; }
262,772,109,129,112,840,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,160
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void fill_extnum_info(struct elfhdr *elf, struct elf_shdr *shdr4extnum, elf_addr_t e_shoff, int segs) { elf->e_shoff = e_shoff; elf->e_shentsize = sizeof(*shdr4extnum); elf->e_shnum = 1; elf->e_shstrndx = SHN_UNDEF; memset(shdr4extnum, 0, sizeof(*shdr4extnum)); shdr4extnum->sh_type = SHT_NULL; s...
259,822,199,662,006,000,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,161
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void fill_note(struct memelfnote *note, const char *name, int type, unsigned int sz, void *data) { note->name = name; note->type = type; note->datasz = sz; note->data = data; return; }
147,568,301,482,781,560,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,162
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int fill_note_info(struct elfhdr *elf, int phdrs, struct elf_note_info *info, long signr, struct pt_regs *regs) { struct task_struct *dump_task = current; const struct user_regset_view *view = task_user_regset_view(dump_task); struct elf_thread_core_info *t; struct elf_prpsinfo *psinfo; struct cor...
42,097,082,847,005,985,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,163
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int fill_note_info(struct elfhdr *elf, int phdrs, struct elf_note_info *info, long signr, struct pt_regs *regs) { struct list_head *t; if (!elf_note_info_init(info)) return 0; if (signr) { struct core_thread *ct; struct elf_thread_status *ets; for (ct = current->mm->core_state->dumper.nex...
291,990,402,231,813,770,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,164
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void fill_prstatus(struct elf_prstatus *prstatus, struct task_struct *p, long signr) { prstatus->pr_info.si_signo = prstatus->pr_cursig = signr; prstatus->pr_sigpend = p->pending.signal.sig[0]; prstatus->pr_sighold = p->blocked.sig[0]; rcu_read_lock(); prstatus->pr_ppid = task_pid_vnr(rcu_dereference(p->r...
129,550,788,471,037,460,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,165
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int fill_psinfo(struct elf_prpsinfo *psinfo, struct task_struct *p, struct mm_struct *mm) { const struct cred *cred; unsigned int i, len; /* first copy the parameters from user space */ memset(psinfo, 0, sizeof(struct elf_prpsinfo)); len = mm->arg_end - mm->arg_start; if (len >= ELF_PRARGSZ) ...
201,715,108,038,534,540,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,166
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static struct vm_area_struct *first_vma(struct task_struct *tsk, struct vm_area_struct *gate_vma) { struct vm_area_struct *ret = tsk->mm->mmap; if (ret) return ret; return gate_vma; }
192,846,779,505,918,670,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,167
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static void free_note_info(struct elf_note_info *info) { while (!list_empty(&info->thread_list)) { struct list_head *tmp = info->thread_list.next; list_del(tmp); kfree(list_entry(tmp, struct elf_thread_status, list)); } kfree(info->prstatus); kfree(info->psinfo); kfree(info->notes); kfree(info->fpu); #ifde...
141,538,673,471,664,550,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,168
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static size_t get_note_info_size(struct elf_note_info *info) { return info->size; }
194,770,984,141,947,000,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,169
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int __init init_elf_binfmt(void) { return register_binfmt(&elf_format); }
115,247,181,651,308,870,000,000,000,000,000,000,000
binfmt_elf.c
233,173,923,575,517,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,170
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int load_elf_binary(struct linux_binprm *bprm, struct pt_regs *regs) { struct file *interpreter = NULL; /* to shut gcc up */ unsigned long load_addr = 0, load_bias = 0; int load_addr_set = 0; char * elf_interpreter = NULL; unsigned long error; struct elf_phdr *elf_ppnt, *elf_phdata; unsigned long elf_bss...
241,598,876,853,896,200,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,171
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static struct vm_area_struct *next_vma(struct vm_area_struct *this_vma, struct vm_area_struct *gate_vma) { struct vm_area_struct *ret; ret = this_vma->vm_next; if (ret) return ret; if (this_vma == gate_vma) return NULL; return gate_vma; }
242,601,585,777,722,940,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,172
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int notesize(struct memelfnote *en) { int sz; sz = sizeof(struct elf_note); sz += roundup(strlen(en->name) + 1, 4); sz += roundup(en->datasz, 4); return sz; }
7,294,977,417,483,871,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,173
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int padzero(unsigned long elf_bss) { unsigned long nbyte; nbyte = ELF_PAGEOFFSET(elf_bss); if (nbyte) { nbyte = ELF_MIN_ALIGN - nbyte; if (clear_user((void __user *) elf_bss, nbyte)) return -EFAULT; } return 0; }
82,642,296,906,068,290,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,174
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int set_brk(unsigned long start, unsigned long end) { start = ELF_PAGEALIGN(start); end = ELF_PAGEALIGN(end); if (end > start) { unsigned long addr; down_write(&current->mm->mmap_sem); addr = do_brk(start, end - start); up_write(&current->mm->mmap_sem); if (BAD_ADDR(addr)) return addr; } curren...
157,502,320,420,616,670,000,000,000,000,000,000,000
binfmt_elf.c
233,173,923,575,517,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,175
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static unsigned long total_mapping_size(struct elf_phdr *cmds, int nr) { int i, first_idx = -1, last_idx = -1; for (i = 0; i < nr; i++) { if (cmds[i].p_type == PT_LOAD) { last_idx = i; if (first_idx == -1) first_idx = i; } } if (first_idx == -1) return 0; return cmds[last_idx].p_vaddr + cmds[last...
300,406,994,696,202,900,000,000,000,000,000,000,000
binfmt_elf.c
32,418,080,243,984,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,176
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static unsigned long vma_dump_size(struct vm_area_struct *vma, unsigned long mm_flags) { #define FILTER(type) (mm_flags & (1UL << MMF_DUMP_##type)) /* The vma can be set up to tell us the answer directly. */ if (vma->vm_flags & VM_ALWAYSDUMP) goto whole; /* Hugetlb memory check */ if (vma->vm_flags & VM...
171,373,297,259,953,500,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097
24,177
linux
c8e252586f8d5de906385d8cf6385fee289a825e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
0
static int write_note_info(struct elf_note_info *info, struct file *file, loff_t *foffset) { bool first = 1; struct elf_thread_core_info *t = info->thread; do { int i; if (!writenote(&t->notes[0], file, foffset)) return 0; if (first && !writenote(&info->psinfo, file, foffset)) return 0; if (fi...
14,882,902,892,572,112,000,000,000,000,000,000,000
binfmt_elf.c
71,468,904,637,537,330,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call...
https://nvd.nist.gov/vuln/detail/CVE-2012-1097