idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
31,373
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void *av_calloc(size_t nmemb, size_t size) { if (size <= 0 || nmemb >= INT_MAX / size) return NULL; return av_mallocz(nmemb * size); }
73,931,316,537,730,210,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,374
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void *av_dynarray2_add(void **tab_ptr, int *nb_ptr, size_t elem_size, const uint8_t *elem_data) { int nb = *nb_ptr, nb_alloc; uint8_t *tab = *tab_ptr, *tab_elem_data; if ((nb & (nb - 1)) == 0) { if (nb == 0) { nb_alloc = 1; } else { if (nb > IN...
229,224,391,095,431,540,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,375
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void av_free(void *ptr) { #if CONFIG_MEMALIGN_HACK if (ptr) { int v= ((char *)ptr)[-1]; av_assert0(v>0 && v<=ALIGN); free((char *)ptr - v); } #elif HAVE_ALIGNED_MALLOC _aligned_free(ptr); #else free(ptr); #endif }
316,317,700,972,136,850,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,376
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void av_freep(void *arg) { void **ptr = (void **)arg; av_free(*ptr); *ptr = NULL; }
204,816,723,401,239,500,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,377
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void *av_mallocz(size_t size) { void *ptr = av_malloc(size); if (ptr) memset(ptr, 0, size); return ptr; }
204,701,845,756,388,370,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,378
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void av_max_alloc(size_t max){ max_alloc_size = max; }
76,470,962,091,985,620,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,379
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void av_memcpy_backptr(uint8_t *dst, int back, int cnt) { const uint8_t *src = &dst[-back]; if (!back) return; if (back == 1) { memset(dst, *src, cnt); } else if (back == 2) { fill16(dst, cnt); } else if (back == 3) { fill24(dst, cnt); } else if (back == 4) { ...
228,379,531,914,557,760,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,380
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void *av_realloc_array(void *ptr, size_t nmemb, size_t size) { if (size <= 0 || nmemb >= INT_MAX / size) return NULL; return av_realloc(ptr, nmemb * size); }
68,628,306,890,821,280,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,381
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
void *av_realloc_f(void *ptr, size_t nelem, size_t elsize) { size_t size; void *r; if (av_size_mult(elsize, nelem, &size)) { av_free(ptr); return NULL; } r = av_realloc(ptr, size); if (!r && size) av_free(ptr); return r; }
260,986,590,626,223,640,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,382
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
char *av_strdup(const char *s) { char *ptr = NULL; if (s) { int len = strlen(s) + 1; ptr = av_malloc(len); if (ptr) memcpy(ptr, s, len); } return ptr; }
261,108,317,235,161,450,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,383
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
static void fill16(uint8_t *dst, int len) { uint32_t v = AV_RN16(dst - 2); v |= v << 16; while (len >= 4) { AV_WN32(dst, v); dst += 4; len -= 4; } while (len--) { *dst = dst[-2]; dst++; } }
27,285,532,271,519,563,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,384
FFmpeg
c94f9e854228e0ea00e1de8769d8d3f7cab84a55
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55
avutil/mem: Fix flipped condition Fixes return code and later null pointer dereference Found-by: Laurent Butti <laurentb@gmail.com> Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
static void fill32(uint8_t *dst, int len) { uint32_t v = AV_RN32(dst - 4); while (len >= 4) { AV_WN32(dst, v); dst += 4; len -= 4; } while (len--) { *dst = dst[-4]; dst++; } }
44,668,391,960,744,680,000,000,000,000,000,000,000
mem.c
148,629,479,801,131,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-4265
The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2013-4265
31,385
FFmpeg
2960576378d17d71cc8dccc926352ce568b5eec1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1
avcodec/g2meet: fix src pointer checks in kempf_decode_tile() Fixes Ticket2842 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
static int g2m_decode_frame(AVCodecContext *avctx, void *data, int *got_picture_ptr, AVPacket *avpkt) { const uint8_t *buf = avpkt->data; int buf_size = avpkt->size; G2MContext *c = avctx->priv_data; AVFrame *pic = data; GetByteContext bc, tbc; int magic; int got_...
239,235,104,623,766,000,000,000,000,000,000,000,000
g2meet.c
321,002,839,552,375,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4264
The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file.
https://nvd.nist.gov/vuln/detail/CVE-2013-4264
31,386
FFmpeg
2960576378d17d71cc8dccc926352ce568b5eec1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1
avcodec/g2meet: fix src pointer checks in kempf_decode_tile() Fixes Ticket2842 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
static int g2m_load_cursor(AVCodecContext *avctx, G2MContext *c, GetByteContext *gb) { int i, j, k; uint8_t *dst; uint32_t bits; uint32_t cur_size, cursor_w, cursor_h, cursor_stride; uint32_t cursor_hot_x, cursor_hot_y; int cursor_fmt; uint8_t *tmp; cur_size ...
290,073,089,199,679,000,000,000,000,000,000,000,000
g2meet.c
321,002,839,552,375,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4264
The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file.
https://nvd.nist.gov/vuln/detail/CVE-2013-4264
31,445
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
__hw_perf_event_init(struct perf_event *event) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); struct hw_perf_event *hwc = &event->hw; int mapping; mapping = armpmu->map_event(event); if (mapping < 0) { pr_debug("event %x:%llx not supported\n", event->attr.type, event->attr.config); return mapping; }...
204,343,799,603,581,020,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,446
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_add(struct perf_event *event, int flags) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); struct pmu_hw_events *hw_events = armpmu->get_hw_events(); struct hw_perf_event *hwc = &event->hw; int idx; int err = 0; perf_pmu_disable(event->pmu); /* If we don't have a space for the counter then finish early...
264,403,113,501,186,730,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,447
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_del(struct perf_event *event, int flags) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); struct pmu_hw_events *hw_events = armpmu->get_hw_events(); struct hw_perf_event *hwc = &event->hw; int idx = hwc->idx; armpmu_stop(event, PERF_EF_UPDATE); hw_events->events[idx] = NULL; clear_bit(idx, hw_events->u...
230,965,153,984,908,830,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,448
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
static void armpmu_disable(struct pmu *pmu) { struct arm_pmu *armpmu = to_arm_pmu(pmu); armpmu->stop(armpmu); }
94,908,960,613,654,080,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,449
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
static int armpmu_event_init(struct perf_event *event) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); int err = 0; atomic_t *active_events = &armpmu->active_events; /* does not support taken branch sampling */ if (has_branch_stack(event)) return -EOPNOTSUPP; if (armpmu->map_event(event) == -ENOENT) retu...
61,227,609,584,860,330,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,450
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
int armpmu_event_set_period(struct perf_event *event) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); struct hw_perf_event *hwc = &event->hw; s64 left = local64_read(&hwc->period_left); s64 period = hwc->sample_period; int ret = 0; /* The period may have been changed by PERF_EVENT_IOC_PERIOD */ if (unlikely(...
302,791,694,225,658,120,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,451
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
u64 armpmu_event_update(struct perf_event *event) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); struct hw_perf_event *hwc = &event->hw; u64 delta, prev_raw_count, new_raw_count; again: prev_raw_count = local64_read(&hwc->prev_count); new_raw_count = armpmu->read_counter(event); if (local64_cmpxchg(&hwc->pr...
280,606,800,305,268,100,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,452
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_map_cache_event(const unsigned (*cache_map) [PERF_COUNT_HW_CACHE_MAX] [PERF_COUNT_HW_CACHE_OP_MAX] [PERF_COUNT_HW_CACHE_RESULT_MAX], u64 config) { unsigned int cache_type, cache_op, cache_result, ret; cache_type = (config >> 0) & 0xff; if (cache_type >= PERF_COUNT_HW_C...
216,335,945,893,261,100,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,453
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_map_event(struct perf_event *event, const unsigned (*event_map)[PERF_COUNT_HW_MAX], const unsigned (*cache_map) [PERF_COUNT_HW_CACHE_MAX] [PERF_COUNT_HW_CACHE_OP_MAX] [PERF_COUNT_HW_CACHE_RESULT_MAX], u32 raw_event_mask) { u64 config = event->attr.config; switch (event->attr.type) { case...
325,170,722,107,145,300,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,454
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_map_hw_event(const unsigned (*event_map)[PERF_COUNT_HW_MAX], u64 config) { int mapping = (*event_map)[config]; return mapping == HW_OP_UNSUPPORTED ? -ENOENT : mapping; }
302,278,201,978,317,060,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,455
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_map_raw_event(u32 raw_event_mask, u64 config) { return (int)(config & raw_event_mask); }
149,397,798,105,071,500,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,456
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_read(struct perf_event *event) { armpmu_event_update(event); }
181,565,352,332,657,970,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,457
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_release_hardware(struct arm_pmu *armpmu) { armpmu->free_irq(armpmu); pm_runtime_put_sync(&armpmu->plat_device->dev); }
213,392,183,232,795,600,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,458
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_reserve_hardware(struct arm_pmu *armpmu) { int err; struct platform_device *pmu_device = armpmu->plat_device; if (!pmu_device) return -ENODEV; pm_runtime_get_sync(&pmu_device->dev); err = armpmu->request_irq(armpmu, armpmu_dispatch_irq); if (err) { armpmu_release_hardware(armpmu); return err; } ...
300,409,862,583,178,500,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,459
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
static int armpmu_runtime_resume(struct device *dev) { struct arm_pmu_platdata *plat = dev_get_platdata(dev); if (plat && plat->runtime_resume) return plat->runtime_resume(dev); return 0; }
192,515,067,933,915,170,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,460
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
static int armpmu_runtime_suspend(struct device *dev) { struct arm_pmu_platdata *plat = dev_get_platdata(dev); if (plat && plat->runtime_suspend) return plat->runtime_suspend(dev); return 0; }
312,794,436,804,896,200,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,461
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
armpmu_stop(struct perf_event *event, int flags) { struct arm_pmu *armpmu = to_arm_pmu(event->pmu); struct hw_perf_event *hwc = &event->hw; /* * ARM pmu always has to update the counter, so ignore * PERF_EF_UPDATE, see comments in armpmu_start(). */ if (!(hwc->state & PERF_HES_STOPPED)) { armpmu->disable(e...
194,705,686,130,236,300,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,462
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
callchain_trace(struct stackframe *fr, void *data) { struct perf_callchain_entry *entry = data; perf_callchain_store(entry, fr->pc); return 0; }
153,737,435,260,795,870,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,463
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
event_requires_mode_exclusion(struct perf_event_attr *attr) { return attr->exclude_idle || attr->exclude_user || attr->exclude_kernel || attr->exclude_hv; }
321,685,399,829,015,980,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,464
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
perf_callchain_kernel(struct perf_callchain_entry *entry, struct pt_regs *regs) { struct stackframe fr; if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) { /* We don't support guest os callchain now */ return; } fr.fp = regs->ARM_fp; fr.sp = regs->ARM_sp; fr.lr = regs->ARM_lr; fr.pc = regs->ARM_pc; wal...
300,983,512,488,592,440,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,465
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
perf_callchain_user(struct perf_callchain_entry *entry, struct pt_regs *regs) { struct frame_tail __user *tail; if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) { /* We don't support guest os callchain now */ return; } perf_callchain_store(entry, regs->ARM_pc); tail = (struct frame_tail __user *)regs->AR...
187,769,852,586,772,960,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,466
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
unsigned long perf_instruction_pointer(struct pt_regs *regs) { if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) return perf_guest_cbs->get_guest_ip(); return instruction_pointer(regs); }
331,789,658,745,327,860,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,467
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
unsigned long perf_misc_flags(struct pt_regs *regs) { int misc = 0; if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) { if (perf_guest_cbs->is_user_mode()) misc |= PERF_RECORD_MISC_GUEST_USER; else misc |= PERF_RECORD_MISC_GUEST_KERNEL; } else { if (user_mode(regs)) misc |= PERF_RECORD_MISC_USER; ...
16,564,419,510,143,098,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,468
linux
c95eb3184ea1a3a2551df57190c81da695e2144b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b
ARM: 7809/1: perf: fix event validation for software group leaders It is possible to construct an event group with a software event as a group leader and then subsequently add a hardware event to the group. This results in the event group being validated by adding all members of the group to a fake PMU and attempting ...
0
user_backtrace(struct frame_tail __user *tail, struct perf_callchain_entry *entry) { struct frame_tail buftail; /* Also check accessibility of one struct frame_tail beyond */ if (!access_ok(VERIFY_READ, tail, sizeof(buftail))) return NULL; if (__copy_from_user_inatomic(&buftail, tail, sizeof(buftail))) ...
277,282,437,837,967,240,000,000,000,000,000,000,000
perf_event.c
260,167,828,169,172,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event.
https://nvd.nist.gov/vuln/detail/CVE-2013-4254
31,469
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
allocate_buffers(struct TCP_Server_Info *server) { if (!server->bigbuf) { server->bigbuf = (char *)cifs_buf_get(); if (!server->bigbuf) { cifs_dbg(VFS, "No memory for large SMB response\n"); msleep(3000); /* retry will check if exiting */ return false; } } else if (server->large_buf) { /* we are r...
336,904,385,786,951,160,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,470
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
bind_socket(struct TCP_Server_Info *server) { int rc = 0; if (server->srcaddr.ss_family != AF_UNSPEC) { /* Bind to the specified local IP address */ struct socket *socket = server->ssocket; rc = socket->ops->bind(socket, (struct sockaddr *) &server->srcaddr, sizeof(server->srcaddr)); if ...
136,175,094,959,194,580,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,471
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_cleanup_volume_info(struct smb_vol *volume_info) { if (!volume_info) return; cleanup_volume_info_contents(volume_info); kfree(volume_info); }
60,607,316,440,321,695,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,472
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_construct_tcon(struct cifs_sb_info *cifs_sb, kuid_t fsuid) { int rc; struct cifs_tcon *master_tcon = cifs_sb_master_tcon(cifs_sb); struct cifs_ses *ses; struct cifs_tcon *tcon = NULL; struct smb_vol *vol_info; vol_info = kzalloc(sizeof(*vol_info), GFP_KERNEL); if (vol_info == NULL) return ERR_PTR(-ENOMEM...
37,879,718,064,858,243,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,473
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_demultiplex_thread(void *p) { int length; struct TCP_Server_Info *server = p; unsigned int pdu_length; char *buf = NULL; struct task_struct *task_to_wake = NULL; struct mid_q_entry *mid_entry; current->flags |= PF_MEMALLOC; cifs_dbg(FYI, "Demultiplex PID: %d\n", task_pid_nr(current)); length = atomic_in...
75,303,953,759,112,400,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,474
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_echo_request(struct work_struct *work) { int rc; struct TCP_Server_Info *server = container_of(work, struct TCP_Server_Info, echo.work); /* * We cannot send an echo if it is disabled or until the * NEGOTIATE_PROTOCOL request is done, which is indicated by * server->ops->need_neg() == true. Also, no ...
98,722,264,580,553,520,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,475
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_find_smb_ses(struct TCP_Server_Info *server, struct smb_vol *vol) { struct cifs_ses *ses; spin_lock(&cifs_tcp_ses_lock); list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { if (!match_session(ses, vol)) continue; ++ses->ses_count; spin_unlock(&cifs_tcp_ses_lock); return ses; } spin_unl...
275,479,307,411,674,400,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,476
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_find_tcon(struct cifs_ses *ses, const char *unc) { struct list_head *tmp; struct cifs_tcon *tcon; spin_lock(&cifs_tcp_ses_lock); list_for_each(tmp, &ses->tcon_list) { tcon = list_entry(tmp, struct cifs_tcon, tcon_list); if (!match_tcon(tcon, unc)) continue; ++tcon->tc_count; spin_unlock(&cifs_tcp_s...
228,341,254,029,288,200,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,477
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_find_tcp_session(struct smb_vol *vol) { struct TCP_Server_Info *server; spin_lock(&cifs_tcp_ses_lock); list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) { if (!match_server(server, vol)) continue; ++server->srv_count; spin_unlock(&cifs_tcp_ses_lock); cifs_dbg(FYI, "Existing tcp session ...
189,215,106,719,159,700,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,478
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_get_tcon(struct cifs_ses *ses, struct smb_vol *volume_info) { int rc, xid; struct cifs_tcon *tcon; tcon = cifs_find_tcon(ses, volume_info->UNC); if (tcon) { cifs_dbg(FYI, "Found match on UNC path\n"); /* existing tcon already has a reference */ cifs_put_smb_ses(ses); if (tcon->seal != volume_info->sea...
205,415,770,773,450,200,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,479
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_get_tcp_session(struct smb_vol *volume_info) { struct TCP_Server_Info *tcp_ses = NULL; int rc; cifs_dbg(FYI, "UNC: %s\n", volume_info->UNC); /* see if we already have a matching tcp_ses */ tcp_ses = cifs_find_tcp_session(volume_info); if (tcp_ses) return tcp_ses; tcp_ses = kzalloc(sizeof(struct TCP_Ser...
217,309,458,170,589,400,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,480
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_get_volume_info(char *mount_data, const char *devname) { int rc; struct smb_vol *volume_info; volume_info = kmalloc(sizeof(struct smb_vol), GFP_KERNEL); if (!volume_info) return ERR_PTR(-ENOMEM); rc = cifs_setup_volume_info(volume_info, mount_data, devname); if (rc) { cifs_cleanup_volume_info(volume_in...
175,035,149,066,099,870,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,481
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_mount(struct cifs_sb_info *cifs_sb, struct smb_vol *volume_info) { int rc; unsigned int xid; struct cifs_ses *ses; struct cifs_tcon *tcon; struct TCP_Server_Info *server; char *full_path; struct tcon_link *tlink; #ifdef CONFIG_CIFS_DFS_UPCALL int referral_walks_count = 0; #endif rc = bdi_setup_and_regi...
252,197,799,283,281,800,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,482
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_negotiate_protocol(const unsigned int xid, struct cifs_ses *ses) { int rc = 0; struct TCP_Server_Info *server = ses->server; if (!server->ops->need_neg || !server->ops->negotiate) return -ENOSYS; /* only send once per connect */ if (!server->ops->need_neg(server)) return 0; set_credits(server, 1); r...
246,982,656,422,129,620,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,483
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_parse_cache_flavor(char *value, struct smb_vol *vol) { substring_t args[MAX_OPT_ARGS]; switch (match_token(value, cifs_cacheflavor_tokens, args)) { case Opt_cache_loose: vol->direct_io = false; vol->strict_io = false; break; case Opt_cache_strict: vol->direct_io = false; vol->strict_io = true; bre...
117,623,382,697,147,870,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,484
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_parse_devname(const char *devname, struct smb_vol *vol) { char *pos; const char *delims = "/\\"; size_t len; /* make sure we have a valid UNC double delimiter prefix */ len = strspn(devname, delims); if (len != 2) return -EINVAL; /* find delimiter between host and sharename */ pos = strpbrk(devname + 2...
301,796,668,641,140,840,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,485
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_parse_mount_options(const char *mountdata, const char *devname, struct smb_vol *vol) { char *data, *end; char *mountdata_copy = NULL, *options; unsigned int temp_len, i, j; char separator[2]; short int override_uid = -1; short int override_gid = -1; bool uid_specified = false; bool gid_specified = fal...
87,624,725,230,251,670,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,486
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static int cifs_parse_security_flavors(char *value, struct smb_vol *vol) { substring_t args[MAX_OPT_ARGS]; switch (match_token(value, cifs_secflavor_tokens, args)) { case Opt_sec_krb5: vol->secFlg |= CIFSSEC_MAY_KRB5 | CIFSSEC_MAY_SIGN; break; case Opt_sec_krb5i: vol->secFlg |= CIFSSEC_MAY_KRB5 |...
121,307,694,008,528,020,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,487
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_prune_tlinks(struct work_struct *work) { struct cifs_sb_info *cifs_sb = container_of(work, struct cifs_sb_info, prune_tlinks.work); struct rb_root *root = &cifs_sb->tlink_tree; struct rb_node *node = rb_first(root); struct rb_node *tmp; struct tcon_link *tlink; /* * Because we drop the spinlock ...
46,753,419,702,120,140,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,488
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_put_smb_ses(struct cifs_ses *ses) { unsigned int xid; struct TCP_Server_Info *server = ses->server; cifs_dbg(FYI, "%s: ses_count=%d\n", __func__, ses->ses_count); spin_lock(&cifs_tcp_ses_lock); if (--ses->ses_count > 0) { spin_unlock(&cifs_tcp_ses_lock); return; } list_del_init(&ses->smb_ses_list); s...
281,187,165,950,526,940,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,489
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_put_tcon(struct cifs_tcon *tcon) { unsigned int xid; struct cifs_ses *ses = tcon->ses; cifs_dbg(FYI, "%s: tc_count=%d\n", __func__, tcon->tc_count); spin_lock(&cifs_tcp_ses_lock); if (--tcon->tc_count > 0) { spin_unlock(&cifs_tcp_ses_lock); return; } list_del_init(&tcon->tcon_list); spin_unlock(&cifs...
54,728,181,308,557,830,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,490
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_read_from_socket(struct TCP_Server_Info *server, char *buf, unsigned int to_read) { struct kvec iov; iov.iov_base = buf; iov.iov_len = to_read; return cifs_readv_from_socket(server, &iov, 1, to_read); }
327,178,857,941,334,120,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,491
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig, unsigned int nr_segs, unsigned int to_read) { int length = 0; int total_read; unsigned int segs; struct msghdr smb_msg; struct kvec *iov; iov = get_server_iovec(server, nr_segs); if (!iov) return -ENOMEM; smb_msg.msg_cont...
124,941,894,574,633,250,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,492
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_reconnect(struct TCP_Server_Info *server) { int rc = 0; struct list_head *tmp, *tmp2; struct cifs_ses *ses; struct cifs_tcon *tcon; struct mid_q_entry *mid_entry; struct list_head retry_list; spin_lock(&GlobalMid_Lock); if (server->tcpStatus == CifsExiting) { /* the demux thread will exit normally nex...
329,285,455,399,676,630,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,493
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_set_cifscreds(struct smb_vol *vol, struct cifs_ses *ses) { int rc = 0; char *desc, *delim, *payload; ssize_t len; struct key *key; struct TCP_Server_Info *server = ses->server; struct sockaddr_in *sa; struct sockaddr_in6 *sa6; struct user_key_payload *upayload; desc = kmalloc(CIFSCREDS_DESC_SIZE, GFP_KER...
15,547,977,909,151,635,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,494
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_set_cifscreds(struct smb_vol *vol __attribute__((unused)), struct cifs_ses *ses __attribute__((unused))) { return -ENOSYS; }
76,242,017,937,950,965,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,495
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_set_vol_auth(struct smb_vol *vol, struct cifs_ses *ses) { switch (ses->server->secType) { case Kerberos: vol->secFlg = CIFSSEC_MUST_KRB5; return 0; case NTLMv2: vol->secFlg = CIFSSEC_MUST_NTLMV2; break; case NTLM: vol->secFlg = CIFSSEC_MUST_NTLM; break; case RawNTLMSSP: vol->secFlg = CIFSSEC_MUS...
97,994,488,566,918,390,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,496
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
void cifs_setup_cifs_sb(struct smb_vol *pvolume_info, struct cifs_sb_info *cifs_sb) { INIT_DELAYED_WORK(&cifs_sb->prune_tlinks, cifs_prune_tlinks); spin_lock_init(&cifs_sb->tlink_tree_lock); cifs_sb->tlink_tree = RB_ROOT; /* * Temporarily set r/wsize for matching superblock. If we end up using * new sb the...
270,206,530,544,909,540,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,497
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_setup_session(const unsigned int xid, struct cifs_ses *ses, struct nls_table *nls_info) { int rc = -ENOSYS; struct TCP_Server_Info *server = ses->server; ses->flags = 0; ses->capabilities = server->capabilities; if (linuxExtEnabled == 0) ses->capabilities &= (~server->vals->cap_unix); cifs_dbg(FYI, ...
45,866,652,168,395,050,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,498
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_setup_volume_info(struct smb_vol *volume_info, char *mount_data, const char *devname) { int rc = 0; if (cifs_parse_mount_options(mount_data, devname, volume_info)) return -EINVAL; if (volume_info->nullauth) { cifs_dbg(FYI, "Anonymous login\n"); kfree(volume_info->username); volume_info->username = ...
172,763,607,025,404,360,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,499
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cifs_umount(struct cifs_sb_info *cifs_sb) { struct rb_root *root = &cifs_sb->tlink_tree; struct rb_node *node; struct tcon_link *tlink; cancel_delayed_work_sync(&cifs_sb->prune_tlinks); spin_lock(&cifs_sb->tlink_tree_lock); while ((node = rb_first(root))) { tlink = rb_entry(node, struct tcon_link, tl_rbnode);...
188,622,846,125,458,100,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,500
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static void clean_demultiplex_info(struct TCP_Server_Info *server) { int length; /* take it off the list, if it's not already */ spin_lock(&cifs_tcp_ses_lock); list_del_init(&server->tcp_ses_list); spin_unlock(&cifs_tcp_ses_lock); spin_lock(&GlobalMid_Lock); server->tcpStatus = CifsExiting; spin_unlock(&Globa...
72,293,009,779,318,690,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,501
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
cleanup_volume_info_contents(struct smb_vol *volume_info) { kfree(volume_info->username); kzfree(volume_info->password); kfree(volume_info->UNC); kfree(volume_info->domainname); kfree(volume_info->iocharset); kfree(volume_info->prepath); }
44,803,110,148,099,350,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,502
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
compare_mount_options(struct super_block *sb, struct cifs_mnt_data *mnt_data) { struct cifs_sb_info *old = CIFS_SB(sb); struct cifs_sb_info *new = mnt_data->cifs_sb; if ((sb->s_flags & CIFS_MS_MASK) != (mnt_data->flags & CIFS_MS_MASK)) return 0; if ((old->mnt_cifs_flags & CIFS_MOUNT_MASK) != (new->mnt_cifs...
116,877,580,337,450,040,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,503
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
dequeue_mid(struct mid_q_entry *mid, bool malformed) { #ifdef CONFIG_CIFS_STATS2 mid->when_received = jiffies; #endif spin_lock(&GlobalMid_Lock); if (!malformed) mid->mid_state = MID_RESPONSE_RECEIVED; else mid->mid_state = MID_RESPONSE_MALFORMED; list_del_init(&mid->qhead); spin_unlock(&GlobalMid_Lock); }
183,118,807,515,289,500,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,504
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
expand_dfs_referral(const unsigned int xid, struct cifs_ses *ses, struct smb_vol *volume_info, struct cifs_sb_info *cifs_sb, int check_prefix) { int rc; unsigned int num_referrals = 0; struct dfs_info3_param *referrals = NULL; char *full_path = NULL, *ref_path = NULL, *mdata = NULL; full_path = build_...
319,348,785,942,085,700,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,505
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
generic_ip_connect(struct TCP_Server_Info *server) { int rc = 0; __be16 sport; int slen, sfamily; struct socket *socket = server->ssocket; struct sockaddr *saddr; saddr = (struct sockaddr *) &server->dstaddr; if (server->dstaddr.ss_family == AF_INET6) { sport = ((struct sockaddr_in6 *) saddr)->sin6_port; s...
207,365,209,136,874,870,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,506
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
get_dfs_path(const unsigned int xid, struct cifs_ses *ses, const char *old_path, const struct nls_table *nls_codepage, unsigned int *num_referrals, struct dfs_info3_param **referrals, int remap) { char *temp_unc; int rc = 0; if (!ses->server->ops->tree_connect || !ses->server->ops->get_dfs_refer) retu...
131,325,378,036,484,380,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,507
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static int get_option_gid(substring_t args[], kgid_t *result) { unsigned long value; kgid_t gid; int rc; rc = get_option_ul(args, &value); if (rc) return rc; gid = make_kgid(current_user_ns(), value); if (!gid_valid(gid)) return -EINVAL; *result = gid; return 0; }
232,360,682,234,610,160,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,508
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static int get_option_uid(substring_t args[], kuid_t *result) { unsigned long value; kuid_t uid; int rc; rc = get_option_ul(args, &value); if (rc) return rc; uid = make_kuid(current_user_ns(), value); if (!uid_valid(uid)) return -EINVAL; *result = uid; return 0; }
132,886,332,671,571,100,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,509
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static int get_option_ul(substring_t args[], unsigned long *option) { int rc; char *string; string = match_strdup(args); if (string == NULL) return -ENOMEM; rc = kstrtoul(string, 0, option); kfree(string); return rc; }
27,557,872,313,492,630,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,510
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
get_server_iovec(struct TCP_Server_Info *server, unsigned int nr_segs) { struct kvec *new_iov; if (server->iov && nr_segs <= server->nr_iov) return server->iov; /* not big enough -- allocate a new one and release the old */ new_iov = kmalloc(sizeof(*new_iov) * nr_segs, GFP_NOFS); if (new_iov) { kfree(server-...
101,545,933,717,182,560,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,511
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
ip_rfc1001_connect(struct TCP_Server_Info *server) { int rc = 0; /* * some servers require RFC1001 sessinit before sending * negprot - BB check reconnection in case where second * sessinit is sent but no second negprot */ struct rfc1002_session_packet *ses_init_buf; struct smb_hdr *smb_buf; ses_init_buf = ...
303,938,900,669,556,140,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,512
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
is_smb_response(struct TCP_Server_Info *server, unsigned char type) { /* * The first byte big endian of the length field, * is actually not part of the length but the type * with the most common, zero, as regular data. */ switch (type) { case RFC1002_SESSION_MESSAGE: /* Regular SMB response */ return tru...
305,305,385,825,358,960,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,513
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
kvec_array_init(struct kvec *new, struct kvec *iov, unsigned int nr_segs, size_t bytes) { size_t base = 0; while (bytes || !iov->iov_len) { int copy = min(bytes, iov->iov_len); bytes -= copy; base += copy; if (iov->iov_len == base) { iov++; nr_segs--; base = 0; } } memcpy(new, iov, sizeof(*io...
124,541,314,115,883,430,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,514
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
match_security(struct TCP_Server_Info *server, struct smb_vol *vol) { unsigned int secFlags; if (vol->secFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL))) secFlags = vol->secFlg; else secFlags = global_secflags | vol->secFlg; switch (server->secType) { case LANMAN: if (!(secFlags & (CIFSSEC_MAY_LANMAN|CIFS...
115,514,445,462,000,800,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,515
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static int match_server(struct TCP_Server_Info *server, struct smb_vol *vol) { struct sockaddr *addr = (struct sockaddr *)&vol->dstaddr; if ((server->vals != vol->vals) || (server->ops != vol->ops)) return 0; if (!net_eq(cifs_net_ns(server), current->nsproxy->net_ns)) return 0; if (!match_address(server, add...
185,414,540,265,367,300,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,516
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
static int match_tcon(struct cifs_tcon *tcon, const char *unc) { if (tcon->tidStatus == CifsExiting) return 0; if (strncmp(tcon->treeName, unc, MAX_TREE_SIZE)) return 0; return 1; }
321,339,968,992,023,800,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,517
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
void reset_cifs_unix_caps(unsigned int xid, struct cifs_tcon *tcon, struct cifs_sb_info *cifs_sb, struct smb_vol *vol_info) { /* if we are reconnecting then should we check to see if * any requested capabilities changed locally e.g. via * remount but we can not do much about it here * if they have (even if ...
193,025,600,253,927,370,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,518
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
server_unresponsive(struct TCP_Server_Info *server) { /* * We need to wait 2 echo intervals to make sure we handle such * situations right: * 1s client sends a normal SMB request * 2s client gets a response * 30s echo workqueue job pops, and decides we got a response recently * and don't need to send...
26,466,114,200,415,893,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,519
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
srcip_matches(struct sockaddr *srcaddr, struct sockaddr *rhs) { switch (srcaddr->sa_family) { case AF_UNSPEC: return (rhs->sa_family == AF_UNSPEC); case AF_INET: { struct sockaddr_in *saddr4 = (struct sockaddr_in *)srcaddr; struct sockaddr_in *vaddr4 = (struct sockaddr_in *)rhs; return (saddr4->sin_addr.s_ad...
261,680,443,508,462,960,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,520
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
standard_receive3(struct TCP_Server_Info *server, struct mid_q_entry *mid) { int length; char *buf = server->smallbuf; unsigned int pdu_length = get_rfc1002_length(buf); /* make sure this will fit in a large buffer */ if (pdu_length > CIFSMaxBufSize + MAX_HEADER_SIZE(server) - 4) { cifs_dbg(VFS, "SMB response t...
157,263,713,025,427,740,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,521
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink) { struct rb_node **new = &(root->rb_node), *parent = NULL; struct tcon_link *tlink; while (*new) { tlink = rb_entry(*new, struct tcon_link, tl_rbnode); parent = *new; if (uid_gt(tlink->tl_uid, new_tlink->tl_uid)) new = &((*new)->rb_left); ...
22,804,168,467,994,127,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,522
linux
1fc29bacedeabb278080e31bb9c1ecb49f143c3b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b
cifs: fix off-by-one bug in build_unc_path_to_root commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed the code such that the vol->prepath no longer contained a leading delimiter and then fixed up the places that accessed that field to account for that change. One spot in build_unc_path_to_root wa...
0
tlink_rb_search(struct rb_root *root, kuid_t uid) { struct rb_node *node = root->rb_node; struct tcon_link *tlink; while (node) { tlink = rb_entry(node, struct tcon_link, tl_rbnode); if (uid_gt(tlink->tl_uid, uid)) node = node->rb_left; else if (uid_lt(tlink->tl_uid, uid)) node = node->rb_right; else...
37,314,018,942,951,960,000,000,000,000,000,000,000
connect.c
88,857,981,430,770,820,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4247
Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length.
https://nvd.nist.gov/vuln/detail/CVE-2013-4247
31,523
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
convert(void) { int ch; char* mode = "w"; if (!checksignature()) return (-1); readscreen(); while ((ch = getc(infile)) != ';' && ch != EOF) { switch (ch) { case '\0': break; /* this kludge for non-standard files */ case ',': if (!readgifimage(mode)) ...
240,101,550,933,595,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,524
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
main(int argc, char* argv[]) { extern int optind; extern char *optarg; int c, status; while ((c = getopt(argc, argv, "c:r:")) != -1) switch (c) { case 'c': /* compression scheme */ if (!processCompressOptions(optarg)) usage(); break; case 'r': /* rows/strip */ ...
167,288,139,437,175,520,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,525
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
makegamtab(float gam) { int i; for(i=0; i<256; i++) gamtab[i] = (unsigned short) (IMAX*pow(i/255.0,gam)+0.5); }
6,528,170,758,346,197,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,526
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
processCompressOptions(char* opt) { if (streq(opt, "none")) compression = COMPRESSION_NONE; else if (streq(opt, "packbits")) compression = COMPRESSION_PACKBITS; else if (strneq(opt, "lzw", 3)) { char* cp = strchr(opt, ':'); if (cp) predictor = atoi(cp+1); compression = COMPRESSION_LZW; } else if (strne...
282,806,764,506,283,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,527
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
rasterize(int interleaved, char* mode) { register unsigned long row; unsigned char *newras; unsigned char *ras; TIFF *tif; tstrip_t strip; tsize_t stripsize; if ((newras = (unsigned char*) _TIFFmalloc(width*height+EXTRAFUDGE)) == NULL) { fprintf(stderr, "not enough memory for image\...
288,646,622,648,474,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,528
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
readextension(void) { int count; char buf[255]; (void) getc(infile); while ((count = getc(infile))) fread(buf, 1, count, infile); }
57,655,018,329,996,220,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,529
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
readgifimage(char* mode) { unsigned char buf[9]; int local, interleaved; unsigned char localmap[256][3]; int localbits; int status; if (fread(buf, 1, 9, infile) == 0) { perror(filename); return (0); } width = buf[4] + (buf[5] << 8); height = buf[6] + (buf[7] << 8); loca...
153,530,813,421,422,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244
31,530
libtiff
ce6841d9e41d621ba23cf18b190ee6a23b2cc833
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
fix possible OOB write in gif2tiff.c
0
readraster(void) { unsigned char *fill = raster; unsigned char buf[255]; register int bits=0; register unsigned long datum=0; register unsigned char *ch; register int count, code; int status = 1; datasize = getc(infile); if (datasize > 12) return 0; clear = 1 << datasize; e...
80,389,267,347,589,780,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4244