idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
31,373 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void *av_calloc(size_t nmemb, size_t size)
{
if (size <= 0 || nmemb >= INT_MAX / size)
return NULL;
return av_mallocz(nmemb * size);
}
| 73,931,316,537,730,210,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,374 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void *av_dynarray2_add(void **tab_ptr, int *nb_ptr, size_t elem_size,
const uint8_t *elem_data)
{
int nb = *nb_ptr, nb_alloc;
uint8_t *tab = *tab_ptr, *tab_elem_data;
if ((nb & (nb - 1)) == 0) {
if (nb == 0) {
nb_alloc = 1;
} else {
if (nb > IN... | 229,224,391,095,431,540,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,375 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void av_free(void *ptr)
{
#if CONFIG_MEMALIGN_HACK
if (ptr) {
int v= ((char *)ptr)[-1];
av_assert0(v>0 && v<=ALIGN);
free((char *)ptr - v);
}
#elif HAVE_ALIGNED_MALLOC
_aligned_free(ptr);
#else
free(ptr);
#endif
}
| 316,317,700,972,136,850,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,376 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void av_freep(void *arg)
{
void **ptr = (void **)arg;
av_free(*ptr);
*ptr = NULL;
}
| 204,816,723,401,239,500,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,377 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void *av_mallocz(size_t size)
{
void *ptr = av_malloc(size);
if (ptr)
memset(ptr, 0, size);
return ptr;
}
| 204,701,845,756,388,370,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,378 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void av_max_alloc(size_t max){
max_alloc_size = max;
}
| 76,470,962,091,985,620,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,379 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void av_memcpy_backptr(uint8_t *dst, int back, int cnt)
{
const uint8_t *src = &dst[-back];
if (!back)
return;
if (back == 1) {
memset(dst, *src, cnt);
} else if (back == 2) {
fill16(dst, cnt);
} else if (back == 3) {
fill24(dst, cnt);
} else if (back == 4) {
... | 228,379,531,914,557,760,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,380 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void *av_realloc_array(void *ptr, size_t nmemb, size_t size)
{
if (size <= 0 || nmemb >= INT_MAX / size)
return NULL;
return av_realloc(ptr, nmemb * size);
}
| 68,628,306,890,821,280,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,381 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | void *av_realloc_f(void *ptr, size_t nelem, size_t elsize)
{
size_t size;
void *r;
if (av_size_mult(elsize, nelem, &size)) {
av_free(ptr);
return NULL;
}
r = av_realloc(ptr, size);
if (!r && size)
av_free(ptr);
return r;
}
| 260,986,590,626,223,640,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,382 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | char *av_strdup(const char *s)
{
char *ptr = NULL;
if (s) {
int len = strlen(s) + 1;
ptr = av_malloc(len);
if (ptr)
memcpy(ptr, s, len);
}
return ptr;
}
| 261,108,317,235,161,450,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,383 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | static void fill16(uint8_t *dst, int len)
{
uint32_t v = AV_RN16(dst - 2);
v |= v << 16;
while (len >= 4) {
AV_WN32(dst, v);
dst += 4;
len -= 4;
}
while (len--) {
*dst = dst[-2];
dst++;
}
}
| 27,285,532,271,519,563,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,384 | FFmpeg | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | static void fill32(uint8_t *dst, int len)
{
uint32_t v = AV_RN32(dst - 4);
while (len >= 4) {
AV_WN32(dst, v);
dst += 4;
len -= 4;
}
while (len--) {
*dst = dst[-4];
dst++;
}
}
| 44,668,391,960,744,680,000,000,000,000,000,000,000 | mem.c | 148,629,479,801,131,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-4265 | The av_reallocp_array function in libavutil/mem.c in FFmpeg before 2.0.1 has an unspecified impact and remote vectors related to a "wrong return code" and a resultant NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2013-4265 |
31,385 | FFmpeg | 2960576378d17d71cc8dccc926352ce568b5eec1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1 | avcodec/g2meet: fix src pointer checks in kempf_decode_tile()
Fixes Ticket2842
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | static int g2m_decode_frame(AVCodecContext *avctx, void *data,
int *got_picture_ptr, AVPacket *avpkt)
{
const uint8_t *buf = avpkt->data;
int buf_size = avpkt->size;
G2MContext *c = avctx->priv_data;
AVFrame *pic = data;
GetByteContext bc, tbc;
int magic;
int got_... | 239,235,104,623,766,000,000,000,000,000,000,000,000 | g2meet.c | 321,002,839,552,375,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4264 | The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file. | https://nvd.nist.gov/vuln/detail/CVE-2013-4264 |
31,386 | FFmpeg | 2960576378d17d71cc8dccc926352ce568b5eec1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1 | avcodec/g2meet: fix src pointer checks in kempf_decode_tile()
Fixes Ticket2842
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | static int g2m_load_cursor(AVCodecContext *avctx, G2MContext *c,
GetByteContext *gb)
{
int i, j, k;
uint8_t *dst;
uint32_t bits;
uint32_t cur_size, cursor_w, cursor_h, cursor_stride;
uint32_t cursor_hot_x, cursor_hot_y;
int cursor_fmt;
uint8_t *tmp;
cur_size ... | 290,073,089,199,679,000,000,000,000,000,000,000,000 | g2meet.c | 321,002,839,552,375,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4264 | The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file. | https://nvd.nist.gov/vuln/detail/CVE-2013-4264 |
31,445 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | __hw_perf_event_init(struct perf_event *event)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
struct hw_perf_event *hwc = &event->hw;
int mapping;
mapping = armpmu->map_event(event);
if (mapping < 0) {
pr_debug("event %x:%llx not supported\n", event->attr.type,
event->attr.config);
return mapping;
}... | 204,343,799,603,581,020,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,446 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_add(struct perf_event *event, int flags)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
struct pmu_hw_events *hw_events = armpmu->get_hw_events();
struct hw_perf_event *hwc = &event->hw;
int idx;
int err = 0;
perf_pmu_disable(event->pmu);
/* If we don't have a space for the counter then finish early... | 264,403,113,501,186,730,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,447 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_del(struct perf_event *event, int flags)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
struct pmu_hw_events *hw_events = armpmu->get_hw_events();
struct hw_perf_event *hwc = &event->hw;
int idx = hwc->idx;
armpmu_stop(event, PERF_EF_UPDATE);
hw_events->events[idx] = NULL;
clear_bit(idx, hw_events->u... | 230,965,153,984,908,830,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,448 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | static void armpmu_disable(struct pmu *pmu)
{
struct arm_pmu *armpmu = to_arm_pmu(pmu);
armpmu->stop(armpmu);
}
| 94,908,960,613,654,080,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,449 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | static int armpmu_event_init(struct perf_event *event)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
int err = 0;
atomic_t *active_events = &armpmu->active_events;
/* does not support taken branch sampling */
if (has_branch_stack(event))
return -EOPNOTSUPP;
if (armpmu->map_event(event) == -ENOENT)
retu... | 61,227,609,584,860,330,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,450 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | int armpmu_event_set_period(struct perf_event *event)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
struct hw_perf_event *hwc = &event->hw;
s64 left = local64_read(&hwc->period_left);
s64 period = hwc->sample_period;
int ret = 0;
/* The period may have been changed by PERF_EVENT_IOC_PERIOD */
if (unlikely(... | 302,791,694,225,658,120,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,451 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | u64 armpmu_event_update(struct perf_event *event)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
struct hw_perf_event *hwc = &event->hw;
u64 delta, prev_raw_count, new_raw_count;
again:
prev_raw_count = local64_read(&hwc->prev_count);
new_raw_count = armpmu->read_counter(event);
if (local64_cmpxchg(&hwc->pr... | 280,606,800,305,268,100,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,452 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_map_cache_event(const unsigned (*cache_map)
[PERF_COUNT_HW_CACHE_MAX]
[PERF_COUNT_HW_CACHE_OP_MAX]
[PERF_COUNT_HW_CACHE_RESULT_MAX],
u64 config)
{
unsigned int cache_type, cache_op, cache_result, ret;
cache_type = (config >> 0) & 0xff;
if (cache_type >= PERF_COUNT_HW_C... | 216,335,945,893,261,100,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,453 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_map_event(struct perf_event *event,
const unsigned (*event_map)[PERF_COUNT_HW_MAX],
const unsigned (*cache_map)
[PERF_COUNT_HW_CACHE_MAX]
[PERF_COUNT_HW_CACHE_OP_MAX]
[PERF_COUNT_HW_CACHE_RESULT_MAX],
u32 raw_event_mask)
{
u64 config = event->attr.config;
switch (event->attr.type) {
case... | 325,170,722,107,145,300,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,454 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_map_hw_event(const unsigned (*event_map)[PERF_COUNT_HW_MAX], u64 config)
{
int mapping = (*event_map)[config];
return mapping == HW_OP_UNSUPPORTED ? -ENOENT : mapping;
}
| 302,278,201,978,317,060,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,455 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_map_raw_event(u32 raw_event_mask, u64 config)
{
return (int)(config & raw_event_mask);
}
| 149,397,798,105,071,500,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,456 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_read(struct perf_event *event)
{
armpmu_event_update(event);
}
| 181,565,352,332,657,970,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,457 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_release_hardware(struct arm_pmu *armpmu)
{
armpmu->free_irq(armpmu);
pm_runtime_put_sync(&armpmu->plat_device->dev);
}
| 213,392,183,232,795,600,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,458 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_reserve_hardware(struct arm_pmu *armpmu)
{
int err;
struct platform_device *pmu_device = armpmu->plat_device;
if (!pmu_device)
return -ENODEV;
pm_runtime_get_sync(&pmu_device->dev);
err = armpmu->request_irq(armpmu, armpmu_dispatch_irq);
if (err) {
armpmu_release_hardware(armpmu);
return err;
}
... | 300,409,862,583,178,500,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,459 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | static int armpmu_runtime_resume(struct device *dev)
{
struct arm_pmu_platdata *plat = dev_get_platdata(dev);
if (plat && plat->runtime_resume)
return plat->runtime_resume(dev);
return 0;
}
| 192,515,067,933,915,170,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,460 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | static int armpmu_runtime_suspend(struct device *dev)
{
struct arm_pmu_platdata *plat = dev_get_platdata(dev);
if (plat && plat->runtime_suspend)
return plat->runtime_suspend(dev);
return 0;
}
| 312,794,436,804,896,200,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,461 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | armpmu_stop(struct perf_event *event, int flags)
{
struct arm_pmu *armpmu = to_arm_pmu(event->pmu);
struct hw_perf_event *hwc = &event->hw;
/*
* ARM pmu always has to update the counter, so ignore
* PERF_EF_UPDATE, see comments in armpmu_start().
*/
if (!(hwc->state & PERF_HES_STOPPED)) {
armpmu->disable(e... | 194,705,686,130,236,300,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,462 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | callchain_trace(struct stackframe *fr,
void *data)
{
struct perf_callchain_entry *entry = data;
perf_callchain_store(entry, fr->pc);
return 0;
}
| 153,737,435,260,795,870,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,463 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | event_requires_mode_exclusion(struct perf_event_attr *attr)
{
return attr->exclude_idle || attr->exclude_user ||
attr->exclude_kernel || attr->exclude_hv;
}
| 321,685,399,829,015,980,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,464 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | perf_callchain_kernel(struct perf_callchain_entry *entry, struct pt_regs *regs)
{
struct stackframe fr;
if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) {
/* We don't support guest os callchain now */
return;
}
fr.fp = regs->ARM_fp;
fr.sp = regs->ARM_sp;
fr.lr = regs->ARM_lr;
fr.pc = regs->ARM_pc;
wal... | 300,983,512,488,592,440,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,465 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | perf_callchain_user(struct perf_callchain_entry *entry, struct pt_regs *regs)
{
struct frame_tail __user *tail;
if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) {
/* We don't support guest os callchain now */
return;
}
perf_callchain_store(entry, regs->ARM_pc);
tail = (struct frame_tail __user *)regs->AR... | 187,769,852,586,772,960,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,466 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | unsigned long perf_instruction_pointer(struct pt_regs *regs)
{
if (perf_guest_cbs && perf_guest_cbs->is_in_guest())
return perf_guest_cbs->get_guest_ip();
return instruction_pointer(regs);
}
| 331,789,658,745,327,860,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,467 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | unsigned long perf_misc_flags(struct pt_regs *regs)
{
int misc = 0;
if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) {
if (perf_guest_cbs->is_user_mode())
misc |= PERF_RECORD_MISC_GUEST_USER;
else
misc |= PERF_RECORD_MISC_GUEST_KERNEL;
} else {
if (user_mode(regs))
misc |= PERF_RECORD_MISC_USER;
... | 16,564,419,510,143,098,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,468 | linux | c95eb3184ea1a3a2551df57190c81da695e2144b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c95eb3184ea1a3a2551df57190c81da695e2144b | ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | 0 | user_backtrace(struct frame_tail __user *tail,
struct perf_callchain_entry *entry)
{
struct frame_tail buftail;
/* Also check accessibility of one struct frame_tail beyond */
if (!access_ok(VERIFY_READ, tail, sizeof(buftail)))
return NULL;
if (__copy_from_user_inatomic(&buftail, tail, sizeof(buftail)))
... | 277,282,437,837,967,240,000,000,000,000,000,000,000 | perf_event.c | 260,167,828,169,172,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4254 | The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. | https://nvd.nist.gov/vuln/detail/CVE-2013-4254 |
31,469 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | allocate_buffers(struct TCP_Server_Info *server)
{
if (!server->bigbuf) {
server->bigbuf = (char *)cifs_buf_get();
if (!server->bigbuf) {
cifs_dbg(VFS, "No memory for large SMB response\n");
msleep(3000);
/* retry will check if exiting */
return false;
}
} else if (server->large_buf) {
/* we are r... | 336,904,385,786,951,160,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,470 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | bind_socket(struct TCP_Server_Info *server)
{
int rc = 0;
if (server->srcaddr.ss_family != AF_UNSPEC) {
/* Bind to the specified local IP address */
struct socket *socket = server->ssocket;
rc = socket->ops->bind(socket,
(struct sockaddr *) &server->srcaddr,
sizeof(server->srcaddr));
if ... | 136,175,094,959,194,580,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,471 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_cleanup_volume_info(struct smb_vol *volume_info)
{
if (!volume_info)
return;
cleanup_volume_info_contents(volume_info);
kfree(volume_info);
}
| 60,607,316,440,321,695,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,472 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_construct_tcon(struct cifs_sb_info *cifs_sb, kuid_t fsuid)
{
int rc;
struct cifs_tcon *master_tcon = cifs_sb_master_tcon(cifs_sb);
struct cifs_ses *ses;
struct cifs_tcon *tcon = NULL;
struct smb_vol *vol_info;
vol_info = kzalloc(sizeof(*vol_info), GFP_KERNEL);
if (vol_info == NULL)
return ERR_PTR(-ENOMEM... | 37,879,718,064,858,243,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,473 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_demultiplex_thread(void *p)
{
int length;
struct TCP_Server_Info *server = p;
unsigned int pdu_length;
char *buf = NULL;
struct task_struct *task_to_wake = NULL;
struct mid_q_entry *mid_entry;
current->flags |= PF_MEMALLOC;
cifs_dbg(FYI, "Demultiplex PID: %d\n", task_pid_nr(current));
length = atomic_in... | 75,303,953,759,112,400,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,474 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_echo_request(struct work_struct *work)
{
int rc;
struct TCP_Server_Info *server = container_of(work,
struct TCP_Server_Info, echo.work);
/*
* We cannot send an echo if it is disabled or until the
* NEGOTIATE_PROTOCOL request is done, which is indicated by
* server->ops->need_neg() == true. Also, no ... | 98,722,264,580,553,520,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,475 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_find_smb_ses(struct TCP_Server_Info *server, struct smb_vol *vol)
{
struct cifs_ses *ses;
spin_lock(&cifs_tcp_ses_lock);
list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
if (!match_session(ses, vol))
continue;
++ses->ses_count;
spin_unlock(&cifs_tcp_ses_lock);
return ses;
}
spin_unl... | 275,479,307,411,674,400,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,476 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_find_tcon(struct cifs_ses *ses, const char *unc)
{
struct list_head *tmp;
struct cifs_tcon *tcon;
spin_lock(&cifs_tcp_ses_lock);
list_for_each(tmp, &ses->tcon_list) {
tcon = list_entry(tmp, struct cifs_tcon, tcon_list);
if (!match_tcon(tcon, unc))
continue;
++tcon->tc_count;
spin_unlock(&cifs_tcp_s... | 228,341,254,029,288,200,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,477 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_find_tcp_session(struct smb_vol *vol)
{
struct TCP_Server_Info *server;
spin_lock(&cifs_tcp_ses_lock);
list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) {
if (!match_server(server, vol))
continue;
++server->srv_count;
spin_unlock(&cifs_tcp_ses_lock);
cifs_dbg(FYI, "Existing tcp session ... | 189,215,106,719,159,700,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,478 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_get_tcon(struct cifs_ses *ses, struct smb_vol *volume_info)
{
int rc, xid;
struct cifs_tcon *tcon;
tcon = cifs_find_tcon(ses, volume_info->UNC);
if (tcon) {
cifs_dbg(FYI, "Found match on UNC path\n");
/* existing tcon already has a reference */
cifs_put_smb_ses(ses);
if (tcon->seal != volume_info->sea... | 205,415,770,773,450,200,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,479 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_get_tcp_session(struct smb_vol *volume_info)
{
struct TCP_Server_Info *tcp_ses = NULL;
int rc;
cifs_dbg(FYI, "UNC: %s\n", volume_info->UNC);
/* see if we already have a matching tcp_ses */
tcp_ses = cifs_find_tcp_session(volume_info);
if (tcp_ses)
return tcp_ses;
tcp_ses = kzalloc(sizeof(struct TCP_Ser... | 217,309,458,170,589,400,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,480 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_get_volume_info(char *mount_data, const char *devname)
{
int rc;
struct smb_vol *volume_info;
volume_info = kmalloc(sizeof(struct smb_vol), GFP_KERNEL);
if (!volume_info)
return ERR_PTR(-ENOMEM);
rc = cifs_setup_volume_info(volume_info, mount_data, devname);
if (rc) {
cifs_cleanup_volume_info(volume_in... | 175,035,149,066,099,870,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,481 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_mount(struct cifs_sb_info *cifs_sb, struct smb_vol *volume_info)
{
int rc;
unsigned int xid;
struct cifs_ses *ses;
struct cifs_tcon *tcon;
struct TCP_Server_Info *server;
char *full_path;
struct tcon_link *tlink;
#ifdef CONFIG_CIFS_DFS_UPCALL
int referral_walks_count = 0;
#endif
rc = bdi_setup_and_regi... | 252,197,799,283,281,800,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,482 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_negotiate_protocol(const unsigned int xid, struct cifs_ses *ses)
{
int rc = 0;
struct TCP_Server_Info *server = ses->server;
if (!server->ops->need_neg || !server->ops->negotiate)
return -ENOSYS;
/* only send once per connect */
if (!server->ops->need_neg(server))
return 0;
set_credits(server, 1);
r... | 246,982,656,422,129,620,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,483 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_parse_cache_flavor(char *value, struct smb_vol *vol)
{
substring_t args[MAX_OPT_ARGS];
switch (match_token(value, cifs_cacheflavor_tokens, args)) {
case Opt_cache_loose:
vol->direct_io = false;
vol->strict_io = false;
break;
case Opt_cache_strict:
vol->direct_io = false;
vol->strict_io = true;
bre... | 117,623,382,697,147,870,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,484 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_parse_devname(const char *devname, struct smb_vol *vol)
{
char *pos;
const char *delims = "/\\";
size_t len;
/* make sure we have a valid UNC double delimiter prefix */
len = strspn(devname, delims);
if (len != 2)
return -EINVAL;
/* find delimiter between host and sharename */
pos = strpbrk(devname + 2... | 301,796,668,641,140,840,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,485 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_parse_mount_options(const char *mountdata, const char *devname,
struct smb_vol *vol)
{
char *data, *end;
char *mountdata_copy = NULL, *options;
unsigned int temp_len, i, j;
char separator[2];
short int override_uid = -1;
short int override_gid = -1;
bool uid_specified = false;
bool gid_specified = fal... | 87,624,725,230,251,670,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,486 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static int cifs_parse_security_flavors(char *value,
struct smb_vol *vol)
{
substring_t args[MAX_OPT_ARGS];
switch (match_token(value, cifs_secflavor_tokens, args)) {
case Opt_sec_krb5:
vol->secFlg |= CIFSSEC_MAY_KRB5 | CIFSSEC_MAY_SIGN;
break;
case Opt_sec_krb5i:
vol->secFlg |= CIFSSEC_MAY_KRB5 |... | 121,307,694,008,528,020,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,487 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_prune_tlinks(struct work_struct *work)
{
struct cifs_sb_info *cifs_sb = container_of(work, struct cifs_sb_info,
prune_tlinks.work);
struct rb_root *root = &cifs_sb->tlink_tree;
struct rb_node *node = rb_first(root);
struct rb_node *tmp;
struct tcon_link *tlink;
/*
* Because we drop the spinlock ... | 46,753,419,702,120,140,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,488 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_put_smb_ses(struct cifs_ses *ses)
{
unsigned int xid;
struct TCP_Server_Info *server = ses->server;
cifs_dbg(FYI, "%s: ses_count=%d\n", __func__, ses->ses_count);
spin_lock(&cifs_tcp_ses_lock);
if (--ses->ses_count > 0) {
spin_unlock(&cifs_tcp_ses_lock);
return;
}
list_del_init(&ses->smb_ses_list);
s... | 281,187,165,950,526,940,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,489 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_put_tcon(struct cifs_tcon *tcon)
{
unsigned int xid;
struct cifs_ses *ses = tcon->ses;
cifs_dbg(FYI, "%s: tc_count=%d\n", __func__, tcon->tc_count);
spin_lock(&cifs_tcp_ses_lock);
if (--tcon->tc_count > 0) {
spin_unlock(&cifs_tcp_ses_lock);
return;
}
list_del_init(&tcon->tcon_list);
spin_unlock(&cifs... | 54,728,181,308,557,830,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,490 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
unsigned int to_read)
{
struct kvec iov;
iov.iov_base = buf;
iov.iov_len = to_read;
return cifs_readv_from_socket(server, &iov, 1, to_read);
}
| 327,178,857,941,334,120,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,491 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
unsigned int nr_segs, unsigned int to_read)
{
int length = 0;
int total_read;
unsigned int segs;
struct msghdr smb_msg;
struct kvec *iov;
iov = get_server_iovec(server, nr_segs);
if (!iov)
return -ENOMEM;
smb_msg.msg_cont... | 124,941,894,574,633,250,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,492 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_reconnect(struct TCP_Server_Info *server)
{
int rc = 0;
struct list_head *tmp, *tmp2;
struct cifs_ses *ses;
struct cifs_tcon *tcon;
struct mid_q_entry *mid_entry;
struct list_head retry_list;
spin_lock(&GlobalMid_Lock);
if (server->tcpStatus == CifsExiting) {
/* the demux thread will exit normally
nex... | 329,285,455,399,676,630,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,493 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_set_cifscreds(struct smb_vol *vol, struct cifs_ses *ses)
{
int rc = 0;
char *desc, *delim, *payload;
ssize_t len;
struct key *key;
struct TCP_Server_Info *server = ses->server;
struct sockaddr_in *sa;
struct sockaddr_in6 *sa6;
struct user_key_payload *upayload;
desc = kmalloc(CIFSCREDS_DESC_SIZE, GFP_KER... | 15,547,977,909,151,635,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,494 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_set_cifscreds(struct smb_vol *vol __attribute__((unused)),
struct cifs_ses *ses __attribute__((unused)))
{
return -ENOSYS;
}
| 76,242,017,937,950,965,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,495 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_set_vol_auth(struct smb_vol *vol, struct cifs_ses *ses)
{
switch (ses->server->secType) {
case Kerberos:
vol->secFlg = CIFSSEC_MUST_KRB5;
return 0;
case NTLMv2:
vol->secFlg = CIFSSEC_MUST_NTLMV2;
break;
case NTLM:
vol->secFlg = CIFSSEC_MUST_NTLM;
break;
case RawNTLMSSP:
vol->secFlg = CIFSSEC_MUS... | 97,994,488,566,918,390,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,496 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | void cifs_setup_cifs_sb(struct smb_vol *pvolume_info,
struct cifs_sb_info *cifs_sb)
{
INIT_DELAYED_WORK(&cifs_sb->prune_tlinks, cifs_prune_tlinks);
spin_lock_init(&cifs_sb->tlink_tree_lock);
cifs_sb->tlink_tree = RB_ROOT;
/*
* Temporarily set r/wsize for matching superblock. If we end up using
* new sb the... | 270,206,530,544,909,540,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,497 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_setup_session(const unsigned int xid, struct cifs_ses *ses,
struct nls_table *nls_info)
{
int rc = -ENOSYS;
struct TCP_Server_Info *server = ses->server;
ses->flags = 0;
ses->capabilities = server->capabilities;
if (linuxExtEnabled == 0)
ses->capabilities &= (~server->vals->cap_unix);
cifs_dbg(FYI, ... | 45,866,652,168,395,050,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,498 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_setup_volume_info(struct smb_vol *volume_info, char *mount_data,
const char *devname)
{
int rc = 0;
if (cifs_parse_mount_options(mount_data, devname, volume_info))
return -EINVAL;
if (volume_info->nullauth) {
cifs_dbg(FYI, "Anonymous login\n");
kfree(volume_info->username);
volume_info->username = ... | 172,763,607,025,404,360,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,499 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cifs_umount(struct cifs_sb_info *cifs_sb)
{
struct rb_root *root = &cifs_sb->tlink_tree;
struct rb_node *node;
struct tcon_link *tlink;
cancel_delayed_work_sync(&cifs_sb->prune_tlinks);
spin_lock(&cifs_sb->tlink_tree_lock);
while ((node = rb_first(root))) {
tlink = rb_entry(node, struct tcon_link, tl_rbnode);... | 188,622,846,125,458,100,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,500 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static void clean_demultiplex_info(struct TCP_Server_Info *server)
{
int length;
/* take it off the list, if it's not already */
spin_lock(&cifs_tcp_ses_lock);
list_del_init(&server->tcp_ses_list);
spin_unlock(&cifs_tcp_ses_lock);
spin_lock(&GlobalMid_Lock);
server->tcpStatus = CifsExiting;
spin_unlock(&Globa... | 72,293,009,779,318,690,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,501 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | cleanup_volume_info_contents(struct smb_vol *volume_info)
{
kfree(volume_info->username);
kzfree(volume_info->password);
kfree(volume_info->UNC);
kfree(volume_info->domainname);
kfree(volume_info->iocharset);
kfree(volume_info->prepath);
}
| 44,803,110,148,099,350,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,502 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | compare_mount_options(struct super_block *sb, struct cifs_mnt_data *mnt_data)
{
struct cifs_sb_info *old = CIFS_SB(sb);
struct cifs_sb_info *new = mnt_data->cifs_sb;
if ((sb->s_flags & CIFS_MS_MASK) != (mnt_data->flags & CIFS_MS_MASK))
return 0;
if ((old->mnt_cifs_flags & CIFS_MOUNT_MASK) !=
(new->mnt_cifs... | 116,877,580,337,450,040,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,503 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | dequeue_mid(struct mid_q_entry *mid, bool malformed)
{
#ifdef CONFIG_CIFS_STATS2
mid->when_received = jiffies;
#endif
spin_lock(&GlobalMid_Lock);
if (!malformed)
mid->mid_state = MID_RESPONSE_RECEIVED;
else
mid->mid_state = MID_RESPONSE_MALFORMED;
list_del_init(&mid->qhead);
spin_unlock(&GlobalMid_Lock);
}
| 183,118,807,515,289,500,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,504 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | expand_dfs_referral(const unsigned int xid, struct cifs_ses *ses,
struct smb_vol *volume_info, struct cifs_sb_info *cifs_sb,
int check_prefix)
{
int rc;
unsigned int num_referrals = 0;
struct dfs_info3_param *referrals = NULL;
char *full_path = NULL, *ref_path = NULL, *mdata = NULL;
full_path = build_... | 319,348,785,942,085,700,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,505 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | generic_ip_connect(struct TCP_Server_Info *server)
{
int rc = 0;
__be16 sport;
int slen, sfamily;
struct socket *socket = server->ssocket;
struct sockaddr *saddr;
saddr = (struct sockaddr *) &server->dstaddr;
if (server->dstaddr.ss_family == AF_INET6) {
sport = ((struct sockaddr_in6 *) saddr)->sin6_port;
s... | 207,365,209,136,874,870,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,506 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | get_dfs_path(const unsigned int xid, struct cifs_ses *ses, const char *old_path,
const struct nls_table *nls_codepage, unsigned int *num_referrals,
struct dfs_info3_param **referrals, int remap)
{
char *temp_unc;
int rc = 0;
if (!ses->server->ops->tree_connect || !ses->server->ops->get_dfs_refer)
retu... | 131,325,378,036,484,380,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,507 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static int get_option_gid(substring_t args[], kgid_t *result)
{
unsigned long value;
kgid_t gid;
int rc;
rc = get_option_ul(args, &value);
if (rc)
return rc;
gid = make_kgid(current_user_ns(), value);
if (!gid_valid(gid))
return -EINVAL;
*result = gid;
return 0;
}
| 232,360,682,234,610,160,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,508 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static int get_option_uid(substring_t args[], kuid_t *result)
{
unsigned long value;
kuid_t uid;
int rc;
rc = get_option_ul(args, &value);
if (rc)
return rc;
uid = make_kuid(current_user_ns(), value);
if (!uid_valid(uid))
return -EINVAL;
*result = uid;
return 0;
}
| 132,886,332,671,571,100,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,509 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static int get_option_ul(substring_t args[], unsigned long *option)
{
int rc;
char *string;
string = match_strdup(args);
if (string == NULL)
return -ENOMEM;
rc = kstrtoul(string, 0, option);
kfree(string);
return rc;
}
| 27,557,872,313,492,630,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,510 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | get_server_iovec(struct TCP_Server_Info *server, unsigned int nr_segs)
{
struct kvec *new_iov;
if (server->iov && nr_segs <= server->nr_iov)
return server->iov;
/* not big enough -- allocate a new one and release the old */
new_iov = kmalloc(sizeof(*new_iov) * nr_segs, GFP_NOFS);
if (new_iov) {
kfree(server-... | 101,545,933,717,182,560,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,511 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | ip_rfc1001_connect(struct TCP_Server_Info *server)
{
int rc = 0;
/*
* some servers require RFC1001 sessinit before sending
* negprot - BB check reconnection in case where second
* sessinit is sent but no second negprot
*/
struct rfc1002_session_packet *ses_init_buf;
struct smb_hdr *smb_buf;
ses_init_buf = ... | 303,938,900,669,556,140,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,512 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | is_smb_response(struct TCP_Server_Info *server, unsigned char type)
{
/*
* The first byte big endian of the length field,
* is actually not part of the length but the type
* with the most common, zero, as regular data.
*/
switch (type) {
case RFC1002_SESSION_MESSAGE:
/* Regular SMB response */
return tru... | 305,305,385,825,358,960,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,513 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | kvec_array_init(struct kvec *new, struct kvec *iov, unsigned int nr_segs,
size_t bytes)
{
size_t base = 0;
while (bytes || !iov->iov_len) {
int copy = min(bytes, iov->iov_len);
bytes -= copy;
base += copy;
if (iov->iov_len == base) {
iov++;
nr_segs--;
base = 0;
}
}
memcpy(new, iov, sizeof(*io... | 124,541,314,115,883,430,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,514 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | match_security(struct TCP_Server_Info *server, struct smb_vol *vol)
{
unsigned int secFlags;
if (vol->secFlg & (~(CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL)))
secFlags = vol->secFlg;
else
secFlags = global_secflags | vol->secFlg;
switch (server->secType) {
case LANMAN:
if (!(secFlags & (CIFSSEC_MAY_LANMAN|CIFS... | 115,514,445,462,000,800,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,515 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static int match_server(struct TCP_Server_Info *server, struct smb_vol *vol)
{
struct sockaddr *addr = (struct sockaddr *)&vol->dstaddr;
if ((server->vals != vol->vals) || (server->ops != vol->ops))
return 0;
if (!net_eq(cifs_net_ns(server), current->nsproxy->net_ns))
return 0;
if (!match_address(server, add... | 185,414,540,265,367,300,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,516 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | static int match_tcon(struct cifs_tcon *tcon, const char *unc)
{
if (tcon->tidStatus == CifsExiting)
return 0;
if (strncmp(tcon->treeName, unc, MAX_TREE_SIZE))
return 0;
return 1;
}
| 321,339,968,992,023,800,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,517 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | void reset_cifs_unix_caps(unsigned int xid, struct cifs_tcon *tcon,
struct cifs_sb_info *cifs_sb, struct smb_vol *vol_info)
{
/* if we are reconnecting then should we check to see if
* any requested capabilities changed locally e.g. via
* remount but we can not do much about it here
* if they have (even if ... | 193,025,600,253,927,370,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,518 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | server_unresponsive(struct TCP_Server_Info *server)
{
/*
* We need to wait 2 echo intervals to make sure we handle such
* situations right:
* 1s client sends a normal SMB request
* 2s client gets a response
* 30s echo workqueue job pops, and decides we got a response recently
* and don't need to send... | 26,466,114,200,415,893,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,519 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | srcip_matches(struct sockaddr *srcaddr, struct sockaddr *rhs)
{
switch (srcaddr->sa_family) {
case AF_UNSPEC:
return (rhs->sa_family == AF_UNSPEC);
case AF_INET: {
struct sockaddr_in *saddr4 = (struct sockaddr_in *)srcaddr;
struct sockaddr_in *vaddr4 = (struct sockaddr_in *)rhs;
return (saddr4->sin_addr.s_ad... | 261,680,443,508,462,960,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,520 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | standard_receive3(struct TCP_Server_Info *server, struct mid_q_entry *mid)
{
int length;
char *buf = server->smallbuf;
unsigned int pdu_length = get_rfc1002_length(buf);
/* make sure this will fit in a large buffer */
if (pdu_length > CIFSMaxBufSize + MAX_HEADER_SIZE(server) - 4) {
cifs_dbg(VFS, "SMB response t... | 157,263,713,025,427,740,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,521 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink)
{
struct rb_node **new = &(root->rb_node), *parent = NULL;
struct tcon_link *tlink;
while (*new) {
tlink = rb_entry(*new, struct tcon_link, tl_rbnode);
parent = *new;
if (uid_gt(tlink->tl_uid, new_tlink->tl_uid))
new = &((*new)->rb_left);
... | 22,804,168,467,994,127,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,522 | linux | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fc29bacedeabb278080e31bb9c1ecb49f143c3b | cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 0 | tlink_rb_search(struct rb_root *root, kuid_t uid)
{
struct rb_node *node = root->rb_node;
struct tcon_link *tlink;
while (node) {
tlink = rb_entry(node, struct tcon_link, tl_rbnode);
if (uid_gt(tlink->tl_uid, uid))
node = node->rb_left;
else if (uid_lt(tlink->tl_uid, uid))
node = node->rb_right;
else... | 37,314,018,942,951,960,000,000,000,000,000,000,000 | connect.c | 88,857,981,430,770,820,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4247 | Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. | https://nvd.nist.gov/vuln/detail/CVE-2013-4247 |
31,523 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | convert(void)
{
int ch;
char* mode = "w";
if (!checksignature())
return (-1);
readscreen();
while ((ch = getc(infile)) != ';' && ch != EOF) {
switch (ch) {
case '\0': break; /* this kludge for non-standard files */
case ',': if (!readgifimage(mode))
... | 240,101,550,933,595,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,524 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | main(int argc, char* argv[])
{
extern int optind;
extern char *optarg;
int c, status;
while ((c = getopt(argc, argv, "c:r:")) != -1)
switch (c) {
case 'c': /* compression scheme */
if (!processCompressOptions(optarg))
usage();
break;
case 'r': /* rows/strip */
... | 167,288,139,437,175,520,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,525 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | makegamtab(float gam)
{
int i;
for(i=0; i<256; i++)
gamtab[i] = (unsigned short) (IMAX*pow(i/255.0,gam)+0.5);
}
| 6,528,170,758,346,197,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,526 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | processCompressOptions(char* opt)
{
if (streq(opt, "none"))
compression = COMPRESSION_NONE;
else if (streq(opt, "packbits"))
compression = COMPRESSION_PACKBITS;
else if (strneq(opt, "lzw", 3)) {
char* cp = strchr(opt, ':');
if (cp)
predictor = atoi(cp+1);
compression = COMPRESSION_LZW;
} else if (strne... | 282,806,764,506,283,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,527 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | rasterize(int interleaved, char* mode)
{
register unsigned long row;
unsigned char *newras;
unsigned char *ras;
TIFF *tif;
tstrip_t strip;
tsize_t stripsize;
if ((newras = (unsigned char*) _TIFFmalloc(width*height+EXTRAFUDGE)) == NULL) {
fprintf(stderr, "not enough memory for image\... | 288,646,622,648,474,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,528 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | readextension(void)
{
int count;
char buf[255];
(void) getc(infile);
while ((count = getc(infile)))
fread(buf, 1, count, infile);
}
| 57,655,018,329,996,220,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,529 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | readgifimage(char* mode)
{
unsigned char buf[9];
int local, interleaved;
unsigned char localmap[256][3];
int localbits;
int status;
if (fread(buf, 1, 9, infile) == 0) {
perror(filename);
return (0);
}
width = buf[4] + (buf[5] << 8);
height = buf[6] + (buf[7] << 8);
loca... | 153,530,813,421,422,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
31,530 | libtiff | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | fix possible OOB write in gif2tiff.c | 0 | readraster(void)
{
unsigned char *fill = raster;
unsigned char buf[255];
register int bits=0;
register unsigned long datum=0;
register unsigned char *ch;
register int count, code;
int status = 1;
datasize = getc(infile);
if (datasize > 12)
return 0;
clear = 1 << datasize;
e... | 80,389,267,347,589,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4244 | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4244 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.