idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash string | file_name string | file_hash string | cwe string | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
195,391 | tensorflow | f68fdab93fb7f4ddb4eb438c8fe052753c9413e8 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8 | Add a check for pad width to be a positive value.
PiperOrigin-RevId: 413275853
Change-Id: I261a8db9dabf5ce48a806a9e58129080c9fac619 | 1 | void Compute(tensorflow::OpKernelContext* context) override {
for (int ngram_width : ngram_widths_) {
OP_REQUIRES(
context, ngram_width > 0,
errors::InvalidArgument("ngram_widths must contain positive values"));
}
const tensorflow::Tensor* data;
OP_REQUIRES_OK(context, conte... | 93012019628610956612764593105283326156 | string_ngrams_op.cc | 245905885483763938680185872776744444218 | CWE-190 | CVE-2022-21733 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` whic... | https://nvd.nist.gov/vuln/detail/CVE-2022-21733 |
225,125 | tensorflow | f68fdab93fb7f4ddb4eb438c8fe052753c9413e8 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8 | Add a check for pad width to be a positive value.
PiperOrigin-RevId: 413275853
Change-Id: I261a8db9dabf5ce48a806a9e58129080c9fac619 | 0 | void Compute(tensorflow::OpKernelContext* context) override {
for (int ngram_width : ngram_widths_) {
OP_REQUIRES(
context, ngram_width > 0,
errors::InvalidArgument("ngram_widths must contain positive values"));
}
const tensorflow::Tensor* data;
OP_REQUIRES_OK(context, conte... | 39926051817459528222102206002528990438 | string_ngrams_op.cc | 275635386609741564508341080525906256433 | CWE-190 | CVE-2022-21733 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` whic... | https://nvd.nist.gov/vuln/detail/CVE-2022-21733 |
195,398 | v4l2loopback | e4cd225557486c420f6a34411f98c575effd43dd | https://github.com/umlaeute/v4l2loopback | https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd | add explicit format specifier to printf() invocations
CWE-134 | 1 | static int vidioc_querycap(struct file *file, void *priv,
struct v4l2_capability *cap)
{
struct v4l2_loopback_device *dev = v4l2loopback_getdevice(file);
int labellen = (sizeof(cap->card) < sizeof(dev->card_label)) ?
sizeof(cap->card) :
sizeof(dev->card_label);
int device_nr =
((struct v4l... | 275249025528691740507199336736969659771 | v4l2loopback.c | 113113223463037707180278012059265756483 | CWE-134 | CVE-2022-2652 | Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row). | https://nvd.nist.gov/vuln/detail/CVE-2022-2652 |
225,383 | v4l2loopback | e4cd225557486c420f6a34411f98c575effd43dd | https://github.com/umlaeute/v4l2loopback | https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd | add explicit format specifier to printf() invocations
CWE-134 | 0 | static int vidioc_querycap(struct file *file, void *priv,
struct v4l2_capability *cap)
{
struct v4l2_loopback_device *dev = v4l2loopback_getdevice(file);
int labellen = (sizeof(cap->card) < sizeof(dev->card_label)) ?
sizeof(cap->card) :
sizeof(dev->card_label);
int device_nr =
((struct v4l... | 178769376518603723181418371440757147493 | v4l2loopback.c | 138252299614112344688826607831650943411 | CWE-134 | CVE-2022-2652 | Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row). | https://nvd.nist.gov/vuln/detail/CVE-2022-2652 |
195,399 | tensorflow | 045deec1cbdebb27d817008ad5df94d96a08b1bf | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf | Prevent null pointer dereference in `mutable_graph_view`
PiperOrigin-RevId: 409684472
Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c | 1 | bool IsIdentityConsumingSwitch(const MutableGraphView& graph,
const NodeDef& node) {
if ((IsIdentity(node) || IsIdentityNSingleInput(node)) &&
node.input_size() > 0) {
TensorId tensor_id = ParseTensorName(node.input(0));
if (IsTensorIdControlling(tensor_id)) {
return... | 313619660222966312087557415210995637728 | mutable_graph_view.cc | 11824580899895481141820753687530297202 | CWE-476 | CVE-2022-23589 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec... | https://nvd.nist.gov/vuln/detail/CVE-2022-23589 |
225,473 | tensorflow | 045deec1cbdebb27d817008ad5df94d96a08b1bf | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf | Prevent null pointer dereference in `mutable_graph_view`
PiperOrigin-RevId: 409684472
Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c | 0 | bool IsIdentityConsumingSwitch(const MutableGraphView& graph,
const NodeDef& node) {
if ((IsIdentity(node) || IsIdentityNSingleInput(node)) &&
node.input_size() > 0) {
TensorId tensor_id = ParseTensorName(node.input(0));
if (IsTensorIdControlling(tensor_id)) {
return... | 186036134407007049668950369044144546274 | mutable_graph_view.cc | 183902084895507336616240181892029435869 | CWE-476 | CVE-2022-23589 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec... | https://nvd.nist.gov/vuln/detail/CVE-2022-23589 |
195,402 | tensorflow | a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | [lite] Update TfLiteIntArrayCreate to return size_t
PiperOrigin-RevId: 416439896
Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b | 1 | int TfLiteIntArrayGetSizeInBytes(int size) {
static TfLiteIntArray dummy;
int computed_size = sizeof(dummy) + sizeof(dummy.data[0]) * size;
#if defined(_MSC_VER)
// Context for why this is needed is in http://b/189926408#comment21
computed_size -= sizeof(dummy.data[0]);
#endif
return computed_size;
} | 331591508579524081379498872268044006906 | common.c | 227108095659128555473924245568634074234 | CWE-190 | CVE-2022-23558 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in... | https://nvd.nist.gov/vuln/detail/CVE-2022-23558 |
225,547 | tensorflow | a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | [lite] Update TfLiteIntArrayCreate to return size_t
PiperOrigin-RevId: 416439896
Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b | 0 | size_t TfLiteIntArrayGetSizeInBytes(int size) {
static TfLiteIntArray dummy;
size_t computed_size = sizeof(dummy) + sizeof(dummy.data[0]) * size;
#if defined(_MSC_VER)
// Context for why this is needed is in http://b/189926408#comment21
computed_size -= sizeof(dummy.data[0]);
#endif
return computed_size;
} | 132887753534839828949485916264712284974 | common.c | 141963346575108043523158725755967478163 | CWE-190 | CVE-2022-23558 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in... | https://nvd.nist.gov/vuln/detail/CVE-2022-23558 |
195,403 | tensorflow | a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | [lite] Update TfLiteIntArrayCreate to return size_t
PiperOrigin-RevId: 416439896
Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b | 1 | TfLiteIntArray* TfLiteIntArrayCreate(int size) {
int alloc_size = TfLiteIntArrayGetSizeInBytes(size);
if (alloc_size <= 0) return NULL;
TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size);
if (!ret) return ret;
ret->size = size;
return ret;
} | 64742066879088615123277599572040485093 | common.c | 227108095659128555473924245568634074234 | CWE-190 | CVE-2022-23558 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in... | https://nvd.nist.gov/vuln/detail/CVE-2022-23558 |
225,552 | tensorflow | a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | [lite] Update TfLiteIntArrayCreate to return size_t
PiperOrigin-RevId: 416439896
Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b | 0 | TfLiteIntArray* TfLiteIntArrayCreate(int size) {
size_t alloc_size = TfLiteIntArrayGetSizeInBytes(size);
if (alloc_size <= 0) return NULL;
TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size);
if (!ret) return ret;
ret->size = size;
return ret;
} | 125057143458607684207882855383643521977 | common.c | 141963346575108043523158725755967478163 | CWE-190 | CVE-2022-23558 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in... | https://nvd.nist.gov/vuln/detail/CVE-2022-23558 |
195,404 | tensorflow | ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb | Fix potential divide by zero error when executing FractionalMaxPool, when pooling ratio is higher than input size for a particular dimension.
PiperOrigin-RevId: 412151722
Change-Id: I06e57cbb8eca43816eff79eac264fa7aae8f7163 | 1 | void Compute(OpKernelContext* context) override {
typedef Eigen::Map<const Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>>
ConstEigenMatrixMap;
typedef Eigen::Map<Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>>
EigenMatrixMap;
constexpr int tensor_in_and_out_dims = 4;
const Tenso... | 329653208386215793548956261636203970964 | fractional_max_pool_op.cc | 38088244475067119710916669469162645605 | CWE-369 | CVE-2022-21735 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are al... | https://nvd.nist.gov/vuln/detail/CVE-2022-21735 |
225,563 | tensorflow | ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb | Fix potential divide by zero error when executing FractionalMaxPool, when pooling ratio is higher than input size for a particular dimension.
PiperOrigin-RevId: 412151722
Change-Id: I06e57cbb8eca43816eff79eac264fa7aae8f7163 | 0 | void Compute(OpKernelContext* context) override {
typedef Eigen::Map<const Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>>
ConstEigenMatrixMap;
typedef Eigen::Map<Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>>
EigenMatrixMap;
constexpr int tensor_in_and_out_dims = 4;
const Tenso... | 116843352571391588046661724660779526999 | fractional_max_pool_op.cc | 167950097941581661250535285107700244508 | CWE-369 | CVE-2022-21735 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are al... | https://nvd.nist.gov/vuln/detail/CVE-2022-21735 |
195,405 | ImageMagick6 | 29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick/pull/4986 | 1 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MaxTextExtent],
*density,
filename[MaxTextExtent],
geometry[MaxTextExt... | 285956846610376765198872183403915882061 | pcl.c | 338547174937023730341471137685130471169 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
225,566 | ImageMagick6 | 29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick/pull/4986 | 0 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MaxTextExtent],
*density,
filename[MaxTextExtent],
geometry[MaxTextExt... | 83929363874861063792960158581169163951 | pcl.c | 19401947442598835469700605981025281430 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
195,409 | gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | fixed #2092 | 1 |
void gitn_box_del(GF_Box *s)
{
u32 i;
GroupIdToNameBox *ptr = (GroupIdToNameBox *)s;
if (ptr == NULL) return;
for (i=0; i<ptr->nb_entries; i++) {
if (ptr->entries[i].name) gf_free(ptr->entries[i].name);
}
if (ptr->entries) gf_free(ptr->entries);
gf_free(ptr); | 37642310110270321687625000100653046485 | box_code_base.c | 212802147696207025803784466432150384318 | CWE-476 | CVE-2021-4043 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. | https://nvd.nist.gov/vuln/detail/CVE-2021-4043 |
226,029 | gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | fixed #2092 | 0 |
void gitn_box_del(GF_Box *s)
{
u32 i;
GroupIdToNameBox *ptr = (GroupIdToNameBox *)s;
if (ptr == NULL) return;
if (ptr->entries) {
for (i=0; i<ptr->nb_entries; i++) {
if (ptr->entries[i].name) gf_free(ptr->entries[i].name);
}
gf_free(ptr->entries);
}
gf_free(ptr); | 265612189453593240220286582640125308421 | box_code_base.c | 49851003819063672326837979869211393199 | CWE-476 | CVE-2021-4043 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. | https://nvd.nist.gov/vuln/detail/CVE-2021-4043 |
195,410 | tensorflow | 965b97e4a9650495cda5a8c210ef6684b4b9eceb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb | Properly validate sparse tensor in `SparseTensorSliceDataset`
Existing validation was incomplete.
PiperOrigin-RevId: 415375048
Change-Id: I14cd18f29ede73286f3ffac35171bd15828997e9 | 1 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 232798786480644222523895580158118045723 | sparse_tensor_slice_dataset_op.cc | 20179985196620256343354076777909821072 | CWE-476 | CVE-2022-21736 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditio... | https://nvd.nist.gov/vuln/detail/CVE-2022-21736 |
226,433 | tensorflow | 965b97e4a9650495cda5a8c210ef6684b4b9eceb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb | Properly validate sparse tensor in `SparseTensorSliceDataset`
Existing validation was incomplete.
PiperOrigin-RevId: 415375048
Change-Id: I14cd18f29ede73286f3ffac35171bd15828997e9 | 0 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 227797014623034241967270311347340556143 | sparse_tensor_slice_dataset_op.cc | 223168035118292217298610217555690212472 | CWE-476 | CVE-2022-21736 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditio... | https://nvd.nist.gov/vuln/detail/CVE-2022-21736 |
195,471 | weechat | 9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a | irc: fix crash when receiving a malformed message 352 (who)
Thanks to Stuart Nevans Locke for reporting the issue. | 1 | IRC_PROTOCOL_CALLBACK(352)
{
char *pos_attr, *pos_hopcount, *pos_realname, *str_host;
int arg_start, length;
struct t_irc_channel *ptr_channel;
struct t_irc_nick *ptr_nick;
IRC_PROTOCOL_MIN_ARGS(5);
/* silently ignore malformed 352 message (missing infos) */
if (argc < 8)
return WE... | 334241185700640959176375322270000746009 | irc-protocol.c | 25326141648227228091841815556030791460 | CWE-476 | CVE-2020-9759 | A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files. | https://nvd.nist.gov/vuln/detail/CVE-2020-9759 |
227,022 | weechat | 9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a | irc: fix crash when receiving a malformed message 352 (who)
Thanks to Stuart Nevans Locke for reporting the issue. | 0 | IRC_PROTOCOL_CALLBACK(352)
{
char *pos_attr, *pos_hopcount, *pos_realname, *str_host;
int arg_start, length;
struct t_irc_channel *ptr_channel;
struct t_irc_nick *ptr_nick;
IRC_PROTOCOL_MIN_ARGS(5);
/* silently ignore malformed 352 message (missing infos) */
if (argc < 8)
return WE... | 240473779372461876579512981083881440945 | irc-protocol.c | 267510684279184111108460541610753784321 | CWE-476 | CVE-2020-9759 | A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files. | https://nvd.nist.gov/vuln/detail/CVE-2020-9759 |
195,565 | hhvm | dbeb9a56a638e3fdcef8b691c2a2967132dae692 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692 | string_number_format: Correctly handles return value of snprintf
Summary: `snprintf` can return a value greater than the number of bytes copied. In case the first byte of the string is not a digit (could be '-'), size of `tmpstr` was being updated without checking `tmplen`. This resulted in either an assertion error o... | 1 | String string_number_format(double d, int dec,
const String& dec_point,
const String& thousand_sep) {
char *tmpbuf = nullptr, *resbuf;
char *s, *t; /* source, target */
char *dp;
int integral;
int tmplen, reslen=0;
int count=0;
int is_negative=0;
... | 125018652199743804521817207176944376682 | zend-string.cpp | 157727558891612041764030573186624095506 | CWE-119 | CVE-2019-11929 | Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.... | https://nvd.nist.gov/vuln/detail/CVE-2019-11929 |
228,563 | hhvm | dbeb9a56a638e3fdcef8b691c2a2967132dae692 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692 | string_number_format: Correctly handles return value of snprintf
Summary: `snprintf` can return a value greater than the number of bytes copied. In case the first byte of the string is not a digit (could be '-'), size of `tmpstr` was being updated without checking `tmplen`. This resulted in either an assertion error o... | 0 | String string_number_format(double d, int dec,
const String& dec_point,
const String& thousand_sep) {
char *tmpbuf = nullptr, *resbuf;
char *s, *t; /* source, target */
char *dp;
int integral;
int tmplen, reslen=0;
int count=0;
int is_negative=0;
... | 113449506030420962381960959197350451885 | zend-string.cpp | 48155053696740279281010358677614070619 | CWE-119 | CVE-2019-11929 | Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.... | https://nvd.nist.gov/vuln/detail/CVE-2019-11929 |
195,626 | qemu | 7882080388be5088e72c425b02223c02e6cb4295 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295 | virtio-serial: fix ANY_LAYOUT
Don't assume a specific layout for control messages.
Required by virtio 1.
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Amit Shah <amit.shah@redhat.com>
Reviewed-by: Jason Wang <jasowang@redhat.com> | 1 | static size_t send_control_msg(VirtIOSerial *vser, void *buf, size_t len)
{
VirtQueueElement elem;
VirtQueue *vq;
vq = vser->c_ivq;
if (!virtio_queue_ready(vq)) {
return 0;
}
if (!virtqueue_pop(vq, &elem)) {
return 0;
}
memcpy(elem.in_sg[0].iov_base, buf, len);
vir... | 301712778748262907171467771526276497164 | virtio-serial-bus.c | 253157734411856913752064284433381457044 | CWE-787 | CVE-2015-5745 | Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message. | https://nvd.nist.gov/vuln/detail/CVE-2015-5745 |
229,165 | qemu | 7882080388be5088e72c425b02223c02e6cb4295 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295 | virtio-serial: fix ANY_LAYOUT
Don't assume a specific layout for control messages.
Required by virtio 1.
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Amit Shah <amit.shah@redhat.com>
Reviewed-by: Jason Wang <jasowang@redhat.com> | 0 | static size_t send_control_msg(VirtIOSerial *vser, void *buf, size_t len)
{
VirtQueueElement elem;
VirtQueue *vq;
vq = vser->c_ivq;
if (!virtio_queue_ready(vq)) {
return 0;
}
if (!virtqueue_pop(vq, &elem)) {
return 0;
}
/* TODO: detect a buffer that's too short, set NEE... | 134405066708210322765218436102220814555 | virtio-serial-bus.c | 85242612776593478078186690625596682650 | CWE-787 | CVE-2015-5745 | Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message. | https://nvd.nist.gov/vuln/detail/CVE-2015-5745 |
195,629 | tensorflow | a5b89cd68c02329d793356bda85d079e9e69b4e7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7 | Fix empty resource handle vulnerability.
Some ops that attempt to extract a resource handle from user input
can lead to nullptr dereferences. This returns an error in such
a case.
PiperOrigin-RevId: 445571938 | 1 | Status GetDeviceForInput(const EagerOperation& op, const EagerContext& ctx,
TensorHandle* tensor_handle, Device** result) {
Device* cpu_device = ctx.HostCPU();
string device_name;
if (tensor_handle->Type() != TensorHandle::LOCAL) {
Device* device = tensor_handle->device();
device_... | 227007805370541421392187811352073944672 | execute.cc | 250138698264718373642663717664797527317 | CWE-476 | CVE-2022-29207 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eage... | https://nvd.nist.gov/vuln/detail/CVE-2022-29207 |
229,337 | tensorflow | a5b89cd68c02329d793356bda85d079e9e69b4e7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7 | Fix empty resource handle vulnerability.
Some ops that attempt to extract a resource handle from user input
can lead to nullptr dereferences. This returns an error in such
a case.
PiperOrigin-RevId: 445571938 | 0 | Status GetDeviceForInput(const EagerOperation& op, const EagerContext& ctx,
TensorHandle* tensor_handle, Device** result) {
Device* cpu_device = ctx.HostCPU();
string device_name;
if (tensor_handle->Type() != TensorHandle::LOCAL) {
Device* device = tensor_handle->device();
device_... | 302726579392319306560767073266874435577 | execute.cc | 29379316032335742084912200348793889272 | CWE-476 | CVE-2022-29207 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eage... | https://nvd.nist.gov/vuln/detail/CVE-2022-29207 |
195,665 | njs | 2e00e95473861846aa8538be87db07699d9f676d | https://github.com/nginx/njs | https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d | Fixed Array.prototype.slice() with slow "this" argument.
Previously, when "this" argument was not a fast array, but the "deleted" array
was a fast array, the "deleted" array may be left in uninitialized state if
"this" argument had gaps.
This fix is to ensure that "deleted" is properly initialized.
This fixes #485 i... | 1 | njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs,
njs_index_t unused)
{
int64_t i, n, start, length, items, delta, delete;
njs_int_t ret;
njs_value_t *this, value, del_object;
njs_array_t *array, *deleted;
this = njs_argument(args, 0);
ret = njs_value_... | 41889957200154277256182614621042854713 | njs_array.c | 27861953644579332654826088207600556930 | CWE-703 | CVE-2022-29779 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-29779 |
230,302 | njs | 2e00e95473861846aa8538be87db07699d9f676d | https://github.com/nginx/njs | https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d | Fixed Array.prototype.slice() with slow "this" argument.
Previously, when "this" argument was not a fast array, but the "deleted" array
was a fast array, the "deleted" array may be left in uninitialized state if
"this" argument had gaps.
This fix is to ensure that "deleted" is properly initialized.
This fixes #485 i... | 0 | njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs,
njs_index_t unused)
{
int64_t i, n, start, length, items, delta, delete;
njs_int_t ret;
njs_value_t *this, value, del_object;
njs_array_t *array, *deleted;
this = njs_argument(args, 0);
ret = njs_value_... | 91452857281463208584852927019432341939 | njs_array.c | 127478727069540736637535553874506726763 | CWE-703 | CVE-2022-29779 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-29779 |
195,670 | pjproject | 856f87c2e97a27b256482dbe0d748b1194355a21 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21 | Merge pull request from GHSA-5x45-qp78-g4p4
* Prevent infinite loop in scanning xml content
* Simplify scanning method
* Optimization | 1 | static pj_xml_node *xml_parse_node( pj_pool_t *pool, pj_scanner *scanner)
{
pj_xml_node *node;
pj_str_t end_name;
PJ_CHECK_STACK();
if (*scanner->curptr != '<')
on_syntax_error(scanner);
/* Handle Processing Instructino (PI) construct (i.e. "<?") */
if (*scanner->curptr == '<' && *(scanner->... | 277240174945375908655928995975016589842 | xml.c | 319030018310003515806173873266013713455 | CWE-703 | CVE-2022-24763 | PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds. | https://nvd.nist.gov/vuln/detail/CVE-2022-24763 |
230,394 | pjproject | 856f87c2e97a27b256482dbe0d748b1194355a21 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21 | Merge pull request from GHSA-5x45-qp78-g4p4
* Prevent infinite loop in scanning xml content
* Simplify scanning method
* Optimization | 0 | static pj_xml_node *xml_parse_node( pj_pool_t *pool, pj_scanner *scanner)
{
pj_xml_node *node;
pj_str_t end_name;
PJ_CHECK_STACK();
if (*scanner->curptr != '<')
on_syntax_error(scanner);
/* Handle Processing Instructino (PI) construct (i.e. "<?") */
if (*scanner->curptr == '<' && *(scanner->... | 333353357538572797993178277028111202319 | xml.c | 137943726532385231053862962299057228575 | CWE-703 | CVE-2022-24763 | PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds. | https://nvd.nist.gov/vuln/detail/CVE-2022-24763 |
195,691 | mruby | a4d97934d51cb88954cc49161dc1d151f64afb6b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | vm.c: check if target_class is NULL (when prepended). | 1 | mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
{
/* mrb_assert(MRB_PROC_CFUNC_P(proc)) */
const mrb_irep *irep = proc->body.irep;
const mrb_pool_value *pool = irep->pool;
const mrb_sym *syms = irep->syms;
mrb_code insn;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jm... | 44658455618798852770197569753613577766 | vm.c | 164058079299968555060167307813659313262 | CWE-703 | CVE-2022-1427 | Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1427 |
231,012 | mruby | a4d97934d51cb88954cc49161dc1d151f64afb6b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | vm.c: check if target_class is NULL (when prepended). | 0 | mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
{
/* mrb_assert(MRB_PROC_CFUNC_P(proc)) */
const mrb_irep *irep = proc->body.irep;
const mrb_pool_value *pool = irep->pool;
const mrb_sym *syms = irep->syms;
mrb_code insn;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jm... | 104703994590688087058145131124808583742 | vm.c | 126976644189338180144758453935885521875 | CWE-703 | CVE-2022-1427 | Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1427 |
195,692 | FreeRTOS-Kernel | 47338393f1f79558f6144213409f09f81d7c4837 | https://github.com/FreeRTOS/FreeRTOS-Kernel | https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/47338393f1f79558f6144213409f09f81d7c4837 | add assert for addition overflow on queue creation (#225) | 1 | QueueHandle_t xQueueGenericCreate( const UBaseType_t uxQueueLength,
const UBaseType_t uxItemSize,
const uint8_t ucQueueType )
{
Queue_t * pxNewQueue;
size_t xQueueSizeInBytes;
uint8_t * pucQueueStorage;
... | 278728915886701481135388633284092658774 | queue.c | 44156660200315650828929819637760261927 | CWE-200 | CVE-2021-31571 | The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in queue.c for queue creation. | https://nvd.nist.gov/vuln/detail/CVE-2021-31571 |
231,048 | FreeRTOS-Kernel | 47338393f1f79558f6144213409f09f81d7c4837 | https://github.com/FreeRTOS/FreeRTOS-Kernel | https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/47338393f1f79558f6144213409f09f81d7c4837 | add assert for addition overflow on queue creation (#225) | 0 | QueueHandle_t xQueueGenericCreate( const UBaseType_t uxQueueLength,
const UBaseType_t uxItemSize,
const uint8_t ucQueueType )
{
Queue_t * pxNewQueue;
size_t xQueueSizeInBytes;
uint8_t * pucQueueStorage;
... | 233309018517612713780199359033790626331 | queue.c | 257322064233856588492480054392208384035 | CWE-200 | CVE-2021-31571 | The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in queue.c for queue creation. | https://nvd.nist.gov/vuln/detail/CVE-2021-31571 |
195,720 | mvfst | a67083ff4b8dcbb7ee2839da6338032030d712b0 | https://github.com/facebookincubator/mvfst | https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0 | Close connection if we derive an extra 1-rtt write cipher
Summary: Fixes CVE-2021-24029
Reviewed By: mjoras, lnicco
Differential Revision: D26613890
fbshipit-source-id: 19bb2be2c731808144e1a074ece313fba11f1945 | 1 | void updateHandshakeState(QuicServerConnectionState& conn) {
// Zero RTT read cipher is available after chlo is processed with the
// condition that early data attempt is accepted.
auto handshakeLayer = conn.serverHandshakeLayer;
auto zeroRttReadCipher = handshakeLayer->getZeroRttReadCipher();
auto zeroRttHea... | 43735419078414129480912957086830640484 | ServerStateMachine.cpp | 9223824505720776904271246874049398430 | CWE-703 | CVE-2021-24029 | A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da633803203... | https://nvd.nist.gov/vuln/detail/CVE-2021-24029 |
231,710 | mvfst | a67083ff4b8dcbb7ee2839da6338032030d712b0 | https://github.com/facebookincubator/mvfst | https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0 | Close connection if we derive an extra 1-rtt write cipher
Summary: Fixes CVE-2021-24029
Reviewed By: mjoras, lnicco
Differential Revision: D26613890
fbshipit-source-id: 19bb2be2c731808144e1a074ece313fba11f1945 | 0 | void updateHandshakeState(QuicServerConnectionState& conn) {
// Zero RTT read cipher is available after chlo is processed with the
// condition that early data attempt is accepted.
auto handshakeLayer = conn.serverHandshakeLayer;
auto zeroRttReadCipher = handshakeLayer->getZeroRttReadCipher();
auto zeroRttHea... | 131573153342571823274301341051505058759 | ServerStateMachine.cpp | 204614198627642259228820961859917931421 | CWE-703 | CVE-2021-24029 | A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da633803203... | https://nvd.nist.gov/vuln/detail/CVE-2021-24029 |
195,740 | libjpeg | 4746b577931e926a49e50de9720a4946de3069a7 | https://github.com/thorfdbg/libjpeg | https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7 | Fixed handling of empty JPEG-LS scans. | 1 | bool SampleInterleavedLSScan::ParseMCU(void)
{
#if ACCUSOFT_CODE
int lines = m_ulRemaining[0]; // total number of MCU lines processed.
UBYTE preshift = m_ucLowBit + FractionalColorBitsOf();
struct Line *line[4];
UBYTE cx;
//
// If a DNL marker is present, the number of remaining lines is... | 262161649015079801638874313151941212550 | None | CWE-703 | CVE-2022-32978 | There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan. | https://nvd.nist.gov/vuln/detail/CVE-2022-32978 | |
232,289 | libjpeg | 4746b577931e926a49e50de9720a4946de3069a7 | https://github.com/thorfdbg/libjpeg | https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7 | Fixed handling of empty JPEG-LS scans. | 0 | bool SampleInterleavedLSScan::ParseMCU(void)
{
#if ACCUSOFT_CODE
int lines = m_ulRemaining[0]; // total number of MCU lines processed.
UBYTE preshift = m_ucLowBit + FractionalColorBitsOf();
struct Line *line[4];
UBYTE cx;
//
// If a DNL marker is present, the number of remaining lines is... | 195933043393855107446070248148738301990 | None | CWE-703 | CVE-2022-32978 | There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan. | https://nvd.nist.gov/vuln/detail/CVE-2022-32978 | |
195,741 | libjpeg | 4746b577931e926a49e50de9720a4946de3069a7 | https://github.com/thorfdbg/libjpeg | https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7 | Fixed handling of empty JPEG-LS scans. | 1 | bool SingleComponentLSScan::ParseMCU(void)
{
#if ACCUSOFT_CODE
int lines = m_ulRemaining[0]; // total number of MCU lines processed.
UBYTE preshift = m_ucLowBit + FractionalColorBitsOf();
struct Line *line = CurrentLine(0);
//
// If a DNL marker is present, the number of remaining l... | 62606079555374024593923514521759457355 | None | CWE-703 | CVE-2022-32978 | There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan. | https://nvd.nist.gov/vuln/detail/CVE-2022-32978 | |
232,287 | libjpeg | 4746b577931e926a49e50de9720a4946de3069a7 | https://github.com/thorfdbg/libjpeg | https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7 | Fixed handling of empty JPEG-LS scans. | 0 | bool SingleComponentLSScan::ParseMCU(void)
{
#if ACCUSOFT_CODE
int lines = m_ulRemaining[0]; // total number of MCU lines processed.
UBYTE preshift = m_ucLowBit + FractionalColorBitsOf();
struct Line *line = CurrentLine(0);
//
// If a DNL marker is present, the number of remaining l... | 278625865669519268412189582687913030823 | None | CWE-703 | CVE-2022-32978 | There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan. | https://nvd.nist.gov/vuln/detail/CVE-2022-32978 | |
195,742 | gpac | 37592ad86c6ca934d34740012213e467acc4a3b0 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 | fixed #2163 | 1 | static GF_Err gf_isom_parse_movie_boxes_internal(GF_ISOFile *mov, u32 *boxType, u64 *bytesMissing, Bool progressive_mode)
{
GF_Box *a;
u64 totSize, mdat_end=0;
GF_Err e = GF_OK;
#ifndef GPAC_DISABLE_ISOM_FRAGMENTS
if (mov->single_moof_mode && mov->single_moof_state == 2) {
return e;
}
/*restart from where we ... | 68912157747726016692935177449045975431 | None | CWE-476 | CVE-2022-29340 | GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad. | https://nvd.nist.gov/vuln/detail/CVE-2022-29340 | |
232,329 | gpac | 37592ad86c6ca934d34740012213e467acc4a3b0 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 | fixed #2163 | 0 | static GF_Err gf_isom_parse_movie_boxes_internal(GF_ISOFile *mov, u32 *boxType, u64 *bytesMissing, Bool progressive_mode)
{
GF_Box *a;
u64 totSize, mdat_end=0;
GF_Err e = GF_OK;
#ifndef GPAC_DISABLE_ISOM_FRAGMENTS
if (mov->single_moof_mode && mov->single_moof_state == 2) {
return e;
}
/*restart from where we ... | 33398552270127430256413281511092874838 | None | CWE-476 | CVE-2022-29340 | GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad. | https://nvd.nist.gov/vuln/detail/CVE-2022-29340 | |
195,752 | tensorflow | 02cc160e29d20631de3859c6653184e3f876b9d7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7 | Prevent nullptr deref in SparseTensorSliceDataset
The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse).
Also added test, by modifying existing test with empty sparse tensor to now run with an invalid sparse tensor input.
PiperO... | 1 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 111818826187244494245403789873500831419 | sparse_tensor_slice_dataset_op.cc | 152047584060469134260687844063366554733 | CWE-476 | CVE-2021-37647 | TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6a... | https://nvd.nist.gov/vuln/detail/CVE-2021-37647 |
232,405 | tensorflow | 02cc160e29d20631de3859c6653184e3f876b9d7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7 | Prevent nullptr deref in SparseTensorSliceDataset
The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse).
Also added test, by modifying existing test with empty sparse tensor to now run with an invalid sparse tensor input.
PiperO... | 0 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 126239557450594194918340916106898261954 | sparse_tensor_slice_dataset_op.cc | 188414793374606504588915566744198162485 | CWE-476 | CVE-2021-37647 | TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6a... | https://nvd.nist.gov/vuln/detail/CVE-2021-37647 |
195,768 | tensorflow | 8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992 | Ensure num_streams >= 0 in tf.raw_ops.BoostedTreesCreateQuantileStreamResource
PiperOrigin-RevId: 387452765
Change-Id: I9990c760e177fabca6a3b9b4612ceeaeeba51495 | 1 | void Compute(OpKernelContext* context) override {
// Only create one, if one does not exist already. Report status for all
// other exceptions. If one already exists, it unrefs the new one.
// An epsilon value of zero could cause performance issues and is therefore,
// disallowed.
const Tensor* ep... | 313445736659793184747687838118492710807 | quantile_ops.cc | 107616464713850423069668018637690909159 | CWE-703 | CVE-2021-37661 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c4... | https://nvd.nist.gov/vuln/detail/CVE-2021-37661 |
232,839 | tensorflow | 8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992 | Ensure num_streams >= 0 in tf.raw_ops.BoostedTreesCreateQuantileStreamResource
PiperOrigin-RevId: 387452765
Change-Id: I9990c760e177fabca6a3b9b4612ceeaeeba51495 | 0 | void Compute(OpKernelContext* context) override {
// Only create one, if one does not exist already. Report status for all
// other exceptions. If one already exists, it unrefs the new one.
// An epsilon value of zero could cause performance issues and is therefore,
// disallowed.
const Tensor* ep... | 211706993180687307698189182900649131515 | quantile_ops.cc | 2460463357913626818723111707864043881 | CWE-703 | CVE-2021-37661 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c4... | https://nvd.nist.gov/vuln/detail/CVE-2021-37661 |
195,800 | deark | 62acb7753b0e3c0d3ab3c15057b0a65222313334 | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334 | pict,macrsrc: Fixed a bug that could cause division by 0
Found by F. Çelik. | 1 | void fmtutil_macbitmap_read_pixmap_only_fields(deark *c, dbuf *f, struct fmtutil_macbitmap_info *bi,
i64 pos)
{
i64 pixmap_version;
i64 pack_size;
i64 plane_bytes;
i64 n;
de_dbg(c, "additional PixMap header fields, at %d", (int)pos);
de_dbg_indent(c, 1);
pixmap_version = dbuf_getu16be(f, pos+0);
de_dbg(c, "p... | 203544519943268578056087775697493086183 | fmtutil.c | 198892381443353894699781903058114971913 | CWE-369 | CVE-2021-28856 | In Deark before v1.5.8, a specially crafted input file can cause a division by zero in (src/fmtutil.c) because of the value of pixelsize. | https://nvd.nist.gov/vuln/detail/CVE-2021-28856 |
233,862 | deark | 62acb7753b0e3c0d3ab3c15057b0a65222313334 | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334 | pict,macrsrc: Fixed a bug that could cause division by 0
Found by F. Çelik. | 0 | void fmtutil_macbitmap_read_pixmap_only_fields(deark *c, dbuf *f, struct fmtutil_macbitmap_info *bi,
i64 pos)
{
i64 pixmap_version;
i64 pack_size;
i64 plane_bytes;
i64 n;
de_dbg(c, "additional PixMap header fields, at %d", (int)pos);
de_dbg_indent(c, 1);
pixmap_version = dbuf_getu16be(f, pos+0);
de_dbg(c, "p... | 165750695801886950946994956858448129756 | fmtutil.c | 134744298134309373748233562166931104409 | CWE-369 | CVE-2021-28856 | In Deark before v1.5.8, a specially crafted input file can cause a division by zero in (src/fmtutil.c) because of the value of pixelsize. | https://nvd.nist.gov/vuln/detail/CVE-2021-28856 |
195,801 | php-src | 0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f | https://github.com/php/php-src | https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f | Fix for bug #72790 and bug #72799
(cherry picked from commit a14fdb9746262549bbbb96abb87338bacd147e1b)
Conflicts:
ext/wddx/wddx.c | 1 | */
static void php_wddx_pop_element(void *user_data, const XML_Char *name)
{
st_entry *ent1, *ent2;
wddx_stack *stack = (wddx_stack *)user_data;
HashTable *target_hash;
zend_class_entry *pce;
zval obj;
/* OBJECTS_FIXME */
if (stack->top == 0) {
return;
}
if (!strcmp((char *)name, EL_STRING) ||... | 195456627139063255714886732829389598772 | wddx.c | 202333767268853724294318351879930678985 | CWE-476 | CVE-2016-7132 | ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray elem... | https://nvd.nist.gov/vuln/detail/CVE-2016-7132 |
233,867 | php-src | 0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f | https://github.com/php/php-src | https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f | Fix for bug #72790 and bug #72799
(cherry picked from commit a14fdb9746262549bbbb96abb87338bacd147e1b)
Conflicts:
ext/wddx/wddx.c | 0 | */
static void php_wddx_pop_element(void *user_data, const XML_Char *name)
{
st_entry *ent1, *ent2;
wddx_stack *stack = (wddx_stack *)user_data;
HashTable *target_hash;
zend_class_entry *pce;
zval obj;
/* OBJECTS_FIXME */
if (stack->top == 0) {
return;
}
if (!strcmp((char *)name, EL_STRING) ||... | 31470175015119113662948688342343260077 | wddx.c | 138061260196786413886706259778202745956 | CWE-476 | CVE-2016-7132 | ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray elem... | https://nvd.nist.gov/vuln/detail/CVE-2016-7132 |
195,908 | linux | e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | btrfs: fix NULL pointer dereference when deleting device by invalid id
[BUG]
It's easy to trigger NULL pointer dereference, just by removing a
non-existing device id:
# mkfs.btrfs -f -m single -d single /dev/test/scratch1 \
/dev/test/scratch2
# mount /dev/test/scratch1 /mnt/btrfs
# btrfs device remove 3 /... | 1 | int btrfs_rm_device(struct btrfs_fs_info *fs_info, const char *device_path,
u64 devid)
{
struct btrfs_device *device;
struct btrfs_fs_devices *cur_devices;
struct btrfs_fs_devices *fs_devices = fs_info->fs_devices;
u64 num_devices;
int ret = 0;
mutex_lock(&uuid_mutex);
num_devices = btrfs_num_devices(fs_... | 109862119097507194285189243526662049352 | volumes.c | 327977751785202812455417482244318484271 | CWE-703 | CVE-2021-3739 | A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system avail... | https://nvd.nist.gov/vuln/detail/CVE-2021-3739 |
234,731 | linux | e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | btrfs: fix NULL pointer dereference when deleting device by invalid id
[BUG]
It's easy to trigger NULL pointer dereference, just by removing a
non-existing device id:
# mkfs.btrfs -f -m single -d single /dev/test/scratch1 \
/dev/test/scratch2
# mount /dev/test/scratch1 /mnt/btrfs
# btrfs device remove 3 /... | 0 | int btrfs_rm_device(struct btrfs_fs_info *fs_info, const char *device_path,
u64 devid)
{
struct btrfs_device *device;
struct btrfs_fs_devices *cur_devices;
struct btrfs_fs_devices *fs_devices = fs_info->fs_devices;
u64 num_devices;
int ret = 0;
mutex_lock(&uuid_mutex);
num_devices = btrfs_num_devices(fs_... | 150119639172350576972778244740451645198 | volumes.c | 142275211219518353290156650917746742888 | CWE-703 | CVE-2021-3739 | A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system avail... | https://nvd.nist.gov/vuln/detail/CVE-2021-3739 |
195,909 | ImageMagick | d072ed6aff835c174e856ce3a428163c0da9e8f4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d072ed6aff835c174e856ce3a428163c0da9e8f4 | Skip MNG CLIP chunk with out-of-range object IDs | 1 | static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
page_geometry[MagickPathExtent];
Image
*image;
MagickBooleanType
logging;
volatile int
first_mng_object,
object_id,
term_chunk_found,
skip_to_iend;
volatile ssize... | 112335411773175147602521832461985951659 | png.c | 320300249685897026258566713334395171716 | CWE-125 | CVE-2017-13139 | In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk. | https://nvd.nist.gov/vuln/detail/CVE-2017-13139 |
234,875 | ImageMagick | d072ed6aff835c174e856ce3a428163c0da9e8f4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d072ed6aff835c174e856ce3a428163c0da9e8f4 | Skip MNG CLIP chunk with out-of-range object IDs | 0 | static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
page_geometry[MagickPathExtent];
Image
*image;
MagickBooleanType
logging;
volatile int
first_mng_object,
object_id,
term_chunk_found,
skip_to_iend;
volatile ssize... | 158627527242372232555718474097358340968 | png.c | 308141979970390112779858157014940687903 | CWE-125 | CVE-2017-13139 | In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk. | https://nvd.nist.gov/vuln/detail/CVE-2017-13139 |
195,954 | pjproject | 9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a | Merge pull request from GHSA-p6g5-v97c-w5q4
* Prevent heap buffer overflow when parsing DNS packets
* Make sure packet parsing doesn't advance beyond max/end
* Update checks
* Remove check
Co-authored-by: sauwming <ming@teluu.com> | 1 | static pj_status_t parse_query(pj_dns_parsed_query *q, pj_pool_t *pool,
const pj_uint8_t *pkt, const pj_uint8_t *start,
const pj_uint8_t *max, int *parsed_len)
{
const pj_uint8_t *p = start;
int name_len, name_part_len;
pj_status_t status;
/* Get the length of the name */
status... | 135450072303259419822933820270333517166 | dns.c | 253652259492393007596255371845847130395 | CWE-787 | CVE-2022-24793 | PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is... | https://nvd.nist.gov/vuln/detail/CVE-2022-24793 |
235,642 | pjproject | 9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a | Merge pull request from GHSA-p6g5-v97c-w5q4
* Prevent heap buffer overflow when parsing DNS packets
* Make sure packet parsing doesn't advance beyond max/end
* Update checks
* Remove check
Co-authored-by: sauwming <ming@teluu.com> | 0 | static pj_status_t parse_query(pj_dns_parsed_query *q, pj_pool_t *pool,
const pj_uint8_t *pkt, const pj_uint8_t *start,
const pj_uint8_t *max, int *parsed_len)
{
const pj_uint8_t *p = start;
int name_len, name_part_len;
pj_status_t status;
/* Get the length of the name */
status... | 182542196466721409447058148432122336027 | dns.c | 267684295944312304672181273486771812087 | CWE-787 | CVE-2022-24793 | PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is... | https://nvd.nist.gov/vuln/detail/CVE-2022-24793 |
195,965 | tensorflow | 30721cf564cb029d34535446d6a5a6357bebc8e7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7 | Fix tf.raw_ops.EditDistance vulnerability with negative indices.
Check that indices are non-negative. Fix several identical code sites.
Clean up grammar in error message.
PiperOrigin-RevId: 445442017 | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor* hypothesis_indices;
const Tensor* hypothesis_values;
const Tensor* hypothesis_shape;
const Tensor* truth_indices;
const Tensor* truth_values;
const Tensor* truth_shape;
OP_REQUIRES_OK(ctx, ctx->input("hypothesis_indices", &hypothe... | 330908344605810468129440704571471984591 | edit_distance_op.cc | 218278977682570302037113861275408263141 | CWE-787 | CVE-2022-29208 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may c... | https://nvd.nist.gov/vuln/detail/CVE-2022-29208 |
235,765 | tensorflow | 30721cf564cb029d34535446d6a5a6357bebc8e7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7 | Fix tf.raw_ops.EditDistance vulnerability with negative indices.
Check that indices are non-negative. Fix several identical code sites.
Clean up grammar in error message.
PiperOrigin-RevId: 445442017 | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor* hypothesis_indices;
const Tensor* hypothesis_values;
const Tensor* hypothesis_shape;
const Tensor* truth_indices;
const Tensor* truth_values;
const Tensor* truth_shape;
OP_REQUIRES_OK(ctx, ctx->input("hypothesis_indices", &hypothe... | 248166369480919859740493813092777127281 | edit_distance_op.cc | 224900034498319197270351200055296266799 | CWE-787 | CVE-2022-29208 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may c... | https://nvd.nist.gov/vuln/detail/CVE-2022-29208 |
195,984 | gpac | 3dbe11b37d65c8472faf0654410068e5500b3adb | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb | fixed #2175 | 1 | GF_Err diST_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 i;
char str[1024];
GF_DIMSScriptTypesBox *p = (GF_DIMSScriptTypesBox *)s;
i=0;
str[0]=0;
while (1) {
str[i] = gf_bs_read_u8(bs);
if (!str[i]) break;
i++;
}
ISOM_DECREASE_SIZE(p, i);
p->content_script_types = gf_strdup(str);
return GF_OK;
} | 337508066102203205232219987774332438264 | box_code_3gpp.c | 236995747067078276861335410375287788449 | CWE-703 | CVE-2022-1441 | MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i... | https://nvd.nist.gov/vuln/detail/CVE-2022-1441 |
236,125 | gpac | 3dbe11b37d65c8472faf0654410068e5500b3adb | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb | fixed #2175 | 0 | GF_Err diST_box_read(GF_Box *s, GF_BitStream *bs)
{
GF_DIMSScriptTypesBox *p = (GF_DIMSScriptTypesBox *)s;
p->content_script_types = gf_malloc(sizeof(char) * (s->size+1));
if (!p->content_script_types) return GF_OUT_OF_MEM;
gf_bs_read_data(bs, p->content_script_types, s->size);
p->content_script_types[s->size] = ... | 296645158113148498272091333023062986276 | box_code_3gpp.c | 53964259103061248299506412136196602333 | CWE-703 | CVE-2022-1441 | MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i... | https://nvd.nist.gov/vuln/detail/CVE-2022-1441 |
196,276 | lsquic | a74702c630e108125e71898398737baec8f02238 | https://github.com/litespeedtech/lsquic | https://github.com/litespeedtech/lsquic/commit/a74702c630e108125e71898398737baec8f02238 | Release 3.1.0 | 1 | lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size,
unsigned dyn_table_size, unsigned max_risked_streams, int server)
{
enum lsqpack_enc_opts enc_opts;
assert(qeh->qeh_flags & QEH_INITIALIZED);
if (qeh->qeh_flags & QEH_HAVE_SETTINGS)
{
LSQ_WARN("settings alrea... | 304358665951404548699605657299704903588 | None | CWE-269 | CVE-2022-30592 | liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY. | https://nvd.nist.gov/vuln/detail/CVE-2022-30592 | |
237,885 | lsquic | a74702c630e108125e71898398737baec8f02238 | https://github.com/litespeedtech/lsquic | https://github.com/litespeedtech/lsquic/commit/a74702c630e108125e71898398737baec8f02238 | Release 3.1.0 | 0 | lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size,
unsigned dyn_table_size, unsigned max_risked_streams, int server)
{
enum lsqpack_enc_opts enc_opts;
assert(qeh->qeh_flags & QEH_INITIALIZED);
if (qeh->qeh_flags & QEH_HAVE_SETTINGS)
{
LSQ_WARN("settings alrea... | 213495580933926260913554982368628219722 | None | CWE-269 | CVE-2022-30592 | liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY. | https://nvd.nist.gov/vuln/detail/CVE-2022-30592 | |
196,316 | barebox | 0a9f9a7410681e55362f8311537ebc7be9ad0fbe | https://github.com/saschahauer/barebox | https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe | crypto: digest: use crypto_memneq()
When verifying a digest it is important not to leak timing information
through memcmp(). Use crypto_memneq() instead.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de> | 1 | int digest_generic_verify(struct digest *d, const unsigned char *md)
{
int ret;
int len = digest_length(d);
unsigned char *tmp;
tmp = xmalloc(len);
ret = digest_final(d, tmp);
if (ret)
goto end;
ret = memcmp(md, tmp, len);
ret = ret ? -EINVAL : 0;
end:
free(tmp);
return ret;
} | 71480685616976545176363965575731858659 | digest.c | 309636649404648894565051311749383985179 | CWE-200 | CVE-2021-37847 | crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification. | https://nvd.nist.gov/vuln/detail/CVE-2021-37847 |
238,322 | barebox | 0a9f9a7410681e55362f8311537ebc7be9ad0fbe | https://github.com/saschahauer/barebox | https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe | crypto: digest: use crypto_memneq()
When verifying a digest it is important not to leak timing information
through memcmp(). Use crypto_memneq() instead.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de> | 0 | int digest_generic_verify(struct digest *d, const unsigned char *md)
{
int ret;
int len = digest_length(d);
unsigned char *tmp;
tmp = xmalloc(len);
ret = digest_final(d, tmp);
if (ret)
goto end;
if (crypto_memneq(md, tmp, len))
ret = -EINVAL;
else
ret = 0;
end:
free(tmp);
return ret;
} | 320239189684468072245266956547158344510 | digest.c | 195235961590850585727206932057971391683 | CWE-200 | CVE-2021-37847 | crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification. | https://nvd.nist.gov/vuln/detail/CVE-2021-37847 |
196,328 | vim | 409510c588b1eec1ae33511ae97a21eb8e110895 | https://github.com/vim/vim | https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895 | patch 8.2.5050: using freed memory when searching for pattern in path
Problem: Using freed memory when searching for pattern in path.
Solution: Make a copy of the line. | 1 | find_pattern_in_path(
char_u *ptr, // pointer to search pattern
int dir UNUSED, // direction of expansion
int len, // length of search pattern
int whole, // match whole words only
int skip_comments, // don't match inside comments
int type, // Type of search; are we looking for a type?
... | 123923862521809134964983633516065480238 | search.c | 229512534202460810065416633781657256150 | CWE-416 | CVE-2022-1968 | Use After Free in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1968 |
238,803 | vim | 409510c588b1eec1ae33511ae97a21eb8e110895 | https://github.com/vim/vim | https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895 | patch 8.2.5050: using freed memory when searching for pattern in path
Problem: Using freed memory when searching for pattern in path.
Solution: Make a copy of the line. | 0 | find_pattern_in_path(
char_u *ptr, // pointer to search pattern
int dir UNUSED, // direction of expansion
int len, // length of search pattern
int whole, // match whole words only
int skip_comments, // don't match inside comments
int type, // Type of search; are we looking for a type?
... | 332560855806865581562523893033870446906 | search.c | 30662263767422374466151794140989574879 | CWE-416 | CVE-2022-1968 | Use After Free in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1968 |
196,578 | vim | 44db8213d38c39877d2148eff6a72f4beccfb94e | https://github.com/vim/vim | https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e | patch 8.2.4219: reading before the start of the line
Problem: Reading before the start of the line.
Solution: Check boundary before trying to read the character. | 1 | yank_copy_line(struct block_def *bd, long y_idx, int exclude_trailing_space)
{
char_u *pnew;
if (exclude_trailing_space)
bd->endspaces = 0;
if ((pnew = alloc(bd->startspaces + bd->endspaces + bd->textlen + 1))
== NULL)
return FAIL;
y_current->y_array[y_idx] = pnew;
vim_memset(pnew, ... | 329046653104270093704788517563971777510 | register.c | 197045442768005159362544298682780980387 | CWE-787 | CVE-2022-0407 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0407 |
240,276 | vim | 44db8213d38c39877d2148eff6a72f4beccfb94e | https://github.com/vim/vim | https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e | patch 8.2.4219: reading before the start of the line
Problem: Reading before the start of the line.
Solution: Check boundary before trying to read the character. | 0 | yank_copy_line(struct block_def *bd, long y_idx, int exclude_trailing_space)
{
char_u *pnew;
if (exclude_trailing_space)
bd->endspaces = 0;
if ((pnew = alloc(bd->startspaces + bd->endspaces + bd->textlen + 1))
== NULL)
return FAIL;
y_current->y_array[y_idx] = pnew;
vim_memset(pnew, ... | 215111577434116975174543951046273639484 | register.c | 303069020104340496076924952267660178460 | CWE-787 | CVE-2022-0407 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0407 |
196,587 | tensorflow | 4aacb30888638da75023e6601149415b39763d76 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76 | Disallow division by zero FPE in `tf.raw_ops.ResourceScatterDiv`
Had to update a test that was broken.
PiperOrigin-RevId: 388516976
Change-Id: Ic358e6bf0559e011539974d453fc7aa18b427e9c | 1 | void DoCompute(OpKernelContext* c) {
core::RefCountPtr<Var> v;
OP_REQUIRES_OK(c, LookupResource(c, HandleFromInput(c, 0), &v));
Tensor* params = v->tensor();
const Tensor& indices = c->input(1);
const Tensor& updates = c->input(2);
// Check that rank(updates.shape) = rank(indices.shape + para... | 322924980951140877428129021875471736973 | resource_variable_ops.cc | 290989719174845979221072798512679804902 | CWE-369 | CVE-2021-37642 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/re... | https://nvd.nist.gov/vuln/detail/CVE-2021-37642 |
240,595 | tensorflow | 4aacb30888638da75023e6601149415b39763d76 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76 | Disallow division by zero FPE in `tf.raw_ops.ResourceScatterDiv`
Had to update a test that was broken.
PiperOrigin-RevId: 388516976
Change-Id: Ic358e6bf0559e011539974d453fc7aa18b427e9c | 0 | void DoCompute(OpKernelContext* c) {
core::RefCountPtr<Var> v;
OP_REQUIRES_OK(c, LookupResource(c, HandleFromInput(c, 0), &v));
Tensor* params = v->tensor();
const Tensor& indices = c->input(1);
const Tensor& updates = c->input(2);
// Check that rank(updates.shape) = rank(indices.shape + para... | 249042864160254570036396062378524137135 | resource_variable_ops.cc | 303304073982532975843126024441239469279 | CWE-369 | CVE-2021-37642 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/re... | https://nvd.nist.gov/vuln/detail/CVE-2021-37642 |
196,611 | booth | 35bf0b7b048d715f671eb68974fb6b4af6528c67 | https://github.com/ClusterLabs/booth | https://github.com/ClusterLabs/booth/commit/35bf0b7b048d715f671eb68974fb6b4af6528c67 | Revert "Refactor: main: substitute is_auth_req macro"
This reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c.
authfile != authkey
Signed-off-by: Jan Friesse <jfriesse@redhat.com> | 1 | static int setup_config(int type)
{
int rv;
rv = read_config(cl.configfile, type);
if (rv < 0)
goto out;
if (is_auth_req()) {
rv = read_authkey();
if (rv < 0)
goto out;
#if HAVE_LIBGCRYPT
if (!gcry_check_version(NULL)) {
log_error("gcry_check_version");
rv = -ENOENT;
goto out;
}
gcry_contr... | 170997267947585139967201027163993257008 | main.c | 4814718832295442874488153140310945385 | CWE-284 | CVE-2022-2553 | The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster. | https://nvd.nist.gov/vuln/detail/CVE-2022-2553 |
241,040 | booth | 35bf0b7b048d715f671eb68974fb6b4af6528c67 | https://github.com/ClusterLabs/booth | https://github.com/ClusterLabs/booth/commit/35bf0b7b048d715f671eb68974fb6b4af6528c67 | Revert "Refactor: main: substitute is_auth_req macro"
This reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c.
authfile != authkey
Signed-off-by: Jan Friesse <jfriesse@redhat.com> | 0 | static int setup_config(int type)
{
int rv;
rv = read_config(cl.configfile, type);
if (rv < 0)
goto out;
if (booth_conf->authfile[0] != '\0') {
rv = read_authkey();
if (rv < 0)
goto out;
#if HAVE_LIBGCRYPT
if (!gcry_check_version(NULL)) {
log_error("gcry_check_version");
rv = -ENOENT;
goto out... | 89622919560301199125405967494920550093 | main.c | 219733327123326706215521846542751103807 | CWE-284 | CVE-2022-2553 | The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster. | https://nvd.nist.gov/vuln/detail/CVE-2022-2553 |
196,621 | mruby | b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | class.c: clear method cache after `remove_method`. | 1 | mrb_remove_method(mrb_state *mrb, struct RClass *c, mrb_sym mid)
{
mt_tbl *h;
MRB_CLASS_ORIGIN(c);
h = c->mt;
if (h && mt_del(mrb, h, mid)) return;
mrb_name_error(mrb, mid, "method '%n' not defined in %C", mid, c);
} | 310092184444521797404238692578019888834 | None | CWE-787 | CVE-2022-1286 | heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1286 | |
241,311 | mruby | b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | class.c: clear method cache after `remove_method`. | 0 | mrb_remove_method(mrb_state *mrb, struct RClass *c, mrb_sym mid)
{
mt_tbl *h;
MRB_CLASS_ORIGIN(c);
h = c->mt;
if (h && mt_del(mrb, h, mid)) {
mrb_mc_clear_by_class(mrb, c);
return;
}
mrb_name_error(mrb, mid, "method '%n' not defined in %C", mid, c);
} | 224777801914266123479513901810152701375 | None | CWE-787 | CVE-2022-1286 | heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1286 | |
196,629 | tensorflow | 579261dcd446385831fe4f7457d802a59685121d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d | Fix crash in MatrixSolve when inputs have different batch dimensions.
Before, the process would crash or certain elements would be silently ignored. Now an InvalidArgument is raised.
PiperOrigin-RevId: 384844020
Change-Id: Iba44417e383bdd0e1abc4012bfca83b2377dd335 | 1 | void ComputeAsync(OpKernelContext* context, DoneCallback done) final {
const Tensor& input = context->input(0);
const Tensor& rhs = context->input(1);
const int ndims = input.dims();
const int64 n = input.dim_size(ndims - 1);
const int64 nrhs = rhs.dim_size(ndims - 1);
// Validate inputs.
... | 232512673394609281083836207268567643755 | matrix_solve_op.cc | 18056043033202767652193305242094140715 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
241,369 | tensorflow | 579261dcd446385831fe4f7457d802a59685121d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d | Fix crash in MatrixSolve when inputs have different batch dimensions.
Before, the process would crash or certain elements would be silently ignored. Now an InvalidArgument is raised.
PiperOrigin-RevId: 384844020
Change-Id: Iba44417e383bdd0e1abc4012bfca83b2377dd335 | 0 | void ComputeAsync(OpKernelContext* context, DoneCallback done) final {
const Tensor& input = context->input(0);
const Tensor& rhs = context->input(1);
const int ndims = input.dims();
const int64 n = input.dim_size(ndims - 1);
const int64 nrhs = rhs.dim_size(ndims - 1);
// Validate inputs.
... | 213027909579375149223707117272594449042 | matrix_solve_op.cc | 56729187938743390978402639550963026335 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
196,689 | tensorflow | cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb | Fix tf.raw_ops.StagePeek vulnerability with invalid `index`.
Check that input is actually a scalar before treating it as such.
PiperOrigin-RevId: 445524908 | 1 | void Compute(OpKernelContext* ctx) override {
Buffer* buf = nullptr;
OP_REQUIRES_OK(ctx, GetBuffer(ctx, def(), &buf));
core::ScopedUnref scope(buf);
Buffer::Tuple tuple;
std::size_t index = ctx->input(0).scalar<int>()();
OP_REQUIRES_OK(ctx, buf->Peek(index, &tuple));
OP_REQUIRES(
... | 321476459442808105718031824942985787186 | stage_op.cc | 203338145673187111221975146552959312769 | CWE-703 | CVE-2022-29195 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a... | https://nvd.nist.gov/vuln/detail/CVE-2022-29195 |
242,619 | tensorflow | cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb | Fix tf.raw_ops.StagePeek vulnerability with invalid `index`.
Check that input is actually a scalar before treating it as such.
PiperOrigin-RevId: 445524908 | 0 | void Compute(OpKernelContext* ctx) override {
Buffer* buf = nullptr;
OP_REQUIRES_OK(ctx, GetBuffer(ctx, def(), &buf));
core::ScopedUnref scope(buf);
Buffer::Tuple tuple;
buf->Get(&tuple);
OP_REQUIRES(
ctx, tuple.size() == (size_t)ctx->num_outputs(),
errors::InvalidArgument("M... | 150871818833070085390431100112319012215 | stage_op.cc | 292796960162980121952379513053668377918 | CWE-703 | CVE-2022-29195 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a... | https://nvd.nist.gov/vuln/detail/CVE-2022-29195 |
196,691 | gpac | 71460d72ec07df766dab0a4d52687529f3efcf0a | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a | fixed #1876 | 1 | static GF_Err isoffin_process(GF_Filter *filter)
{
ISOMReader *read = gf_filter_get_udta(filter);
u32 i, count = gf_list_count(read->channels);
Bool is_active = GF_FALSE;
Bool in_is_eos = GF_FALSE;
Bool check_forced_end = GF_FALSE;
Bool has_new_data = GF_FALSE;
u64 min_offset_plus_one = 0;
u32 nb_forced_end=0;
... | 245491994913846374509516795584789756192 | isoffin_read.c | 80320074166992838039801529564251755054 | CWE-703 | CVE-2021-40592 | GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially... | https://nvd.nist.gov/vuln/detail/CVE-2021-40592 |
242,637 | gpac | 71460d72ec07df766dab0a4d52687529f3efcf0a | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a | fixed #1876 | 0 | static GF_Err isoffin_process(GF_Filter *filter)
{
ISOMReader *read = gf_filter_get_udta(filter);
u32 i, count = gf_list_count(read->channels);
Bool is_active = GF_FALSE;
Bool in_is_eos = GF_FALSE;
Bool check_forced_end = GF_FALSE;
Bool has_new_data = GF_FALSE;
u64 min_offset_plus_one = 0;
u32 nb_forced_end=0;
... | 305058451325362998718292493453495076439 | isoffin_read.c | 45568496591393007238506246573526523584 | CWE-703 | CVE-2021-40592 | GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially... | https://nvd.nist.gov/vuln/detail/CVE-2021-40592 |
196,698 | tensorflow | 67bfd9feeecfb3c61d80f0e46d89c170fbee682b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b | Make SparseFillEmptyRows validate that the length of `values` must be equal to the number of index tuples.
PiperOrigin-RevId: 399969549
Change-Id: I3c2f2ca1c1d2cc88bb5951c6958b38c16e9436c8 | 1 | void SparseFillEmptyRowsOpImpl(OpKernelContext* context,
AsyncOpKernel::DoneCallback done = nullptr) {
// Note that setting this empty lambda as the default parameter value directly
// can cause strange compiler/linker errors, so we do it like this instead.
if (!done) {
done = [... | 163337242627579814226114932816582213259 | sparse_fill_empty_rows_op.cc | 115550743256362209093747086328381163455 | CWE-125 | CVE-2021-41224 | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyRows` can be made to trigger a heap OOB access. This occurs whenever the size of `indices` does not match the size of `values`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick thi... | https://nvd.nist.gov/vuln/detail/CVE-2021-41224 |
242,899 | tensorflow | 67bfd9feeecfb3c61d80f0e46d89c170fbee682b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b | Make SparseFillEmptyRows validate that the length of `values` must be equal to the number of index tuples.
PiperOrigin-RevId: 399969549
Change-Id: I3c2f2ca1c1d2cc88bb5951c6958b38c16e9436c8 | 0 | void SparseFillEmptyRowsOpImpl(OpKernelContext* context,
AsyncOpKernel::DoneCallback done = nullptr) {
// Note that setting this empty lambda as the default parameter value directly
// can cause strange compiler/linker errors, so we do it like this instead.
if (!done) {
done = [... | 284557281436675521731008929242198087362 | None | CWE-125 | CVE-2021-41224 | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyRows` can be made to trigger a heap OOB access. This occurs whenever the size of `indices` does not match the size of `values`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick thi... | https://nvd.nist.gov/vuln/detail/CVE-2021-41224 | |
196,705 | tensorflow | 11ced8467eccad9c7cb94867708be8fa5c66c730 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730 | Fix UB in SparseTensorDenseAdd
Added more input validation to avoid nullptr dereferencing and array index
out of bounds issues.
PiperOrigin-RevId: 446192704 | 1 | Status ValidateInputs(const Tensor *a_indices, const Tensor *a_values,
const Tensor *a_shape, const Tensor *b) {
if (!TensorShapeUtils::IsMatrix(a_indices->shape())) {
return errors::InvalidArgument(
"Input a_indices should be a matrix but received shape: ",
a_indices->shape(... | 308425823880781073775676879611190785715 | sparse_tensor_dense_add_op.cc | 91198918327439956509177796541242214319 | CWE-20 | CVE-2022-29206 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Vers... | https://nvd.nist.gov/vuln/detail/CVE-2022-29206 |
242,926 | tensorflow | 11ced8467eccad9c7cb94867708be8fa5c66c730 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730 | Fix UB in SparseTensorDenseAdd
Added more input validation to avoid nullptr dereferencing and array index
out of bounds issues.
PiperOrigin-RevId: 446192704 | 0 | Status ValidateInputs(const Tensor *a_indices, const Tensor *a_values,
const Tensor *a_shape, const Tensor *b) {
if (!TensorShapeUtils::IsMatrix(a_indices->shape())) {
return errors::InvalidArgument(
"Input a_indices should be a matrix but received shape: ",
a_indices->shape(... | 310798775905628265586866839597720584207 | sparse_tensor_dense_add_op.cc | 106434963445193170812694157920438487376 | CWE-20 | CVE-2022-29206 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Vers... | https://nvd.nist.gov/vuln/detail/CVE-2022-29206 |
196,790 | tensorflow | a4e138660270e7599793fa438cd7b2fc2ce215a6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6 | Add remaining validation to `sdca_internal.cc`
PiperOrigin-RevId: 387738010
Change-Id: I28eedcfd87a53aaf34deb075acea1f8c95470808 | 1 | Status Examples::Initialize(OpKernelContext* const context,
const ModelWeights& weights,
const int num_sparse_features,
const int num_sparse_features_with_values,
const int num_dense_features) {
num_feature... | 183156860369052380668778554351089179754 | sdca_internal.cc | 189786435377355636606855329054946360663 | CWE-703 | CVE-2021-37672 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a832... | https://nvd.nist.gov/vuln/detail/CVE-2021-37672 |
245,140 | tensorflow | a4e138660270e7599793fa438cd7b2fc2ce215a6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6 | Add remaining validation to `sdca_internal.cc`
PiperOrigin-RevId: 387738010
Change-Id: I28eedcfd87a53aaf34deb075acea1f8c95470808 | 0 | Status Examples::Initialize(OpKernelContext* const context,
const ModelWeights& weights,
const int num_sparse_features,
const int num_sparse_features_with_values,
const int num_dense_features) {
num_feature... | 260741602322702772753001144224568198903 | sdca_internal.cc | 181960497028529937456505885431082793104 | CWE-703 | CVE-2021-37672 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a832... | https://nvd.nist.gov/vuln/detail/CVE-2021-37672 |
196,801 | gpac | f5a038e6893019ee471b6a57490cf7a495673816 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/f5a038e6893019ee471b6a57490cf7a495673816 | fixed #1885 | 1 | GF_Err gf_hinter_finalize(GF_ISOFile *file, GF_SDP_IODProfile IOD_Profile, u32 bandwidth)
{
u32 i, sceneT, odT, descIndex, size, size64;
GF_InitialObjectDescriptor *iod;
GF_SLConfig slc;
GF_ISOSample *samp;
Bool remove_ocr;
u8 *buffer;
char buf64[5000], sdpLine[5100];
gf_isom_sdp_clean(file);
if (bandwidth)... | 123828913884454942556959015680908121097 | isom_hinter.c | 94306079889139284150664165649647698827 | CWE-703 | CVE-2021-40567 | Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40567 |
245,434 | gpac | f5a038e6893019ee471b6a57490cf7a495673816 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/f5a038e6893019ee471b6a57490cf7a495673816 | fixed #1885 | 0 | GF_Err gf_hinter_finalize(GF_ISOFile *file, GF_SDP_IODProfile IOD_Profile, u32 bandwidth)
{
u32 i, sceneT, odT, descIndex, size, size64;
GF_InitialObjectDescriptor *iod;
GF_SLConfig slc;
GF_ISOSample *samp;
Bool remove_ocr;
u8 *buffer;
char buf64[5000], sdpLine[5100];
gf_isom_sdp_clean(file);
if (bandwidth)... | 303417005627420629887148853980716072397 | isom_hinter.c | 42590680344413091509080711519758588742 | CWE-703 | CVE-2021-40567 | Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40567 |
196,829 | tensorflow | 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 | Prevent segfault in `GetSessionHandle{,V2}`.
In eager mode, session state is null.
PiperOrigin-RevId: 332548597
Change-Id: If094812c2e094044220b9ba28f7d7601be042f38 | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor& val = ctx->input(0);
int64 id = ctx->session_state()->GetNewId();
TensorStore::TensorAndKey tk{val, id, requested_device()};
OP_REQUIRES_OK(ctx, ctx->tensor_store()->AddTensor(name(), tk));
Tensor* handle = nullptr;
OP_REQUIRES_OK(ct... | 265136132776865637405047291994320353020 | session_ops.cc | 301236181949638816884177571060128580318 | CWE-476 | CVE-2020-15204 | In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code imm... | https://nvd.nist.gov/vuln/detail/CVE-2020-15204 |
245,921 | tensorflow | 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1 | Prevent segfault in `GetSessionHandle{,V2}`.
In eager mode, session state is null.
PiperOrigin-RevId: 332548597
Change-Id: If094812c2e094044220b9ba28f7d7601be042f38 | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor& val = ctx->input(0);
auto session_state = ctx->session_state();
OP_REQUIRES(ctx, session_state != nullptr,
errors::FailedPrecondition(
"GetSessionHandle called on null session state"));
int64 id = session_s... | 297244264653800469833284157710994110214 | session_ops.cc | 303341858564051211151362713951438565129 | CWE-476 | CVE-2020-15204 | In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code imm... | https://nvd.nist.gov/vuln/detail/CVE-2020-15204 |
196,834 | tensorflow | 701cfaca222a82afbeeb17496bd718baa65a67d2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2 | Fix heap out of bounds error in tf.raw_ops.SparseCountSparseOutput shape inference when it is called with invalid inputs, and add a test for it.
PiperOrigin-RevId: 405766415
Change-Id: I77d244ef35f351ef7b6f821efd959cac2c66db24 | 1 | Status SparseCountSparseOutputShapeFn(InferenceContext *c) {
auto rank = c->Dim(c->input(0), 1);
auto nvals = c->UnknownDim();
c->set_output(0, c->Matrix(nvals, rank)); // out.indices
c->set_output(1, c->Vector(nvals)); // out.values
c->set_output(2, c->Vector(rank)); // out.dense_shape
retu... | 288638774639466658606082764141579193752 | count_ops.cc | 285251304555239344227100279342018211632 | CWE-125 | CVE-2021-41210 | TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for `SparseCountSparseOutput` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5... | https://nvd.nist.gov/vuln/detail/CVE-2021-41210 |
246,207 | tensorflow | 701cfaca222a82afbeeb17496bd718baa65a67d2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2 | Fix heap out of bounds error in tf.raw_ops.SparseCountSparseOutput shape inference when it is called with invalid inputs, and add a test for it.
PiperOrigin-RevId: 405766415
Change-Id: I77d244ef35f351ef7b6f821efd959cac2c66db24 | 0 | Status SparseCountSparseOutputShapeFn(InferenceContext *c) {
ShapeHandle unused;
TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 2, &unused));
auto rank = c->Dim(c->input(0), 1);
auto nvals = c->UnknownDim();
c->set_output(0, c->Matrix(nvals, rank)); // out.indices
c->set_output(1, c->Vector(nvals)); //... | 271491902662668268509988539707707762247 | count_ops.cc | 129709593460413124359725410007396484757 | CWE-125 | CVE-2021-41210 | TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for `SparseCountSparseOutput` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5... | https://nvd.nist.gov/vuln/detail/CVE-2021-41210 |
196,841 | furnace | 0eb02422d5161767e9983bdaa5c429762d3477ce | https://github.com/tildearrow/furnace | https://github.com/tildearrow/furnace/commit/0eb02422d5161767e9983bdaa5c429762d3477ce | fix possible pattern crash
issue #325 | 1 | inline void FurnaceGUI::patternRow(int i, bool isPlaying, float lineHeight, int chans, int ord, const DivPattern** patCache) {
static char id[32];
bool selectedRow=(i>=sel1.y && i<=sel2.y);
ImGui::TableNextRow(0,lineHeight);
ImGui::TableNextColumn();
float cursorPosY=ImGui::GetCursorPos().y-ImGui::GetScrollY(... | 17036366544095628794236625993100848883 | pattern.cpp | 65197606135408680585944772278654686188 | CWE-703 | CVE-2022-1289 | A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce. | https://nvd.nist.gov/vuln/detail/CVE-2022-1289 |
246,237 | furnace | 0eb02422d5161767e9983bdaa5c429762d3477ce | https://github.com/tildearrow/furnace | https://github.com/tildearrow/furnace/commit/0eb02422d5161767e9983bdaa5c429762d3477ce | fix possible pattern crash
issue #325 | 0 | inline void FurnaceGUI::patternRow(int i, bool isPlaying, float lineHeight, int chans, int ord, const DivPattern** patCache) {
static char id[32];
bool selectedRow=(i>=sel1.y && i<=sel2.y);
ImGui::TableNextRow(0,lineHeight);
ImGui::TableNextColumn();
float cursorPosY=ImGui::GetCursorPos().y-ImGui::GetScrollY(... | 128714146198604784815522114188273080778 | pattern.cpp | 168724633676180669300352035041454609320 | CWE-703 | CVE-2022-1289 | A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce. | https://nvd.nist.gov/vuln/detail/CVE-2022-1289 |
196,846 | tensorflow | 1e206baedf8bef0334cca3eb92bab134ef525a28 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28 | Prevent a division by 0 in division ops.
PiperOrigin-RevId: 385223169
Change-Id: Ia4228960b5d2aa44480385f74bdd70d21a3613c3 | 1 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
auto* params = reinterpret_cast<TfLiteDivParams*>(node->builtin_data);
OpData* data = reinterpret_cast<OpData*>(node->user_data);
const TfLiteTensor* input1;
TF_LITE_ENSURE_OK(context,
GetInputSafe(context, node, kInputTensor1, &... | 74793210691338682931219587955813295204 | div.cc | 136615346340517059112870142252291864399 | CWE-369 | CVE-2021-37683 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the... | https://nvd.nist.gov/vuln/detail/CVE-2021-37683 |
246,495 | tensorflow | 1e206baedf8bef0334cca3eb92bab134ef525a28 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28 | Prevent a division by 0 in division ops.
PiperOrigin-RevId: 385223169
Change-Id: Ia4228960b5d2aa44480385f74bdd70d21a3613c3 | 0 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
auto* params = reinterpret_cast<TfLiteDivParams*>(node->builtin_data);
OpData* data = reinterpret_cast<OpData*>(node->user_data);
const TfLiteTensor* input1;
TF_LITE_ENSURE_OK(context,
GetInputSafe(context, node, kInputTensor1, &... | 11976239460896947994282427616906942562 | div.cc | 298114320359155685162419383998362245720 | CWE-369 | CVE-2021-37683 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the... | https://nvd.nist.gov/vuln/detail/CVE-2021-37683 |
196,860 | gpac | a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | fixed #1782 (fuzz) | 1 | GF_Err afra_box_read(GF_Box *s, GF_BitStream *bs)
{
unsigned int i;
GF_AdobeFragRandomAccessBox *ptr = (GF_AdobeFragRandomAccessBox *)s;
ISOM_DECREASE_SIZE(ptr, 9)
ptr->long_ids = gf_bs_read_int(bs, 1);
ptr->long_offsets = gf_bs_read_int(bs, 1);
ptr->global_entries = gf_bs_read_int(bs, 1);
ptr->reserved = gf_bs... | 312927211426500504617752335989791880756 | None | CWE-787 | CVE-2021-33361 | Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2021-33361 | |
246,693 | gpac | a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | fixed #1782 (fuzz) | 0 | GF_Err afra_box_read(GF_Box *s, GF_BitStream *bs)
{
unsigned int i;
GF_AdobeFragRandomAccessBox *ptr = (GF_AdobeFragRandomAccessBox *)s;
ISOM_DECREASE_SIZE(ptr, 9)
ptr->long_ids = gf_bs_read_int(bs, 1);
ptr->long_offsets = gf_bs_read_int(bs, 1);
ptr->global_entries = gf_bs_read_int(bs, 1);
ptr->reserved = gf_bs... | 301022642870722199968022360468016167215 | None | CWE-787 | CVE-2021-33361 | Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2021-33361 | |
196,885 | tensorflow | 9e62869465573cb2d9b5053f1fa02a81fce21d69 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69 | Add more validation to `RequantizationRangePerChannel`.
PiperOrigin-RevId: 387693946
Change-Id: Ife8dcbdb021bec4787eef6a4361dd08f17c14bd6 | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor& input = ctx->input(kInputTensorIndex);
const Tensor& input_min = ctx->input(kInputMinIndex);
const Tensor& input_max = ctx->input(kInputMaxIndex);
const size_t depth = input_max.NumElements();
OP_REQUIRES(
ctx, input_min.dim_size... | 260350269729869693096839937488434150493 | mkl_requantization_range_per_channel_op.cc | 184757242449876370761844438653930390458 | CWE-703 | CVE-2021-37665 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [impl... | https://nvd.nist.gov/vuln/detail/CVE-2021-37665 |
247,290 | tensorflow | 9e62869465573cb2d9b5053f1fa02a81fce21d69 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69 | Add more validation to `RequantizationRangePerChannel`.
PiperOrigin-RevId: 387693946
Change-Id: Ife8dcbdb021bec4787eef6a4361dd08f17c14bd6 | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor& input = ctx->input(kInputTensorIndex);
const Tensor& input_min = ctx->input(kInputMinIndex);
const Tensor& input_max = ctx->input(kInputMaxIndex);
const size_t depth = input_max.NumElements();
OP_REQUIRES(
ctx, input_min.dim_size... | 65335252627103993681002050942452280098 | mkl_requantization_range_per_channel_op.cc | 130833376136830385582561054482718538709 | CWE-703 | CVE-2021-37665 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [impl... | https://nvd.nist.gov/vuln/detail/CVE-2021-37665 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.