idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
string
file_name
string
file_hash
string
cwe
string
cve
string
cve_desc
string
nvd_url
string
195,391
tensorflow
f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
Add a check for pad width to be a positive value. PiperOrigin-RevId: 413275853 Change-Id: I261a8db9dabf5ce48a806a9e58129080c9fac619
1
void Compute(tensorflow::OpKernelContext* context) override { for (int ngram_width : ngram_widths_) { OP_REQUIRES( context, ngram_width > 0, errors::InvalidArgument("ngram_widths must contain positive values")); } const tensorflow::Tensor* data; OP_REQUIRES_OK(context, conte...
93012019628610956612764593105283326156
string_ngrams_op.cc
245905885483763938680185872776744444218
CWE-190
CVE-2022-21733
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` whic...
https://nvd.nist.gov/vuln/detail/CVE-2022-21733
225,125
tensorflow
f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
Add a check for pad width to be a positive value. PiperOrigin-RevId: 413275853 Change-Id: I261a8db9dabf5ce48a806a9e58129080c9fac619
0
void Compute(tensorflow::OpKernelContext* context) override { for (int ngram_width : ngram_widths_) { OP_REQUIRES( context, ngram_width > 0, errors::InvalidArgument("ngram_widths must contain positive values")); } const tensorflow::Tensor* data; OP_REQUIRES_OK(context, conte...
39926051817459528222102206002528990438
string_ngrams_op.cc
275635386609741564508341080525906256433
CWE-190
CVE-2022-21733
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` whic...
https://nvd.nist.gov/vuln/detail/CVE-2022-21733
195,398
v4l2loopback
e4cd225557486c420f6a34411f98c575effd43dd
https://github.com/umlaeute/v4l2loopback
https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd
add explicit format specifier to printf() invocations CWE-134
1
static int vidioc_querycap(struct file *file, void *priv, struct v4l2_capability *cap) { struct v4l2_loopback_device *dev = v4l2loopback_getdevice(file); int labellen = (sizeof(cap->card) < sizeof(dev->card_label)) ? sizeof(cap->card) : sizeof(dev->card_label); int device_nr = ((struct v4l...
275249025528691740507199336736969659771
v4l2loopback.c
113113223463037707180278012059265756483
CWE-134
CVE-2022-2652
Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
https://nvd.nist.gov/vuln/detail/CVE-2022-2652
225,383
v4l2loopback
e4cd225557486c420f6a34411f98c575effd43dd
https://github.com/umlaeute/v4l2loopback
https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd
add explicit format specifier to printf() invocations CWE-134
0
static int vidioc_querycap(struct file *file, void *priv, struct v4l2_capability *cap) { struct v4l2_loopback_device *dev = v4l2loopback_getdevice(file); int labellen = (sizeof(cap->card) < sizeof(dev->card_label)) ? sizeof(cap->card) : sizeof(dev->card_label); int device_nr = ((struct v4l...
178769376518603723181418371440757147493
v4l2loopback.c
138252299614112344688826607831650943411
CWE-134
CVE-2022-2652
Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).
https://nvd.nist.gov/vuln/detail/CVE-2022-2652
195,399
tensorflow
045deec1cbdebb27d817008ad5df94d96a08b1bf
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf
Prevent null pointer dereference in `mutable_graph_view` PiperOrigin-RevId: 409684472 Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c
1
bool IsIdentityConsumingSwitch(const MutableGraphView& graph, const NodeDef& node) { if ((IsIdentity(node) || IsIdentityNSingleInput(node)) && node.input_size() > 0) { TensorId tensor_id = ParseTensorName(node.input(0)); if (IsTensorIdControlling(tensor_id)) { return...
313619660222966312087557415210995637728
mutable_graph_view.cc
11824580899895481141820753687530297202
CWE-476
CVE-2022-23589
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec...
https://nvd.nist.gov/vuln/detail/CVE-2022-23589
225,473
tensorflow
045deec1cbdebb27d817008ad5df94d96a08b1bf
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf
Prevent null pointer dereference in `mutable_graph_view` PiperOrigin-RevId: 409684472 Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c
0
bool IsIdentityConsumingSwitch(const MutableGraphView& graph, const NodeDef& node) { if ((IsIdentity(node) || IsIdentityNSingleInput(node)) && node.input_size() > 0) { TensorId tensor_id = ParseTensorName(node.input(0)); if (IsTensorIdControlling(tensor_id)) { return...
186036134407007049668950369044144546274
mutable_graph_view.cc
183902084895507336616240181892029435869
CWE-476
CVE-2022-23589
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec...
https://nvd.nist.gov/vuln/detail/CVE-2022-23589
195,402
tensorflow
a1e1511dde36b3f8aa27a6ec630838e7ea40e091
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091
[lite] Update TfLiteIntArrayCreate to return size_t PiperOrigin-RevId: 416439896 Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b
1
int TfLiteIntArrayGetSizeInBytes(int size) { static TfLiteIntArray dummy; int computed_size = sizeof(dummy) + sizeof(dummy.data[0]) * size; #if defined(_MSC_VER) // Context for why this is needed is in http://b/189926408#comment21 computed_size -= sizeof(dummy.data[0]); #endif return computed_size; }
331591508579524081379498872268044006906
common.c
227108095659128555473924245568634074234
CWE-190
CVE-2022-23558
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in...
https://nvd.nist.gov/vuln/detail/CVE-2022-23558
225,547
tensorflow
a1e1511dde36b3f8aa27a6ec630838e7ea40e091
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091
[lite] Update TfLiteIntArrayCreate to return size_t PiperOrigin-RevId: 416439896 Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b
0
size_t TfLiteIntArrayGetSizeInBytes(int size) { static TfLiteIntArray dummy; size_t computed_size = sizeof(dummy) + sizeof(dummy.data[0]) * size; #if defined(_MSC_VER) // Context for why this is needed is in http://b/189926408#comment21 computed_size -= sizeof(dummy.data[0]); #endif return computed_size; }
132887753534839828949485916264712284974
common.c
141963346575108043523158725755967478163
CWE-190
CVE-2022-23558
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in...
https://nvd.nist.gov/vuln/detail/CVE-2022-23558
195,403
tensorflow
a1e1511dde36b3f8aa27a6ec630838e7ea40e091
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091
[lite] Update TfLiteIntArrayCreate to return size_t PiperOrigin-RevId: 416439896 Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b
1
TfLiteIntArray* TfLiteIntArrayCreate(int size) { int alloc_size = TfLiteIntArrayGetSizeInBytes(size); if (alloc_size <= 0) return NULL; TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size); if (!ret) return ret; ret->size = size; return ret; }
64742066879088615123277599572040485093
common.c
227108095659128555473924245568634074234
CWE-190
CVE-2022-23558
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in...
https://nvd.nist.gov/vuln/detail/CVE-2022-23558
225,552
tensorflow
a1e1511dde36b3f8aa27a6ec630838e7ea40e091
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091
[lite] Update TfLiteIntArrayCreate to return size_t PiperOrigin-RevId: 416439896 Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b
0
TfLiteIntArray* TfLiteIntArrayCreate(int size) { size_t alloc_size = TfLiteIntArrayGetSizeInBytes(size); if (alloc_size <= 0) return NULL; TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size); if (!ret) return ret; ret->size = size; return ret; }
125057143458607684207882855383643521977
common.c
141963346575108043523158725755967478163
CWE-190
CVE-2022-23558
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in...
https://nvd.nist.gov/vuln/detail/CVE-2022-23558
195,404
tensorflow
ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb
Fix potential divide by zero error when executing FractionalMaxPool, when pooling ratio is higher than input size for a particular dimension. PiperOrigin-RevId: 412151722 Change-Id: I06e57cbb8eca43816eff79eac264fa7aae8f7163
1
void Compute(OpKernelContext* context) override { typedef Eigen::Map<const Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>> ConstEigenMatrixMap; typedef Eigen::Map<Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>> EigenMatrixMap; constexpr int tensor_in_and_out_dims = 4; const Tenso...
329653208386215793548956261636203970964
fractional_max_pool_op.cc
38088244475067119710916669469162645605
CWE-369
CVE-2022-21735
Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are al...
https://nvd.nist.gov/vuln/detail/CVE-2022-21735
225,563
tensorflow
ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb
Fix potential divide by zero error when executing FractionalMaxPool, when pooling ratio is higher than input size for a particular dimension. PiperOrigin-RevId: 412151722 Change-Id: I06e57cbb8eca43816eff79eac264fa7aae8f7163
0
void Compute(OpKernelContext* context) override { typedef Eigen::Map<const Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>> ConstEigenMatrixMap; typedef Eigen::Map<Eigen::Matrix<T, Eigen::Dynamic, Eigen::Dynamic>> EigenMatrixMap; constexpr int tensor_in_and_out_dims = 4; const Tenso...
116843352571391588046661724660779526999
fractional_max_pool_op.cc
167950097941581661250535285107700244508
CWE-369
CVE-2022-21735
Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are al...
https://nvd.nist.gov/vuln/detail/CVE-2022-21735
195,405
ImageMagick6
29c8abce0da56b536542f76a9ddfebdaab5b2943
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943
https://github.com/ImageMagick/ImageMagick/pull/4986
1
static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CropBox "CropBox" #define DeviceCMYK "DeviceCMYK" #define MediaBox "MediaBox" #define RenderPCLText " Rendering PCL... " char command[MaxTextExtent], *density, filename[MaxTextExtent], geometry[MaxTextExt...
285956846610376765198872183403915882061
pcl.c
338547174937023730341471137685130471169
CWE-190
CVE-2022-32546
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
https://nvd.nist.gov/vuln/detail/CVE-2022-32546
225,566
ImageMagick6
29c8abce0da56b536542f76a9ddfebdaab5b2943
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943
https://github.com/ImageMagick/ImageMagick/pull/4986
0
static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CropBox "CropBox" #define DeviceCMYK "DeviceCMYK" #define MediaBox "MediaBox" #define RenderPCLText " Rendering PCL... " char command[MaxTextExtent], *density, filename[MaxTextExtent], geometry[MaxTextExt...
83929363874861063792960158581169163951
pcl.c
19401947442598835469700605981025281430
CWE-190
CVE-2022-32546
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
https://nvd.nist.gov/vuln/detail/CVE-2022-32546
195,409
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
fixed #2092
1
void gitn_box_del(GF_Box *s) { u32 i; GroupIdToNameBox *ptr = (GroupIdToNameBox *)s; if (ptr == NULL) return; for (i=0; i<ptr->nb_entries; i++) { if (ptr->entries[i].name) gf_free(ptr->entries[i].name); } if (ptr->entries) gf_free(ptr->entries); gf_free(ptr);
37642310110270321687625000100653046485
box_code_base.c
212802147696207025803784466432150384318
CWE-476
CVE-2021-4043
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.
https://nvd.nist.gov/vuln/detail/CVE-2021-4043
226,029
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
fixed #2092
0
void gitn_box_del(GF_Box *s) { u32 i; GroupIdToNameBox *ptr = (GroupIdToNameBox *)s; if (ptr == NULL) return; if (ptr->entries) { for (i=0; i<ptr->nb_entries; i++) { if (ptr->entries[i].name) gf_free(ptr->entries[i].name); } gf_free(ptr->entries); } gf_free(ptr);
265612189453593240220286582640125308421
box_code_base.c
49851003819063672326837979869211393199
CWE-476
CVE-2021-4043
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.
https://nvd.nist.gov/vuln/detail/CVE-2021-4043
195,410
tensorflow
965b97e4a9650495cda5a8c210ef6684b4b9eceb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb
Properly validate sparse tensor in `SparseTensorSliceDataset` Existing validation was incomplete. PiperOrigin-RevId: 415375048 Change-Id: I14cd18f29ede73286f3ffac35171bd15828997e9
1
void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override { // Create a new SparseTensorSliceDatasetOp::Dataset, insert it in // the step container, and return it as the output. const Tensor* indices; OP_REQUIRES_OK(ctx, ctx->input("indices", &indices)); const Tensor* values; OP_RE...
232798786480644222523895580158118045723
sparse_tensor_slice_dataset_op.cc
20179985196620256343354076777909821072
CWE-476
CVE-2022-21736
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditio...
https://nvd.nist.gov/vuln/detail/CVE-2022-21736
226,433
tensorflow
965b97e4a9650495cda5a8c210ef6684b4b9eceb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb
Properly validate sparse tensor in `SparseTensorSliceDataset` Existing validation was incomplete. PiperOrigin-RevId: 415375048 Change-Id: I14cd18f29ede73286f3ffac35171bd15828997e9
0
void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override { // Create a new SparseTensorSliceDatasetOp::Dataset, insert it in // the step container, and return it as the output. const Tensor* indices; OP_REQUIRES_OK(ctx, ctx->input("indices", &indices)); const Tensor* values; OP_RE...
227797014623034241967270311347340556143
sparse_tensor_slice_dataset_op.cc
223168035118292217298610217555690212472
CWE-476
CVE-2022-21736
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditio...
https://nvd.nist.gov/vuln/detail/CVE-2022-21736
195,471
weechat
9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a
https://github.com/weechat/weechat
https://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a
irc: fix crash when receiving a malformed message 352 (who) Thanks to Stuart Nevans Locke for reporting the issue.
1
IRC_PROTOCOL_CALLBACK(352) { char *pos_attr, *pos_hopcount, *pos_realname, *str_host; int arg_start, length; struct t_irc_channel *ptr_channel; struct t_irc_nick *ptr_nick; IRC_PROTOCOL_MIN_ARGS(5); /* silently ignore malformed 352 message (missing infos) */ if (argc < 8) return WE...
334241185700640959176375322270000746009
irc-protocol.c
25326141648227228091841815556030791460
CWE-476
CVE-2020-9759
A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files.
https://nvd.nist.gov/vuln/detail/CVE-2020-9759
227,022
weechat
9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a
https://github.com/weechat/weechat
https://github.com/weechat/weechat/commit/9904cb6d2eb40f679d8ff6557c22d53a3e3dc75a
irc: fix crash when receiving a malformed message 352 (who) Thanks to Stuart Nevans Locke for reporting the issue.
0
IRC_PROTOCOL_CALLBACK(352) { char *pos_attr, *pos_hopcount, *pos_realname, *str_host; int arg_start, length; struct t_irc_channel *ptr_channel; struct t_irc_nick *ptr_nick; IRC_PROTOCOL_MIN_ARGS(5); /* silently ignore malformed 352 message (missing infos) */ if (argc < 8) return WE...
240473779372461876579512981083881440945
irc-protocol.c
267510684279184111108460541610753784321
CWE-476
CVE-2020-9759
A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files.
https://nvd.nist.gov/vuln/detail/CVE-2020-9759
195,565
hhvm
dbeb9a56a638e3fdcef8b691c2a2967132dae692
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692
string_number_format: Correctly handles return value of snprintf Summary: `snprintf` can return a value greater than the number of bytes copied. In case the first byte of the string is not a digit (could be '-'), size of `tmpstr` was being updated without checking `tmplen`. This resulted in either an assertion error o...
1
String string_number_format(double d, int dec, const String& dec_point, const String& thousand_sep) { char *tmpbuf = nullptr, *resbuf; char *s, *t; /* source, target */ char *dp; int integral; int tmplen, reslen=0; int count=0; int is_negative=0; ...
125018652199743804521817207176944376682
zend-string.cpp
157727558891612041764030573186624095506
CWE-119
CVE-2019-11929
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19....
https://nvd.nist.gov/vuln/detail/CVE-2019-11929
228,563
hhvm
dbeb9a56a638e3fdcef8b691c2a2967132dae692
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/dbeb9a56a638e3fdcef8b691c2a2967132dae692
string_number_format: Correctly handles return value of snprintf Summary: `snprintf` can return a value greater than the number of bytes copied. In case the first byte of the string is not a digit (could be '-'), size of `tmpstr` was being updated without checking `tmplen`. This resulted in either an assertion error o...
0
String string_number_format(double d, int dec, const String& dec_point, const String& thousand_sep) { char *tmpbuf = nullptr, *resbuf; char *s, *t; /* source, target */ char *dp; int integral; int tmplen, reslen=0; int count=0; int is_negative=0; ...
113449506030420962381960959197350451885
zend-string.cpp
48155053696740279281010358677614070619
CWE-119
CVE-2019-11929
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19....
https://nvd.nist.gov/vuln/detail/CVE-2019-11929
195,626
qemu
7882080388be5088e72c425b02223c02e6cb4295
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
virtio-serial: fix ANY_LAYOUT Don't assume a specific layout for control messages. Required by virtio 1. Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Reviewed-by: Amit Shah <amit.shah@redhat.com> Reviewed-by: Jason Wang <jasowang@redhat.com>
1
static size_t send_control_msg(VirtIOSerial *vser, void *buf, size_t len) { VirtQueueElement elem; VirtQueue *vq; vq = vser->c_ivq; if (!virtio_queue_ready(vq)) { return 0; } if (!virtqueue_pop(vq, &elem)) { return 0; } memcpy(elem.in_sg[0].iov_base, buf, len); vir...
301712778748262907171467771526276497164
virtio-serial-bus.c
253157734411856913752064284433381457044
CWE-787
CVE-2015-5745
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
https://nvd.nist.gov/vuln/detail/CVE-2015-5745
229,165
qemu
7882080388be5088e72c425b02223c02e6cb4295
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
virtio-serial: fix ANY_LAYOUT Don't assume a specific layout for control messages. Required by virtio 1. Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Reviewed-by: Amit Shah <amit.shah@redhat.com> Reviewed-by: Jason Wang <jasowang@redhat.com>
0
static size_t send_control_msg(VirtIOSerial *vser, void *buf, size_t len) { VirtQueueElement elem; VirtQueue *vq; vq = vser->c_ivq; if (!virtio_queue_ready(vq)) { return 0; } if (!virtqueue_pop(vq, &elem)) { return 0; } /* TODO: detect a buffer that's too short, set NEE...
134405066708210322765218436102220814555
virtio-serial-bus.c
85242612776593478078186690625596682650
CWE-787
CVE-2015-5745
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
https://nvd.nist.gov/vuln/detail/CVE-2015-5745
195,629
tensorflow
a5b89cd68c02329d793356bda85d079e9e69b4e7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7
Fix empty resource handle vulnerability. Some ops that attempt to extract a resource handle from user input can lead to nullptr dereferences. This returns an error in such a case. PiperOrigin-RevId: 445571938
1
Status GetDeviceForInput(const EagerOperation& op, const EagerContext& ctx, TensorHandle* tensor_handle, Device** result) { Device* cpu_device = ctx.HostCPU(); string device_name; if (tensor_handle->Type() != TensorHandle::LOCAL) { Device* device = tensor_handle->device(); device_...
227007805370541421392187811352073944672
execute.cc
250138698264718373642663717664797527317
CWE-476
CVE-2022-29207
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eage...
https://nvd.nist.gov/vuln/detail/CVE-2022-29207
229,337
tensorflow
a5b89cd68c02329d793356bda85d079e9e69b4e7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7
Fix empty resource handle vulnerability. Some ops that attempt to extract a resource handle from user input can lead to nullptr dereferences. This returns an error in such a case. PiperOrigin-RevId: 445571938
0
Status GetDeviceForInput(const EagerOperation& op, const EagerContext& ctx, TensorHandle* tensor_handle, Device** result) { Device* cpu_device = ctx.HostCPU(); string device_name; if (tensor_handle->Type() != TensorHandle::LOCAL) { Device* device = tensor_handle->device(); device_...
302726579392319306560767073266874435577
execute.cc
29379316032335742084912200348793889272
CWE-476
CVE-2022-29207
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eage...
https://nvd.nist.gov/vuln/detail/CVE-2022-29207
195,665
njs
2e00e95473861846aa8538be87db07699d9f676d
https://github.com/nginx/njs
https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d
Fixed Array.prototype.slice() with slow "this" argument. Previously, when "this" argument was not a fast array, but the "deleted" array was a fast array, the "deleted" array may be left in uninitialized state if "this" argument had gaps. This fix is to ensure that "deleted" is properly initialized. This fixes #485 i...
1
njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, njs_index_t unused) { int64_t i, n, start, length, items, delta, delete; njs_int_t ret; njs_value_t *this, value, del_object; njs_array_t *array, *deleted; this = njs_argument(args, 0); ret = njs_value_...
41889957200154277256182614621042854713
njs_array.c
27861953644579332654826088207600556930
CWE-703
CVE-2022-29779
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-29779
230,302
njs
2e00e95473861846aa8538be87db07699d9f676d
https://github.com/nginx/njs
https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d
Fixed Array.prototype.slice() with slow "this" argument. Previously, when "this" argument was not a fast array, but the "deleted" array was a fast array, the "deleted" array may be left in uninitialized state if "this" argument had gaps. This fix is to ensure that "deleted" is properly initialized. This fixes #485 i...
0
njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, njs_index_t unused) { int64_t i, n, start, length, items, delta, delete; njs_int_t ret; njs_value_t *this, value, del_object; njs_array_t *array, *deleted; this = njs_argument(args, 0); ret = njs_value_...
91452857281463208584852927019432341939
njs_array.c
127478727069540736637535553874506726763
CWE-703
CVE-2022-29779
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-29779
195,670
pjproject
856f87c2e97a27b256482dbe0d748b1194355a21
https://github.com/pjsip/pjproject
https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21
Merge pull request from GHSA-5x45-qp78-g4p4 * Prevent infinite loop in scanning xml content * Simplify scanning method * Optimization
1
static pj_xml_node *xml_parse_node( pj_pool_t *pool, pj_scanner *scanner) { pj_xml_node *node; pj_str_t end_name; PJ_CHECK_STACK(); if (*scanner->curptr != '<') on_syntax_error(scanner); /* Handle Processing Instructino (PI) construct (i.e. "<?") */ if (*scanner->curptr == '<' && *(scanner->...
277240174945375908655928995975016589842
xml.c
319030018310003515806173873266013713455
CWE-703
CVE-2022-24763
PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.
https://nvd.nist.gov/vuln/detail/CVE-2022-24763
230,394
pjproject
856f87c2e97a27b256482dbe0d748b1194355a21
https://github.com/pjsip/pjproject
https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21
Merge pull request from GHSA-5x45-qp78-g4p4 * Prevent infinite loop in scanning xml content * Simplify scanning method * Optimization
0
static pj_xml_node *xml_parse_node( pj_pool_t *pool, pj_scanner *scanner) { pj_xml_node *node; pj_str_t end_name; PJ_CHECK_STACK(); if (*scanner->curptr != '<') on_syntax_error(scanner); /* Handle Processing Instructino (PI) construct (i.e. "<?") */ if (*scanner->curptr == '<' && *(scanner->...
333353357538572797993178277028111202319
xml.c
137943726532385231053862962299057228575
CWE-703
CVE-2022-24763
PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.
https://nvd.nist.gov/vuln/detail/CVE-2022-24763
195,691
mruby
a4d97934d51cb88954cc49161dc1d151f64afb6b
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
vm.c: check if target_class is NULL (when prepended).
1
mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) { /* mrb_assert(MRB_PROC_CFUNC_P(proc)) */ const mrb_irep *irep = proc->body.irep; const mrb_pool_value *pool = irep->pool; const mrb_sym *syms = irep->syms; mrb_code insn; int ai = mrb_gc_arena_save(mrb); struct mrb_jmpbuf *prev_jm...
44658455618798852770197569753613577766
vm.c
164058079299968555060167307813659313262
CWE-703
CVE-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
https://nvd.nist.gov/vuln/detail/CVE-2022-1427
231,012
mruby
a4d97934d51cb88954cc49161dc1d151f64afb6b
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
vm.c: check if target_class is NULL (when prepended).
0
mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) { /* mrb_assert(MRB_PROC_CFUNC_P(proc)) */ const mrb_irep *irep = proc->body.irep; const mrb_pool_value *pool = irep->pool; const mrb_sym *syms = irep->syms; mrb_code insn; int ai = mrb_gc_arena_save(mrb); struct mrb_jmpbuf *prev_jm...
104703994590688087058145131124808583742
vm.c
126976644189338180144758453935885521875
CWE-703
CVE-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
https://nvd.nist.gov/vuln/detail/CVE-2022-1427
195,692
FreeRTOS-Kernel
47338393f1f79558f6144213409f09f81d7c4837
https://github.com/FreeRTOS/FreeRTOS-Kernel
https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/47338393f1f79558f6144213409f09f81d7c4837
add assert for addition overflow on queue creation (#225)
1
QueueHandle_t xQueueGenericCreate( const UBaseType_t uxQueueLength, const UBaseType_t uxItemSize, const uint8_t ucQueueType ) { Queue_t * pxNewQueue; size_t xQueueSizeInBytes; uint8_t * pucQueueStorage; ...
278728915886701481135388633284092658774
queue.c
44156660200315650828929819637760261927
CWE-200
CVE-2021-31571
The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in queue.c for queue creation.
https://nvd.nist.gov/vuln/detail/CVE-2021-31571
231,048
FreeRTOS-Kernel
47338393f1f79558f6144213409f09f81d7c4837
https://github.com/FreeRTOS/FreeRTOS-Kernel
https://github.com/FreeRTOS/FreeRTOS-Kernel/commit/47338393f1f79558f6144213409f09f81d7c4837
add assert for addition overflow on queue creation (#225)
0
QueueHandle_t xQueueGenericCreate( const UBaseType_t uxQueueLength, const UBaseType_t uxItemSize, const uint8_t ucQueueType ) { Queue_t * pxNewQueue; size_t xQueueSizeInBytes; uint8_t * pucQueueStorage; ...
233309018517612713780199359033790626331
queue.c
257322064233856588492480054392208384035
CWE-200
CVE-2021-31571
The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in queue.c for queue creation.
https://nvd.nist.gov/vuln/detail/CVE-2021-31571
195,720
mvfst
a67083ff4b8dcbb7ee2839da6338032030d712b0
https://github.com/facebookincubator/mvfst
https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0
Close connection if we derive an extra 1-rtt write cipher Summary: Fixes CVE-2021-24029 Reviewed By: mjoras, lnicco Differential Revision: D26613890 fbshipit-source-id: 19bb2be2c731808144e1a074ece313fba11f1945
1
void updateHandshakeState(QuicServerConnectionState& conn) { // Zero RTT read cipher is available after chlo is processed with the // condition that early data attempt is accepted. auto handshakeLayer = conn.serverHandshakeLayer; auto zeroRttReadCipher = handshakeLayer->getZeroRttReadCipher(); auto zeroRttHea...
43735419078414129480912957086830640484
ServerStateMachine.cpp
9223824505720776904271246874049398430
CWE-703
CVE-2021-24029
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da633803203...
https://nvd.nist.gov/vuln/detail/CVE-2021-24029
231,710
mvfst
a67083ff4b8dcbb7ee2839da6338032030d712b0
https://github.com/facebookincubator/mvfst
https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0
Close connection if we derive an extra 1-rtt write cipher Summary: Fixes CVE-2021-24029 Reviewed By: mjoras, lnicco Differential Revision: D26613890 fbshipit-source-id: 19bb2be2c731808144e1a074ece313fba11f1945
0
void updateHandshakeState(QuicServerConnectionState& conn) { // Zero RTT read cipher is available after chlo is processed with the // condition that early data attempt is accepted. auto handshakeLayer = conn.serverHandshakeLayer; auto zeroRttReadCipher = handshakeLayer->getZeroRttReadCipher(); auto zeroRttHea...
131573153342571823274301341051505058759
ServerStateMachine.cpp
204614198627642259228820961859917931421
CWE-703
CVE-2021-24029
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da633803203...
https://nvd.nist.gov/vuln/detail/CVE-2021-24029
195,740
libjpeg
4746b577931e926a49e50de9720a4946de3069a7
https://github.com/thorfdbg/libjpeg
https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
Fixed handling of empty JPEG-LS scans.
1
bool SampleInterleavedLSScan::ParseMCU(void) { #if ACCUSOFT_CODE int lines = m_ulRemaining[0]; // total number of MCU lines processed. UBYTE preshift = m_ucLowBit + FractionalColorBitsOf(); struct Line *line[4]; UBYTE cx; // // If a DNL marker is present, the number of remaining lines is...
262161649015079801638874313151941212550
None
CWE-703
CVE-2022-32978
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
https://nvd.nist.gov/vuln/detail/CVE-2022-32978
232,289
libjpeg
4746b577931e926a49e50de9720a4946de3069a7
https://github.com/thorfdbg/libjpeg
https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
Fixed handling of empty JPEG-LS scans.
0
bool SampleInterleavedLSScan::ParseMCU(void) { #if ACCUSOFT_CODE int lines = m_ulRemaining[0]; // total number of MCU lines processed. UBYTE preshift = m_ucLowBit + FractionalColorBitsOf(); struct Line *line[4]; UBYTE cx; // // If a DNL marker is present, the number of remaining lines is...
195933043393855107446070248148738301990
None
CWE-703
CVE-2022-32978
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
https://nvd.nist.gov/vuln/detail/CVE-2022-32978
195,741
libjpeg
4746b577931e926a49e50de9720a4946de3069a7
https://github.com/thorfdbg/libjpeg
https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
Fixed handling of empty JPEG-LS scans.
1
bool SingleComponentLSScan::ParseMCU(void) { #if ACCUSOFT_CODE int lines = m_ulRemaining[0]; // total number of MCU lines processed. UBYTE preshift = m_ucLowBit + FractionalColorBitsOf(); struct Line *line = CurrentLine(0); // // If a DNL marker is present, the number of remaining l...
62606079555374024593923514521759457355
None
CWE-703
CVE-2022-32978
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
https://nvd.nist.gov/vuln/detail/CVE-2022-32978
232,287
libjpeg
4746b577931e926a49e50de9720a4946de3069a7
https://github.com/thorfdbg/libjpeg
https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
Fixed handling of empty JPEG-LS scans.
0
bool SingleComponentLSScan::ParseMCU(void) { #if ACCUSOFT_CODE int lines = m_ulRemaining[0]; // total number of MCU lines processed. UBYTE preshift = m_ucLowBit + FractionalColorBitsOf(); struct Line *line = CurrentLine(0); // // If a DNL marker is present, the number of remaining l...
278625865669519268412189582687913030823
None
CWE-703
CVE-2022-32978
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
https://nvd.nist.gov/vuln/detail/CVE-2022-32978
195,742
gpac
37592ad86c6ca934d34740012213e467acc4a3b0
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0
fixed #2163
1
static GF_Err gf_isom_parse_movie_boxes_internal(GF_ISOFile *mov, u32 *boxType, u64 *bytesMissing, Bool progressive_mode) { GF_Box *a; u64 totSize, mdat_end=0; GF_Err e = GF_OK; #ifndef GPAC_DISABLE_ISOM_FRAGMENTS if (mov->single_moof_mode && mov->single_moof_state == 2) { return e; } /*restart from where we ...
68912157747726016692935177449045975431
None
CWE-476
CVE-2022-29340
GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
https://nvd.nist.gov/vuln/detail/CVE-2022-29340
232,329
gpac
37592ad86c6ca934d34740012213e467acc4a3b0
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0
fixed #2163
0
static GF_Err gf_isom_parse_movie_boxes_internal(GF_ISOFile *mov, u32 *boxType, u64 *bytesMissing, Bool progressive_mode) { GF_Box *a; u64 totSize, mdat_end=0; GF_Err e = GF_OK; #ifndef GPAC_DISABLE_ISOM_FRAGMENTS if (mov->single_moof_mode && mov->single_moof_state == 2) { return e; } /*restart from where we ...
33398552270127430256413281511092874838
None
CWE-476
CVE-2022-29340
GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
https://nvd.nist.gov/vuln/detail/CVE-2022-29340
195,752
tensorflow
02cc160e29d20631de3859c6653184e3f876b9d7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7
Prevent nullptr deref in SparseTensorSliceDataset The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse). Also added test, by modifying existing test with empty sparse tensor to now run with an invalid sparse tensor input. PiperO...
1
void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override { // Create a new SparseTensorSliceDatasetOp::Dataset, insert it in // the step container, and return it as the output. const Tensor* indices; OP_REQUIRES_OK(ctx, ctx->input("indices", &indices)); const Tensor* values; OP_RE...
111818826187244494245403789873500831419
sparse_tensor_slice_dataset_op.cc
152047584060469134260687844063366554733
CWE-476
CVE-2021-37647
TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6a...
https://nvd.nist.gov/vuln/detail/CVE-2021-37647
232,405
tensorflow
02cc160e29d20631de3859c6653184e3f876b9d7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7
Prevent nullptr deref in SparseTensorSliceDataset The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse). Also added test, by modifying existing test with empty sparse tensor to now run with an invalid sparse tensor input. PiperO...
0
void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override { // Create a new SparseTensorSliceDatasetOp::Dataset, insert it in // the step container, and return it as the output. const Tensor* indices; OP_REQUIRES_OK(ctx, ctx->input("indices", &indices)); const Tensor* values; OP_RE...
126239557450594194918340916106898261954
sparse_tensor_slice_dataset_op.cc
188414793374606504588915566744198162485
CWE-476
CVE-2021-37647
TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6a...
https://nvd.nist.gov/vuln/detail/CVE-2021-37647
195,768
tensorflow
8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992
Ensure num_streams >= 0 in tf.raw_ops.BoostedTreesCreateQuantileStreamResource PiperOrigin-RevId: 387452765 Change-Id: I9990c760e177fabca6a3b9b4612ceeaeeba51495
1
void Compute(OpKernelContext* context) override { // Only create one, if one does not exist already. Report status for all // other exceptions. If one already exists, it unrefs the new one. // An epsilon value of zero could cause performance issues and is therefore, // disallowed. const Tensor* ep...
313445736659793184747687838118492710807
quantile_ops.cc
107616464713850423069668018637690909159
CWE-703
CVE-2021-37661
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c4...
https://nvd.nist.gov/vuln/detail/CVE-2021-37661
232,839
tensorflow
8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992
Ensure num_streams >= 0 in tf.raw_ops.BoostedTreesCreateQuantileStreamResource PiperOrigin-RevId: 387452765 Change-Id: I9990c760e177fabca6a3b9b4612ceeaeeba51495
0
void Compute(OpKernelContext* context) override { // Only create one, if one does not exist already. Report status for all // other exceptions. If one already exists, it unrefs the new one. // An epsilon value of zero could cause performance issues and is therefore, // disallowed. const Tensor* ep...
211706993180687307698189182900649131515
quantile_ops.cc
2460463357913626818723111707864043881
CWE-703
CVE-2021-37661
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c4...
https://nvd.nist.gov/vuln/detail/CVE-2021-37661
195,800
deark
62acb7753b0e3c0d3ab3c15057b0a65222313334
https://github.com/jsummers/deark
https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334
pict,macrsrc: Fixed a bug that could cause division by 0 Found by F. Çelik.
1
void fmtutil_macbitmap_read_pixmap_only_fields(deark *c, dbuf *f, struct fmtutil_macbitmap_info *bi, i64 pos) { i64 pixmap_version; i64 pack_size; i64 plane_bytes; i64 n; de_dbg(c, "additional PixMap header fields, at %d", (int)pos); de_dbg_indent(c, 1); pixmap_version = dbuf_getu16be(f, pos+0); de_dbg(c, "p...
203544519943268578056087775697493086183
fmtutil.c
198892381443353894699781903058114971913
CWE-369
CVE-2021-28856
In Deark before v1.5.8, a specially crafted input file can cause a division by zero in (src/fmtutil.c) because of the value of pixelsize.
https://nvd.nist.gov/vuln/detail/CVE-2021-28856
233,862
deark
62acb7753b0e3c0d3ab3c15057b0a65222313334
https://github.com/jsummers/deark
https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334
pict,macrsrc: Fixed a bug that could cause division by 0 Found by F. Çelik.
0
void fmtutil_macbitmap_read_pixmap_only_fields(deark *c, dbuf *f, struct fmtutil_macbitmap_info *bi, i64 pos) { i64 pixmap_version; i64 pack_size; i64 plane_bytes; i64 n; de_dbg(c, "additional PixMap header fields, at %d", (int)pos); de_dbg_indent(c, 1); pixmap_version = dbuf_getu16be(f, pos+0); de_dbg(c, "p...
165750695801886950946994956858448129756
fmtutil.c
134744298134309373748233562166931104409
CWE-369
CVE-2021-28856
In Deark before v1.5.8, a specially crafted input file can cause a division by zero in (src/fmtutil.c) because of the value of pixelsize.
https://nvd.nist.gov/vuln/detail/CVE-2021-28856
195,801
php-src
0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
Fix for bug #72790 and bug #72799 (cherry picked from commit a14fdb9746262549bbbb96abb87338bacd147e1b) Conflicts: ext/wddx/wddx.c
1
*/ static void php_wddx_pop_element(void *user_data, const XML_Char *name) { st_entry *ent1, *ent2; wddx_stack *stack = (wddx_stack *)user_data; HashTable *target_hash; zend_class_entry *pce; zval obj; /* OBJECTS_FIXME */ if (stack->top == 0) { return; } if (!strcmp((char *)name, EL_STRING) ||...
195456627139063255714886732829389598772
wddx.c
202333767268853724294318351879930678985
CWE-476
CVE-2016-7132
ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray elem...
https://nvd.nist.gov/vuln/detail/CVE-2016-7132
233,867
php-src
0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
https://github.com/php/php-src
https://github.com/php/php-src/commit/0c8a2a2cd1056b7dc403eacb5d2c0eec6ce47c6f
Fix for bug #72790 and bug #72799 (cherry picked from commit a14fdb9746262549bbbb96abb87338bacd147e1b) Conflicts: ext/wddx/wddx.c
0
*/ static void php_wddx_pop_element(void *user_data, const XML_Char *name) { st_entry *ent1, *ent2; wddx_stack *stack = (wddx_stack *)user_data; HashTable *target_hash; zend_class_entry *pce; zval obj; /* OBJECTS_FIXME */ if (stack->top == 0) { return; } if (!strcmp((char *)name, EL_STRING) ||...
31470175015119113662948688342343260077
wddx.c
138061260196786413886706259778202745956
CWE-476
CVE-2016-7132
ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray elem...
https://nvd.nist.gov/vuln/detail/CVE-2016-7132
195,908
linux
e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
btrfs: fix NULL pointer dereference when deleting device by invalid id [BUG] It's easy to trigger NULL pointer dereference, just by removing a non-existing device id: # mkfs.btrfs -f -m single -d single /dev/test/scratch1 \ /dev/test/scratch2 # mount /dev/test/scratch1 /mnt/btrfs # btrfs device remove 3 /...
1
int btrfs_rm_device(struct btrfs_fs_info *fs_info, const char *device_path, u64 devid) { struct btrfs_device *device; struct btrfs_fs_devices *cur_devices; struct btrfs_fs_devices *fs_devices = fs_info->fs_devices; u64 num_devices; int ret = 0; mutex_lock(&uuid_mutex); num_devices = btrfs_num_devices(fs_...
109862119097507194285189243526662049352
volumes.c
327977751785202812455417482244318484271
CWE-703
CVE-2021-3739
A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system avail...
https://nvd.nist.gov/vuln/detail/CVE-2021-3739
234,731
linux
e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091
btrfs: fix NULL pointer dereference when deleting device by invalid id [BUG] It's easy to trigger NULL pointer dereference, just by removing a non-existing device id: # mkfs.btrfs -f -m single -d single /dev/test/scratch1 \ /dev/test/scratch2 # mount /dev/test/scratch1 /mnt/btrfs # btrfs device remove 3 /...
0
int btrfs_rm_device(struct btrfs_fs_info *fs_info, const char *device_path, u64 devid) { struct btrfs_device *device; struct btrfs_fs_devices *cur_devices; struct btrfs_fs_devices *fs_devices = fs_info->fs_devices; u64 num_devices; int ret = 0; mutex_lock(&uuid_mutex); num_devices = btrfs_num_devices(fs_...
150119639172350576972778244740451645198
volumes.c
142275211219518353290156650917746742888
CWE-703
CVE-2021-3739
A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system avail...
https://nvd.nist.gov/vuln/detail/CVE-2021-3739
195,909
ImageMagick
d072ed6aff835c174e856ce3a428163c0da9e8f4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d072ed6aff835c174e856ce3a428163c0da9e8f4
Skip MNG CLIP chunk with out-of-range object IDs
1
static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { char page_geometry[MagickPathExtent]; Image *image; MagickBooleanType logging; volatile int first_mng_object, object_id, term_chunk_found, skip_to_iend; volatile ssize...
112335411773175147602521832461985951659
png.c
320300249685897026258566713334395171716
CWE-125
CVE-2017-13139
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
https://nvd.nist.gov/vuln/detail/CVE-2017-13139
234,875
ImageMagick
d072ed6aff835c174e856ce3a428163c0da9e8f4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d072ed6aff835c174e856ce3a428163c0da9e8f4
Skip MNG CLIP chunk with out-of-range object IDs
0
static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { char page_geometry[MagickPathExtent]; Image *image; MagickBooleanType logging; volatile int first_mng_object, object_id, term_chunk_found, skip_to_iend; volatile ssize...
158627527242372232555718474097358340968
png.c
308141979970390112779858157014940687903
CWE-125
CVE-2017-13139
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
https://nvd.nist.gov/vuln/detail/CVE-2017-13139
195,954
pjproject
9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
https://github.com/pjsip/pjproject
https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
Merge pull request from GHSA-p6g5-v97c-w5q4 * Prevent heap buffer overflow when parsing DNS packets * Make sure packet parsing doesn't advance beyond max/end * Update checks * Remove check Co-authored-by: sauwming <ming@teluu.com>
1
static pj_status_t parse_query(pj_dns_parsed_query *q, pj_pool_t *pool, const pj_uint8_t *pkt, const pj_uint8_t *start, const pj_uint8_t *max, int *parsed_len) { const pj_uint8_t *p = start; int name_len, name_part_len; pj_status_t status; /* Get the length of the name */ status...
135450072303259419822933820270333517166
dns.c
253652259492393007596255371845847130395
CWE-787
CVE-2022-24793
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is...
https://nvd.nist.gov/vuln/detail/CVE-2022-24793
235,642
pjproject
9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
https://github.com/pjsip/pjproject
https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
Merge pull request from GHSA-p6g5-v97c-w5q4 * Prevent heap buffer overflow when parsing DNS packets * Make sure packet parsing doesn't advance beyond max/end * Update checks * Remove check Co-authored-by: sauwming <ming@teluu.com>
0
static pj_status_t parse_query(pj_dns_parsed_query *q, pj_pool_t *pool, const pj_uint8_t *pkt, const pj_uint8_t *start, const pj_uint8_t *max, int *parsed_len) { const pj_uint8_t *p = start; int name_len, name_part_len; pj_status_t status; /* Get the length of the name */ status...
182542196466721409447058148432122336027
dns.c
267684295944312304672181273486771812087
CWE-787
CVE-2022-24793
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is...
https://nvd.nist.gov/vuln/detail/CVE-2022-24793
195,965
tensorflow
30721cf564cb029d34535446d6a5a6357bebc8e7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7
Fix tf.raw_ops.EditDistance vulnerability with negative indices. Check that indices are non-negative. Fix several identical code sites. Clean up grammar in error message. PiperOrigin-RevId: 445442017
1
void Compute(OpKernelContext* ctx) override { const Tensor* hypothesis_indices; const Tensor* hypothesis_values; const Tensor* hypothesis_shape; const Tensor* truth_indices; const Tensor* truth_values; const Tensor* truth_shape; OP_REQUIRES_OK(ctx, ctx->input("hypothesis_indices", &hypothe...
330908344605810468129440704571471984591
edit_distance_op.cc
218278977682570302037113861275408263141
CWE-787
CVE-2022-29208
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may c...
https://nvd.nist.gov/vuln/detail/CVE-2022-29208
235,765
tensorflow
30721cf564cb029d34535446d6a5a6357bebc8e7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7
Fix tf.raw_ops.EditDistance vulnerability with negative indices. Check that indices are non-negative. Fix several identical code sites. Clean up grammar in error message. PiperOrigin-RevId: 445442017
0
void Compute(OpKernelContext* ctx) override { const Tensor* hypothesis_indices; const Tensor* hypothesis_values; const Tensor* hypothesis_shape; const Tensor* truth_indices; const Tensor* truth_values; const Tensor* truth_shape; OP_REQUIRES_OK(ctx, ctx->input("hypothesis_indices", &hypothe...
248166369480919859740493813092777127281
edit_distance_op.cc
224900034498319197270351200055296266799
CWE-787
CVE-2022-29208
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may c...
https://nvd.nist.gov/vuln/detail/CVE-2022-29208
195,984
gpac
3dbe11b37d65c8472faf0654410068e5500b3adb
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb
fixed #2175
1
GF_Err diST_box_read(GF_Box *s, GF_BitStream *bs) { u32 i; char str[1024]; GF_DIMSScriptTypesBox *p = (GF_DIMSScriptTypesBox *)s; i=0; str[0]=0; while (1) { str[i] = gf_bs_read_u8(bs); if (!str[i]) break; i++; } ISOM_DECREASE_SIZE(p, i); p->content_script_types = gf_strdup(str); return GF_OK; }
337508066102203205232219987774332438264
box_code_3gpp.c
236995747067078276861335410375287788449
CWE-703
CVE-2022-1441
MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i...
https://nvd.nist.gov/vuln/detail/CVE-2022-1441
236,125
gpac
3dbe11b37d65c8472faf0654410068e5500b3adb
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb
fixed #2175
0
GF_Err diST_box_read(GF_Box *s, GF_BitStream *bs) { GF_DIMSScriptTypesBox *p = (GF_DIMSScriptTypesBox *)s; p->content_script_types = gf_malloc(sizeof(char) * (s->size+1)); if (!p->content_script_types) return GF_OUT_OF_MEM; gf_bs_read_data(bs, p->content_script_types, s->size); p->content_script_types[s->size] = ...
296645158113148498272091333023062986276
box_code_3gpp.c
53964259103061248299506412136196602333
CWE-703
CVE-2022-1441
MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i...
https://nvd.nist.gov/vuln/detail/CVE-2022-1441
196,276
lsquic
a74702c630e108125e71898398737baec8f02238
https://github.com/litespeedtech/lsquic
https://github.com/litespeedtech/lsquic/commit/a74702c630e108125e71898398737baec8f02238
Release 3.1.0
1
lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size, unsigned dyn_table_size, unsigned max_risked_streams, int server) { enum lsqpack_enc_opts enc_opts; assert(qeh->qeh_flags & QEH_INITIALIZED); if (qeh->qeh_flags & QEH_HAVE_SETTINGS) { LSQ_WARN("settings alrea...
304358665951404548699605657299704903588
None
CWE-269
CVE-2022-30592
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
https://nvd.nist.gov/vuln/detail/CVE-2022-30592
237,885
lsquic
a74702c630e108125e71898398737baec8f02238
https://github.com/litespeedtech/lsquic
https://github.com/litespeedtech/lsquic/commit/a74702c630e108125e71898398737baec8f02238
Release 3.1.0
0
lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size, unsigned dyn_table_size, unsigned max_risked_streams, int server) { enum lsqpack_enc_opts enc_opts; assert(qeh->qeh_flags & QEH_INITIALIZED); if (qeh->qeh_flags & QEH_HAVE_SETTINGS) { LSQ_WARN("settings alrea...
213495580933926260913554982368628219722
None
CWE-269
CVE-2022-30592
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
https://nvd.nist.gov/vuln/detail/CVE-2022-30592
196,316
barebox
0a9f9a7410681e55362f8311537ebc7be9ad0fbe
https://github.com/saschahauer/barebox
https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe
crypto: digest: use crypto_memneq() When verifying a digest it is important not to leak timing information through memcmp(). Use crypto_memneq() instead. Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
1
int digest_generic_verify(struct digest *d, const unsigned char *md) { int ret; int len = digest_length(d); unsigned char *tmp; tmp = xmalloc(len); ret = digest_final(d, tmp); if (ret) goto end; ret = memcmp(md, tmp, len); ret = ret ? -EINVAL : 0; end: free(tmp); return ret; }
71480685616976545176363965575731858659
digest.c
309636649404648894565051311749383985179
CWE-200
CVE-2021-37847
crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification.
https://nvd.nist.gov/vuln/detail/CVE-2021-37847
238,322
barebox
0a9f9a7410681e55362f8311537ebc7be9ad0fbe
https://github.com/saschahauer/barebox
https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe
crypto: digest: use crypto_memneq() When verifying a digest it is important not to leak timing information through memcmp(). Use crypto_memneq() instead. Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
0
int digest_generic_verify(struct digest *d, const unsigned char *md) { int ret; int len = digest_length(d); unsigned char *tmp; tmp = xmalloc(len); ret = digest_final(d, tmp); if (ret) goto end; if (crypto_memneq(md, tmp, len)) ret = -EINVAL; else ret = 0; end: free(tmp); return ret; }
320239189684468072245266956547158344510
digest.c
195235961590850585727206932057971391683
CWE-200
CVE-2021-37847
crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification.
https://nvd.nist.gov/vuln/detail/CVE-2021-37847
196,328
vim
409510c588b1eec1ae33511ae97a21eb8e110895
https://github.com/vim/vim
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
patch 8.2.5050: using freed memory when searching for pattern in path Problem: Using freed memory when searching for pattern in path. Solution: Make a copy of the line.
1
find_pattern_in_path( char_u *ptr, // pointer to search pattern int dir UNUSED, // direction of expansion int len, // length of search pattern int whole, // match whole words only int skip_comments, // don't match inside comments int type, // Type of search; are we looking for a type? ...
123923862521809134964983633516065480238
search.c
229512534202460810065416633781657256150
CWE-416
CVE-2022-1968
Use After Free in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-1968
238,803
vim
409510c588b1eec1ae33511ae97a21eb8e110895
https://github.com/vim/vim
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
patch 8.2.5050: using freed memory when searching for pattern in path Problem: Using freed memory when searching for pattern in path. Solution: Make a copy of the line.
0
find_pattern_in_path( char_u *ptr, // pointer to search pattern int dir UNUSED, // direction of expansion int len, // length of search pattern int whole, // match whole words only int skip_comments, // don't match inside comments int type, // Type of search; are we looking for a type? ...
332560855806865581562523893033870446906
search.c
30662263767422374466151794140989574879
CWE-416
CVE-2022-1968
Use After Free in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-1968
196,578
vim
44db8213d38c39877d2148eff6a72f4beccfb94e
https://github.com/vim/vim
https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
patch 8.2.4219: reading before the start of the line Problem: Reading before the start of the line. Solution: Check boundary before trying to read the character.
1
yank_copy_line(struct block_def *bd, long y_idx, int exclude_trailing_space) { char_u *pnew; if (exclude_trailing_space) bd->endspaces = 0; if ((pnew = alloc(bd->startspaces + bd->endspaces + bd->textlen + 1)) == NULL) return FAIL; y_current->y_array[y_idx] = pnew; vim_memset(pnew, ...
329046653104270093704788517563971777510
register.c
197045442768005159362544298682780980387
CWE-787
CVE-2022-0407
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0407
240,276
vim
44db8213d38c39877d2148eff6a72f4beccfb94e
https://github.com/vim/vim
https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
patch 8.2.4219: reading before the start of the line Problem: Reading before the start of the line. Solution: Check boundary before trying to read the character.
0
yank_copy_line(struct block_def *bd, long y_idx, int exclude_trailing_space) { char_u *pnew; if (exclude_trailing_space) bd->endspaces = 0; if ((pnew = alloc(bd->startspaces + bd->endspaces + bd->textlen + 1)) == NULL) return FAIL; y_current->y_array[y_idx] = pnew; vim_memset(pnew, ...
215111577434116975174543951046273639484
register.c
303069020104340496076924952267660178460
CWE-787
CVE-2022-0407
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0407
196,587
tensorflow
4aacb30888638da75023e6601149415b39763d76
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76
Disallow division by zero FPE in `tf.raw_ops.ResourceScatterDiv` Had to update a test that was broken. PiperOrigin-RevId: 388516976 Change-Id: Ic358e6bf0559e011539974d453fc7aa18b427e9c
1
void DoCompute(OpKernelContext* c) { core::RefCountPtr<Var> v; OP_REQUIRES_OK(c, LookupResource(c, HandleFromInput(c, 0), &v)); Tensor* params = v->tensor(); const Tensor& indices = c->input(1); const Tensor& updates = c->input(2); // Check that rank(updates.shape) = rank(indices.shape + para...
322924980951140877428129021875471736973
resource_variable_ops.cc
290989719174845979221072798512679804902
CWE-369
CVE-2021-37642
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/re...
https://nvd.nist.gov/vuln/detail/CVE-2021-37642
240,595
tensorflow
4aacb30888638da75023e6601149415b39763d76
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76
Disallow division by zero FPE in `tf.raw_ops.ResourceScatterDiv` Had to update a test that was broken. PiperOrigin-RevId: 388516976 Change-Id: Ic358e6bf0559e011539974d453fc7aa18b427e9c
0
void DoCompute(OpKernelContext* c) { core::RefCountPtr<Var> v; OP_REQUIRES_OK(c, LookupResource(c, HandleFromInput(c, 0), &v)); Tensor* params = v->tensor(); const Tensor& indices = c->input(1); const Tensor& updates = c->input(2); // Check that rank(updates.shape) = rank(indices.shape + para...
249042864160254570036396062378524137135
resource_variable_ops.cc
303304073982532975843126024441239469279
CWE-369
CVE-2021-37642
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/re...
https://nvd.nist.gov/vuln/detail/CVE-2021-37642
196,611
booth
35bf0b7b048d715f671eb68974fb6b4af6528c67
https://github.com/ClusterLabs/booth
https://github.com/ClusterLabs/booth/commit/35bf0b7b048d715f671eb68974fb6b4af6528c67
Revert "Refactor: main: substitute is_auth_req macro" This reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c. authfile != authkey Signed-off-by: Jan Friesse <jfriesse@redhat.com>
1
static int setup_config(int type) { int rv; rv = read_config(cl.configfile, type); if (rv < 0) goto out; if (is_auth_req()) { rv = read_authkey(); if (rv < 0) goto out; #if HAVE_LIBGCRYPT if (!gcry_check_version(NULL)) { log_error("gcry_check_version"); rv = -ENOENT; goto out; } gcry_contr...
170997267947585139967201027163993257008
main.c
4814718832295442874488153140310945385
CWE-284
CVE-2022-2553
The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
https://nvd.nist.gov/vuln/detail/CVE-2022-2553
241,040
booth
35bf0b7b048d715f671eb68974fb6b4af6528c67
https://github.com/ClusterLabs/booth
https://github.com/ClusterLabs/booth/commit/35bf0b7b048d715f671eb68974fb6b4af6528c67
Revert "Refactor: main: substitute is_auth_req macro" This reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c. authfile != authkey Signed-off-by: Jan Friesse <jfriesse@redhat.com>
0
static int setup_config(int type) { int rv; rv = read_config(cl.configfile, type); if (rv < 0) goto out; if (booth_conf->authfile[0] != '\0') { rv = read_authkey(); if (rv < 0) goto out; #if HAVE_LIBGCRYPT if (!gcry_check_version(NULL)) { log_error("gcry_check_version"); rv = -ENOENT; goto out...
89622919560301199125405967494920550093
main.c
219733327123326706215521846542751103807
CWE-284
CVE-2022-2553
The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
https://nvd.nist.gov/vuln/detail/CVE-2022-2553
196,621
mruby
b1d0296a937fe278239bdfac840a3fd0e93b3ee9
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9
class.c: clear method cache after `remove_method`.
1
mrb_remove_method(mrb_state *mrb, struct RClass *c, mrb_sym mid) { mt_tbl *h; MRB_CLASS_ORIGIN(c); h = c->mt; if (h && mt_del(mrb, h, mid)) return; mrb_name_error(mrb, mid, "method '%n' not defined in %C", mid, c); }
310092184444521797404238692578019888834
None
CWE-787
CVE-2022-1286
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
https://nvd.nist.gov/vuln/detail/CVE-2022-1286
241,311
mruby
b1d0296a937fe278239bdfac840a3fd0e93b3ee9
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9
class.c: clear method cache after `remove_method`.
0
mrb_remove_method(mrb_state *mrb, struct RClass *c, mrb_sym mid) { mt_tbl *h; MRB_CLASS_ORIGIN(c); h = c->mt; if (h && mt_del(mrb, h, mid)) { mrb_mc_clear_by_class(mrb, c); return; } mrb_name_error(mrb, mid, "method '%n' not defined in %C", mid, c); }
224777801914266123479513901810152701375
None
CWE-787
CVE-2022-1286
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
https://nvd.nist.gov/vuln/detail/CVE-2022-1286
196,629
tensorflow
579261dcd446385831fe4f7457d802a59685121d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d
Fix crash in MatrixSolve when inputs have different batch dimensions. Before, the process would crash or certain elements would be silently ignored. Now an InvalidArgument is raised. PiperOrigin-RevId: 384844020 Change-Id: Iba44417e383bdd0e1abc4012bfca83b2377dd335
1
void ComputeAsync(OpKernelContext* context, DoneCallback done) final { const Tensor& input = context->input(0); const Tensor& rhs = context->input(1); const int ndims = input.dims(); const int64 n = input.dim_size(ndims - 1); const int64 nrhs = rhs.dim_size(ndims - 1); // Validate inputs. ...
232512673394609281083836207268567643755
matrix_solve_op.cc
18056043033202767652193305242094140715
CWE-354
CVE-2021-41206
TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario...
https://nvd.nist.gov/vuln/detail/CVE-2021-41206
241,369
tensorflow
579261dcd446385831fe4f7457d802a59685121d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d
Fix crash in MatrixSolve when inputs have different batch dimensions. Before, the process would crash or certain elements would be silently ignored. Now an InvalidArgument is raised. PiperOrigin-RevId: 384844020 Change-Id: Iba44417e383bdd0e1abc4012bfca83b2377dd335
0
void ComputeAsync(OpKernelContext* context, DoneCallback done) final { const Tensor& input = context->input(0); const Tensor& rhs = context->input(1); const int ndims = input.dims(); const int64 n = input.dim_size(ndims - 1); const int64 nrhs = rhs.dim_size(ndims - 1); // Validate inputs. ...
213027909579375149223707117272594449042
matrix_solve_op.cc
56729187938743390978402639550963026335
CWE-354
CVE-2021-41206
TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario...
https://nvd.nist.gov/vuln/detail/CVE-2021-41206
196,689
tensorflow
cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb
Fix tf.raw_ops.StagePeek vulnerability with invalid `index`. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445524908
1
void Compute(OpKernelContext* ctx) override { Buffer* buf = nullptr; OP_REQUIRES_OK(ctx, GetBuffer(ctx, def(), &buf)); core::ScopedUnref scope(buf); Buffer::Tuple tuple; std::size_t index = ctx->input(0).scalar<int>()(); OP_REQUIRES_OK(ctx, buf->Peek(index, &tuple)); OP_REQUIRES( ...
321476459442808105718031824942985787186
stage_op.cc
203338145673187111221975146552959312769
CWE-703
CVE-2022-29195
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a...
https://nvd.nist.gov/vuln/detail/CVE-2022-29195
242,619
tensorflow
cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb
Fix tf.raw_ops.StagePeek vulnerability with invalid `index`. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445524908
0
void Compute(OpKernelContext* ctx) override { Buffer* buf = nullptr; OP_REQUIRES_OK(ctx, GetBuffer(ctx, def(), &buf)); core::ScopedUnref scope(buf); Buffer::Tuple tuple; buf->Get(&tuple); OP_REQUIRES( ctx, tuple.size() == (size_t)ctx->num_outputs(), errors::InvalidArgument("M...
150871818833070085390431100112319012215
stage_op.cc
292796960162980121952379513053668377918
CWE-703
CVE-2022-29195
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a...
https://nvd.nist.gov/vuln/detail/CVE-2022-29195
196,691
gpac
71460d72ec07df766dab0a4d52687529f3efcf0a
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a
fixed #1876
1
static GF_Err isoffin_process(GF_Filter *filter) { ISOMReader *read = gf_filter_get_udta(filter); u32 i, count = gf_list_count(read->channels); Bool is_active = GF_FALSE; Bool in_is_eos = GF_FALSE; Bool check_forced_end = GF_FALSE; Bool has_new_data = GF_FALSE; u64 min_offset_plus_one = 0; u32 nb_forced_end=0; ...
245491994913846374509516795584789756192
isoffin_read.c
80320074166992838039801529564251755054
CWE-703
CVE-2021-40592
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially...
https://nvd.nist.gov/vuln/detail/CVE-2021-40592
242,637
gpac
71460d72ec07df766dab0a4d52687529f3efcf0a
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a
fixed #1876
0
static GF_Err isoffin_process(GF_Filter *filter) { ISOMReader *read = gf_filter_get_udta(filter); u32 i, count = gf_list_count(read->channels); Bool is_active = GF_FALSE; Bool in_is_eos = GF_FALSE; Bool check_forced_end = GF_FALSE; Bool has_new_data = GF_FALSE; u64 min_offset_plus_one = 0; u32 nb_forced_end=0; ...
305058451325362998718292493453495076439
isoffin_read.c
45568496591393007238506246573526523584
CWE-703
CVE-2021-40592
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially...
https://nvd.nist.gov/vuln/detail/CVE-2021-40592
196,698
tensorflow
67bfd9feeecfb3c61d80f0e46d89c170fbee682b
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b
Make SparseFillEmptyRows validate that the length of `values` must be equal to the number of index tuples. PiperOrigin-RevId: 399969549 Change-Id: I3c2f2ca1c1d2cc88bb5951c6958b38c16e9436c8
1
void SparseFillEmptyRowsOpImpl(OpKernelContext* context, AsyncOpKernel::DoneCallback done = nullptr) { // Note that setting this empty lambda as the default parameter value directly // can cause strange compiler/linker errors, so we do it like this instead. if (!done) { done = [...
163337242627579814226114932816582213259
sparse_fill_empty_rows_op.cc
115550743256362209093747086328381163455
CWE-125
CVE-2021-41224
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyRows` can be made to trigger a heap OOB access. This occurs whenever the size of `indices` does not match the size of `values`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick thi...
https://nvd.nist.gov/vuln/detail/CVE-2021-41224
242,899
tensorflow
67bfd9feeecfb3c61d80f0e46d89c170fbee682b
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b
Make SparseFillEmptyRows validate that the length of `values` must be equal to the number of index tuples. PiperOrigin-RevId: 399969549 Change-Id: I3c2f2ca1c1d2cc88bb5951c6958b38c16e9436c8
0
void SparseFillEmptyRowsOpImpl(OpKernelContext* context, AsyncOpKernel::DoneCallback done = nullptr) { // Note that setting this empty lambda as the default parameter value directly // can cause strange compiler/linker errors, so we do it like this instead. if (!done) { done = [...
284557281436675521731008929242198087362
None
CWE-125
CVE-2021-41224
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyRows` can be made to trigger a heap OOB access. This occurs whenever the size of `indices` does not match the size of `values`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick thi...
https://nvd.nist.gov/vuln/detail/CVE-2021-41224
196,705
tensorflow
11ced8467eccad9c7cb94867708be8fa5c66c730
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730
Fix UB in SparseTensorDenseAdd Added more input validation to avoid nullptr dereferencing and array index out of bounds issues. PiperOrigin-RevId: 446192704
1
Status ValidateInputs(const Tensor *a_indices, const Tensor *a_values, const Tensor *a_shape, const Tensor *b) { if (!TensorShapeUtils::IsMatrix(a_indices->shape())) { return errors::InvalidArgument( "Input a_indices should be a matrix but received shape: ", a_indices->shape(...
308425823880781073775676879611190785715
sparse_tensor_dense_add_op.cc
91198918327439956509177796541242214319
CWE-20
CVE-2022-29206
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Vers...
https://nvd.nist.gov/vuln/detail/CVE-2022-29206
242,926
tensorflow
11ced8467eccad9c7cb94867708be8fa5c66c730
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730
Fix UB in SparseTensorDenseAdd Added more input validation to avoid nullptr dereferencing and array index out of bounds issues. PiperOrigin-RevId: 446192704
0
Status ValidateInputs(const Tensor *a_indices, const Tensor *a_values, const Tensor *a_shape, const Tensor *b) { if (!TensorShapeUtils::IsMatrix(a_indices->shape())) { return errors::InvalidArgument( "Input a_indices should be a matrix but received shape: ", a_indices->shape(...
310798775905628265586866839597720584207
sparse_tensor_dense_add_op.cc
106434963445193170812694157920438487376
CWE-20
CVE-2022-29206
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Vers...
https://nvd.nist.gov/vuln/detail/CVE-2022-29206
196,790
tensorflow
a4e138660270e7599793fa438cd7b2fc2ce215a6
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6
Add remaining validation to `sdca_internal.cc` PiperOrigin-RevId: 387738010 Change-Id: I28eedcfd87a53aaf34deb075acea1f8c95470808
1
Status Examples::Initialize(OpKernelContext* const context, const ModelWeights& weights, const int num_sparse_features, const int num_sparse_features_with_values, const int num_dense_features) { num_feature...
183156860369052380668778554351089179754
sdca_internal.cc
189786435377355636606855329054946360663
CWE-703
CVE-2021-37672
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a832...
https://nvd.nist.gov/vuln/detail/CVE-2021-37672
245,140
tensorflow
a4e138660270e7599793fa438cd7b2fc2ce215a6
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6
Add remaining validation to `sdca_internal.cc` PiperOrigin-RevId: 387738010 Change-Id: I28eedcfd87a53aaf34deb075acea1f8c95470808
0
Status Examples::Initialize(OpKernelContext* const context, const ModelWeights& weights, const int num_sparse_features, const int num_sparse_features_with_values, const int num_dense_features) { num_feature...
260741602322702772753001144224568198903
sdca_internal.cc
181960497028529937456505885431082793104
CWE-703
CVE-2021-37672
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a832...
https://nvd.nist.gov/vuln/detail/CVE-2021-37672
196,801
gpac
f5a038e6893019ee471b6a57490cf7a495673816
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/f5a038e6893019ee471b6a57490cf7a495673816
fixed #1885
1
GF_Err gf_hinter_finalize(GF_ISOFile *file, GF_SDP_IODProfile IOD_Profile, u32 bandwidth) { u32 i, sceneT, odT, descIndex, size, size64; GF_InitialObjectDescriptor *iod; GF_SLConfig slc; GF_ISOSample *samp; Bool remove_ocr; u8 *buffer; char buf64[5000], sdpLine[5100]; gf_isom_sdp_clean(file); if (bandwidth)...
123828913884454942556959015680908121097
isom_hinter.c
94306079889139284150664165649647698827
CWE-703
CVE-2021-40567
Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-40567
245,434
gpac
f5a038e6893019ee471b6a57490cf7a495673816
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/f5a038e6893019ee471b6a57490cf7a495673816
fixed #1885
0
GF_Err gf_hinter_finalize(GF_ISOFile *file, GF_SDP_IODProfile IOD_Profile, u32 bandwidth) { u32 i, sceneT, odT, descIndex, size, size64; GF_InitialObjectDescriptor *iod; GF_SLConfig slc; GF_ISOSample *samp; Bool remove_ocr; u8 *buffer; char buf64[5000], sdpLine[5100]; gf_isom_sdp_clean(file); if (bandwidth)...
303417005627420629887148853980716072397
isom_hinter.c
42590680344413091509080711519758588742
CWE-703
CVE-2021-40567
Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-40567
196,829
tensorflow
9a133d73ae4b4664d22bd1aa6d654fec13c52ee1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1
Prevent segfault in `GetSessionHandle{,V2}`. In eager mode, session state is null. PiperOrigin-RevId: 332548597 Change-Id: If094812c2e094044220b9ba28f7d7601be042f38
1
void Compute(OpKernelContext* ctx) override { const Tensor& val = ctx->input(0); int64 id = ctx->session_state()->GetNewId(); TensorStore::TensorAndKey tk{val, id, requested_device()}; OP_REQUIRES_OK(ctx, ctx->tensor_store()->AddTensor(name(), tk)); Tensor* handle = nullptr; OP_REQUIRES_OK(ct...
265136132776865637405047291994320353020
session_ops.cc
301236181949638816884177571060128580318
CWE-476
CVE-2020-15204
In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code imm...
https://nvd.nist.gov/vuln/detail/CVE-2020-15204
245,921
tensorflow
9a133d73ae4b4664d22bd1aa6d654fec13c52ee1
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1
Prevent segfault in `GetSessionHandle{,V2}`. In eager mode, session state is null. PiperOrigin-RevId: 332548597 Change-Id: If094812c2e094044220b9ba28f7d7601be042f38
0
void Compute(OpKernelContext* ctx) override { const Tensor& val = ctx->input(0); auto session_state = ctx->session_state(); OP_REQUIRES(ctx, session_state != nullptr, errors::FailedPrecondition( "GetSessionHandle called on null session state")); int64 id = session_s...
297244264653800469833284157710994110214
session_ops.cc
303341858564051211151362713951438565129
CWE-476
CVE-2020-15204
In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code imm...
https://nvd.nist.gov/vuln/detail/CVE-2020-15204
196,834
tensorflow
701cfaca222a82afbeeb17496bd718baa65a67d2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2
Fix heap out of bounds error in tf.raw_ops.SparseCountSparseOutput shape inference when it is called with invalid inputs, and add a test for it. PiperOrigin-RevId: 405766415 Change-Id: I77d244ef35f351ef7b6f821efd959cac2c66db24
1
Status SparseCountSparseOutputShapeFn(InferenceContext *c) { auto rank = c->Dim(c->input(0), 1); auto nvals = c->UnknownDim(); c->set_output(0, c->Matrix(nvals, rank)); // out.indices c->set_output(1, c->Vector(nvals)); // out.values c->set_output(2, c->Vector(rank)); // out.dense_shape retu...
288638774639466658606082764141579193752
count_ops.cc
285251304555239344227100279342018211632
CWE-125
CVE-2021-41210
TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for `SparseCountSparseOutput` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5...
https://nvd.nist.gov/vuln/detail/CVE-2021-41210
246,207
tensorflow
701cfaca222a82afbeeb17496bd718baa65a67d2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2
Fix heap out of bounds error in tf.raw_ops.SparseCountSparseOutput shape inference when it is called with invalid inputs, and add a test for it. PiperOrigin-RevId: 405766415 Change-Id: I77d244ef35f351ef7b6f821efd959cac2c66db24
0
Status SparseCountSparseOutputShapeFn(InferenceContext *c) { ShapeHandle unused; TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 2, &unused)); auto rank = c->Dim(c->input(0), 1); auto nvals = c->UnknownDim(); c->set_output(0, c->Matrix(nvals, rank)); // out.indices c->set_output(1, c->Vector(nvals)); //...
271491902662668268509988539707707762247
count_ops.cc
129709593460413124359725410007396484757
CWE-125
CVE-2021-41210
TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for `SparseCountSparseOutput` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5...
https://nvd.nist.gov/vuln/detail/CVE-2021-41210
196,841
furnace
0eb02422d5161767e9983bdaa5c429762d3477ce
https://github.com/tildearrow/furnace
https://github.com/tildearrow/furnace/commit/0eb02422d5161767e9983bdaa5c429762d3477ce
fix possible pattern crash issue #325
1
inline void FurnaceGUI::patternRow(int i, bool isPlaying, float lineHeight, int chans, int ord, const DivPattern** patCache) { static char id[32]; bool selectedRow=(i>=sel1.y && i<=sel2.y); ImGui::TableNextRow(0,lineHeight); ImGui::TableNextColumn(); float cursorPosY=ImGui::GetCursorPos().y-ImGui::GetScrollY(...
17036366544095628794236625993100848883
pattern.cpp
65197606135408680585944772278654686188
CWE-703
CVE-2022-1289
A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.
https://nvd.nist.gov/vuln/detail/CVE-2022-1289
246,237
furnace
0eb02422d5161767e9983bdaa5c429762d3477ce
https://github.com/tildearrow/furnace
https://github.com/tildearrow/furnace/commit/0eb02422d5161767e9983bdaa5c429762d3477ce
fix possible pattern crash issue #325
0
inline void FurnaceGUI::patternRow(int i, bool isPlaying, float lineHeight, int chans, int ord, const DivPattern** patCache) { static char id[32]; bool selectedRow=(i>=sel1.y && i<=sel2.y); ImGui::TableNextRow(0,lineHeight); ImGui::TableNextColumn(); float cursorPosY=ImGui::GetCursorPos().y-ImGui::GetScrollY(...
128714146198604784815522114188273080778
pattern.cpp
168724633676180669300352035041454609320
CWE-703
CVE-2022-1289
A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.
https://nvd.nist.gov/vuln/detail/CVE-2022-1289
196,846
tensorflow
1e206baedf8bef0334cca3eb92bab134ef525a28
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28
Prevent a division by 0 in division ops. PiperOrigin-RevId: 385223169 Change-Id: Ia4228960b5d2aa44480385f74bdd70d21a3613c3
1
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { auto* params = reinterpret_cast<TfLiteDivParams*>(node->builtin_data); OpData* data = reinterpret_cast<OpData*>(node->user_data); const TfLiteTensor* input1; TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor1, &...
74793210691338682931219587955813295204
div.cc
136615346340517059112870142252291864399
CWE-369
CVE-2021-37683
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the...
https://nvd.nist.gov/vuln/detail/CVE-2021-37683
246,495
tensorflow
1e206baedf8bef0334cca3eb92bab134ef525a28
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28
Prevent a division by 0 in division ops. PiperOrigin-RevId: 385223169 Change-Id: Ia4228960b5d2aa44480385f74bdd70d21a3613c3
0
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { auto* params = reinterpret_cast<TfLiteDivParams*>(node->builtin_data); OpData* data = reinterpret_cast<OpData*>(node->user_data); const TfLiteTensor* input1; TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor1, &...
11976239460896947994282427616906942562
div.cc
298114320359155685162419383998362245720
CWE-369
CVE-2021-37683
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc). There is no check that the...
https://nvd.nist.gov/vuln/detail/CVE-2021-37683
196,860
gpac
a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f
fixed #1782 (fuzz)
1
GF_Err afra_box_read(GF_Box *s, GF_BitStream *bs) { unsigned int i; GF_AdobeFragRandomAccessBox *ptr = (GF_AdobeFragRandomAccessBox *)s; ISOM_DECREASE_SIZE(ptr, 9) ptr->long_ids = gf_bs_read_int(bs, 1); ptr->long_offsets = gf_bs_read_int(bs, 1); ptr->global_entries = gf_bs_read_int(bs, 1); ptr->reserved = gf_bs...
312927211426500504617752335989791880756
None
CWE-787
CVE-2021-33361
Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2021-33361
246,693
gpac
a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f
fixed #1782 (fuzz)
0
GF_Err afra_box_read(GF_Box *s, GF_BitStream *bs) { unsigned int i; GF_AdobeFragRandomAccessBox *ptr = (GF_AdobeFragRandomAccessBox *)s; ISOM_DECREASE_SIZE(ptr, 9) ptr->long_ids = gf_bs_read_int(bs, 1); ptr->long_offsets = gf_bs_read_int(bs, 1); ptr->global_entries = gf_bs_read_int(bs, 1); ptr->reserved = gf_bs...
301022642870722199968022360468016167215
None
CWE-787
CVE-2021-33361
Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2021-33361
196,885
tensorflow
9e62869465573cb2d9b5053f1fa02a81fce21d69
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69
Add more validation to `RequantizationRangePerChannel`. PiperOrigin-RevId: 387693946 Change-Id: Ife8dcbdb021bec4787eef6a4361dd08f17c14bd6
1
void Compute(OpKernelContext* ctx) override { const Tensor& input = ctx->input(kInputTensorIndex); const Tensor& input_min = ctx->input(kInputMinIndex); const Tensor& input_max = ctx->input(kInputMaxIndex); const size_t depth = input_max.NumElements(); OP_REQUIRES( ctx, input_min.dim_size...
260350269729869693096839937488434150493
mkl_requantization_range_per_channel_op.cc
184757242449876370761844438653930390458
CWE-703
CVE-2021-37665
TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [impl...
https://nvd.nist.gov/vuln/detail/CVE-2021-37665
247,290
tensorflow
9e62869465573cb2d9b5053f1fa02a81fce21d69
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69
Add more validation to `RequantizationRangePerChannel`. PiperOrigin-RevId: 387693946 Change-Id: Ife8dcbdb021bec4787eef6a4361dd08f17c14bd6
0
void Compute(OpKernelContext* ctx) override { const Tensor& input = ctx->input(kInputTensorIndex); const Tensor& input_min = ctx->input(kInputMinIndex); const Tensor& input_max = ctx->input(kInputMaxIndex); const size_t depth = input_max.NumElements(); OP_REQUIRES( ctx, input_min.dim_size...
65335252627103993681002050942452280098
mkl_requantization_range_per_channel_op.cc
130833376136830385582561054482718538709
CWE-703
CVE-2021-37665
TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [impl...
https://nvd.nist.gov/vuln/detail/CVE-2021-37665