ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
OSS-Fuzz | OSV-2020-540 | Heap-buffer-overflow in byte_from_wkb_state | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16591
Crash type: Heap-buffer-overflow READ 1
Crash state:
byte_from_wkb_state
lwgeom_from_wkb_state
lwcollection_from_wkb_state
| null | 2021-03-09T04:49:05.943217Z | 2020-07-01T00:00:15.605041Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16591', 'https://git.osgeo.org/gitea/postgis/postgis/commit/b1abe27db0869d345ac5c0240a21e322a725fff9'} | {'https://git.osgeo.org/gitea/postgis/postgis/commit/e0b9fcce14c44a6a3be8e79a4cb3a2d13e79fc7a'} |
OSS-Fuzz | OSV-2020-76 | Heap-use-after-free in pixAverageRasterScans | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760
```
Crash type: Heap-use-after-free READ 1
Crash state:
pixAverageRasterScans
pixExtractBarcodeCrossings
pixExtractBarcodeWidths1
```
| null | 2022-04-13T03:04:32.704451Z | 2020-06-24T01:51:13.003871Z | HIGH | null | null | {'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760'} | {'https://github.com/DanBloomberg/leptonica/commit/f053b173bc94ef35a99ddf8eb608f63ae794b5fa'} |
OSS-Fuzz | OSV-2020-405 | Stack-buffer-overflow in ZSTD_decodeLiteralsBlock | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445
```
Crash type: Stack-buffer-overflow WRITE {*}
Crash state:
ZSTD_decodeLiteralsBlock
ZSTD_decompressBlock
ZSTD_decompressDCtx
```
| null | 2022-04-13T03:19:42.457329Z | 2020-07-01T00:00:07.677115Z | HIGH | null | null | {'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445'} | {'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'} |
OSS-Fuzz | OSV-2021-1311 | Null-dereference READ in unzOpenCurrentFile3 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873
```
Crash type: Null-dereference READ
Crash state:
unzOpenCurrentFile3
unzOpenCurrentFile
Assimp::ZipFileInfo::Extract
```
| null | 2022-04-13T03:04:42.679623Z | 2021-09-18T00:00:37.776159Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873', 'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'} | {'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'} |
OSS-Fuzz | OSV-2018-156 | Heap-buffer-overflow in dotnet_parse_us | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
dotnet_parse_us
dotnet_parse_com
dotnet__load
```
| null | 2022-04-13T03:04:42.270609Z | 2021-01-13T00:01:07.126725Z | MEDIUM | null | null | {'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945'} | {'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'} |
OSS-Fuzz | OSV-2020-956 | Heap-buffer-overflow in ndpi_workflow_process_packet | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
ndpi_workflow_process_packet
fuzz_ndpi_reader.c
HonggfuzzPersistentLoop
```
| null | 2022-04-13T03:04:35.902440Z | 2020-07-22T00:00:25.708813Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644', 'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a'} | {'https://github.com/ntop/nDPI/commit/98d9f524f9ff7746d0345939fe543020f8057212'} |
OSS-Fuzz | OSV-2021-1741 | Stack-buffer-overflow in line_join_points | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42796
Crash type: Stack-buffer-overflow WRITE 4
Crash state:
line_join_points
stroke_add_compat
gx_stroke_path_only
| null | 2021-12-23T00:00:50.608103Z | 2021-12-23T00:00:50.607893Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42796', 'git://git.ghostscript.com/ghostpdl/commit/07cfc24d532beadf23d50effa3b8a0bca45b849d'} | {'git://git.ghostscript.com/ghostpdl/commit/866d8b4b104e2dcbd8352cf86edff28bbf9ad165'} |
OSS-Fuzz | OSV-2020-1423 | Use-of-uninitialized-value in txt2sd | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219
```
Crash type: Use-of-uninitialized-value
Crash state:
txt2sd
fuzz_mdns_xht.cc
txt2sd
```
| null | 2022-04-15T00:06:34.889356Z | 2020-07-28T00:00:16.191970Z | MEDIUM | null | null | {'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219'} | {'https://github.com/open62541/open62541/commit/2919785d72474ed553317c4f3bafadf3e8c027f2', 'https://github.com/open62541/open62541/commit/798210374ad7a5fd43b31fc3c178a34a3ac21a0c'} |
OSS-Fuzz | OSV-2020-8 | Heap-buffer-overflow in findNextBorderPixel | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
findNextBorderPixel
pixGetHoleBorder
pixGetCCBorders
```
| null | 2022-04-13T03:04:32.639074Z | 2020-06-24T01:51:09.673990Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433', 'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'} | {'https://github.com/DanBloomberg/leptonica/commit/a53cfc7bd554dc4c2644b8f27ac5296fd926725f'} |
OSS-Fuzz | OSV-2020-1264 | Use-of-uninitialized-value in AnnotAppearanceBuilder::drawText | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17607
Crash type: Use-of-uninitialized-value
Crash state:
AnnotAppearanceBuilder::drawText
AnnotAppearanceBuilder::drawFormFieldChoice
AnnotAppearanceBuilder::drawFormField
| null | 2021-06-23T06:26:15.714573Z | 2020-07-22T21:50:01.559473Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17607', 'https://gitlab.freedesktop.org/poppler/poppler/commit/0e8ed9a34e04cc4e56b31f4057c267630c4a7656'} | {'https://gitlab.freedesktop.org/poppler/poppler/commit/c9e2dc7ea7e098875e6b93566bdb1d14451c3673'} |
OSS-Fuzz | OSV-2021-242 | Heap-buffer-overflow in rans_uncompress_to_4x16 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
rans_uncompress_to_4x16
rans_decode
uncompress
```
| null | 2022-04-13T03:04:32.338631Z | 2021-01-26T23:45:33.235035Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d', 'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08'} | {'https://github.com/samtools/htslib/commit/0d1971cbebb269d90a563464e4f56987290e20ab'} |
OSS-Fuzz | OSV-2020-2018 | Heap-use-after-free in fpixChangeRefcount | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260
```
Crash type: Heap-use-after-free READ 4
Crash state:
fpixChangeRefcount
fpixDestroy
fpix2_fuzzer.cc
```
| null | 2022-04-13T03:04:32.714945Z | 2020-10-12T00:00:40.582555Z | HIGH | null | null | {'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260'} | {'https://github.com/DanBloomberg/leptonica/commit/ef35b298c87cee04bf35dac4bc7c8c489d26fbc4'} |
OSS-Fuzz | OSV-2020-612 | Use-of-uninitialized-value in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066
```
Crash type: Use-of-uninitialized-value
Crash state:
std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std::
Sass::ComplexSelector::resolve_parent_refs
Sass::Eval::operator
```
| null | 2022-04-13T03:04:38.465562Z | 2020-07-01T00:00:20.375619Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066', 'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'} | {'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'} |
OSS-Fuzz | OSV-2020-242 | Heap-buffer-overflow in ndpi_workflow_process_packet | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089
```
Crash type: Heap-buffer-overflow READ 2
Crash state:
ndpi_workflow_process_packet
fuzz_ndpi_reader.c
```
| null | 2022-04-13T03:04:36.221336Z | 2020-06-26T00:00:09.227452Z | MEDIUM | null | null | {'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089'} | {'https://github.com/ntop/nDPI/commit/10738a0ca334104377e19a1e683bd13f2451a9e2'} |
OSS-Fuzz | OSV-2021-1805 | Heap-buffer-overflow in ndpi_search_kerberos | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
ndpi_search_kerberos
check_ndpi_detection_func
ndpi_check_flow_func
```
| null | 2022-04-13T03:04:36.014290Z | 2022-01-23T00:00:37.838585Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925', 'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044'} | {'https://github.com/ntop/nDPI/commit/ed51987e3a4838dd9aef27dfab2c0651f2f52836'} |
OSS-Fuzz | OSV-2020-757 | Heap-buffer-overflow in cras_channel_remix_conv_create | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23612
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
cras_channel_remix_conv_create
audio_thread_config_global_remix
ccr_handle_message_from_client
```
| null | 2022-04-13T03:04:42.576554Z | 2020-07-09T00:00:09.165795Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23612', 'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/144bf3828e41b26c7746be463d17d6ea55dd7163'} | {'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/829025d88c2f1d4cbe0daa02ed37f88b4b3fffd7'} |
OSS-Fuzz | OSV-2020-307 | Heap-buffer-overflow in spng_decode_image | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
spng_decode_image
spng_read_fuzzer.cc
```
| null | 2022-04-13T03:04:33.693276Z | 2020-06-30T00:00:49.046191Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830', 'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'} | {'https://github.com/randy408/libspng/commit/d48a9fa212cee4c05c51178b9c7813cd1299dcb3'} |
OSS-Fuzz | OSV-2021-1413 | UNKNOWN READ in helper_uc_tracecode | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559
```
Crash type: UNKNOWN READ
Crash state:
helper_uc_tracecode
```
| null | 2022-04-13T03:26:07.599894Z | 2021-10-05T00:01:45.386128Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559', 'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374'} | {'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'} |
OSS-Fuzz | OSV-2021-757 | Use-of-uninitialized-value in nn_check_initialized | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156
```
Crash type: Use-of-uninitialized-value
Crash state:
nn_check_initialized
nn_zero
ecgdsa_sign_raw
```
| null | 2022-04-13T03:04:31.416903Z | 2021-05-12T00:01:05.638739Z | MEDIUM | null | null | {'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156'} | {'https://github.com/ANSSI-FR/libecc/commit/f3abf297e84874278129fb91bc1b89356dd66627'} |
OSS-Fuzz | OSV-2021-307 | UNKNOWN READ in cpu_arm_exec_armeb | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444
```
Crash type: UNKNOWN READ
Crash state:
cpu_arm_exec_armeb
resume_all_vcpus_armeb
vm_start_armeb
```
| null | 2022-04-13T03:27:15.927960Z | 2021-02-08T00:00:08.491999Z | MEDIUM | null | null | {'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210', 'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444'} | {'https://github.com/unicorn-engine/unicorn/commit/07f94ad1fc62293cac330df9714d739be6354926'} |
OSS-Fuzz | OSV-2020-1321 | UNKNOWN READ in FlowGetHash | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479
```
Crash type: UNKNOWN READ
Crash state:
FlowGetHash
FlowSetupPacket
DecodeICMPV4
```
| null | 2022-04-13T03:04:32.748792Z | 2020-07-22T21:50:06.291563Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479', 'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f'} | {'https://github.com/OISF/suricata/commit/19fe8d9894207f18dbd305a5834820f3a698dc32'} |
OSS-Fuzz | OSV-2018-204 | UNKNOWN WRITE in __msan_memcpy.part.51 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845
```
Crash type: UNKNOWN WRITE
Crash state:
__msan_memcpy.part.51
QuickOpen::ReadRaw
QuickOpen::ReadNext
```
| null | 2022-04-13T03:04:35.292989Z | 2021-01-13T00:01:23.035709Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845'} | {'https://github.com/aawc/unrar/commit/bc53b57bf64fa0919981c362252637f9c57012b2'} |
OSS-Fuzz | OSV-2018-64 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
BEInt<unsigned int, 4>::operator unsigned int
void hb_sanitize_context_t::set_object<OT::KernSubTable<OT::KernAATSubTableHeade
AAT::KerxTable<OT::KernAAT>::sanitize
```
| null | 2022-04-13T03:04:32.803589Z | 2021-01-13T00:00:31.625117Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522', 'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'} | {'https://github.com/harfbuzz/harfbuzz/commit/758c9d68e2143493978d8ac8391f4af2a2abc26a'} |
OSS-Fuzz | OSV-2020-184 | Heap-buffer-overflow in file_strncmp | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044
```
Crash type: Heap-buffer-overflow READ 13
Crash state:
file_strncmp
magiccheck
match
```
| null | 2022-04-13T03:04:30.870815Z | 2020-06-24T01:51:17.908691Z | MEDIUM | null | null | {'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044'} | {'https://github.com/file/file/commit/020876142969029eefc7a52d5545d0475203c472'} |
OSS-Fuzz | OSV-2021-887 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436
```
Crash type: Use-after-poison WRITE 8
Crash state:
AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr
AK::String::String
JS::abstract_relation
```
| null | 2022-04-13T03:04:32.211472Z | 2021-06-22T00:01:25.243822Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436', 'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'} | {'https://github.com/SerenityOS/serenity/commit/c31392510aa21d3ce5000f19a12dcf43abf9613d'} |
OSS-Fuzz | OSV-2020-2274 | Heap-buffer-overflow in McCopyWidthEq4_c | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
McCopyWidthEq4_c
McCopy_sse2
McChroma_ssse3
```
| null | 2022-04-13T03:04:37.647508Z | 2020-12-19T00:00:41.113564Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769', 'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71', 'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b'} | {'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'} |
OSS-Fuzz | OSV-2020-1008 | Use-of-uninitialized-value in ihevc_recon_32x32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20476
```
Crash type: Use-of-uninitialized-value
Crash state:
ihevc_recon_32x32
ihevcd_iquant_itrans_recon_ctb
ihevcd_process
```
| null | 2022-04-13T03:29:09.175087Z | 2020-07-22T21:49:39.707812Z | MEDIUM | null | null | {'https://android.googlesource.com/platform/external/libhevc/commit/35d222d35253c15e130762fcf54a43d4543a2785', 'https://android.googlesource.com/platform/external/libhevc/commit/229e7ee2142c0f78c7736518a5c8cc1d131f4a30', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20476'} | {'https://android.googlesource.com/platform/external/libhevc/commit/d28f2210ee8e65afdfb07a1fd6582285d3d178e0'} |
OSS-Fuzz | OSV-2021-1690 | Global-buffer-overflow in search_table_1 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42266
Crash type: Global-buffer-overflow READ 1
Crash state:
search_table_1
split_bogus_operator
pdfi_interpret_stream_operator
| null | 2021-12-14T00:01:39.477871Z | 2021-12-14T00:01:39.477607Z | null | null | null | {'git://git.ghostscript.com/ghostpdl/commit/82b097fe8e76ea92f69ef483f45c0cf491a98d43', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42266'} | {'git://git.ghostscript.com/ghostpdl/commit/75fbddf52051987287e62d13c659eb73ba16982f'} |
OSS-Fuzz | OSV-2021-184 | Heap-buffer-overflow in H5HL__fl_deserialize | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29580
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
H5HL__fl_deserialize
H5HL__cache_datablock_deserialize
H5C_load_entry
```
| null | 2022-04-13T03:04:43.102279Z | 2021-01-15T00:00:16.202094Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29580'} | {'git://git.code.sf.net/p/matio/matio/commit/1ce8f2d1845ecdde19a35605cabdbb884776d52d'} |
OSS-Fuzz | OSV-2020-868 | Use-of-uninitialized-value in fetchARGB32ToRGBA64PM_avx2 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21808
```
Crash type: Use-of-uninitialized-value
Crash state:
fetchARGB32ToRGBA64PM_avx2
blend_untransformed_generic_rgb64
fillRect_normalized
```
| null | 2022-05-08T00:03:51.202662Z | 2020-07-14T22:13:50.828646Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21808'} | {'https://invent.kde.org/frameworks/kimageformats/commit/c60e77c048d32ccf743cec695743b77b2b25dc87'} |
OSS-Fuzz | OSV-2021-1385 | Heap-buffer-overflow in Assimp::BaseImporter::ConvertToUTF8 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
Assimp::BaseImporter::ConvertToUTF8
Assimp::BaseImporter::TextFileToBuffer
Assimp::OpenGEX::OpenGEXImporter::InternReadFile
```
| null | 2022-04-13T03:04:42.673761Z | 2021-09-28T00:00:07.486971Z | MEDIUM | null | null | {'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339'} | {'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'} |
OSS-Fuzz | OSV-2021-868 | Heap-buffer-overflow in ndpi_set_detected_protocol | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
ndpi_set_detected_protocol
ndpi_match_hostname_protocol
processClientServerHello
```
| null | 2022-04-13T03:04:36.145859Z | 2021-06-18T00:00:07.405397Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288', 'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121'} | {'https://github.com/ntop/nDPI/commit/be808c30f3f4582009df4c5efccd4f3bb0c6ef1d'} |
OSS-Fuzz | OSV-2020-491 | Stack-buffer-overflow in Mat_VarReadNextInfo5 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17119
```
Crash type: Stack-buffer-overflow READ 4
Crash state:
Mat_VarReadNextInfo5
Mat_GetDir
MatioRead
```
| null | 2022-04-13T03:04:43.112894Z | 2020-07-01T00:00:12.708028Z | MEDIUM | null | null | {'git://git.code.sf.net/p/matio/matio/commit/8b3ee30a8d9cfdc3799252a4a42572fc6f8e205e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17119'} | {'git://git.code.sf.net/p/matio/matio/commit/f94c087aa9be54ec86a01e267b80fd61108069be'} |
OSS-Fuzz | OSV-2020-215 | Use-of-uninitialized-value in xmlStrdup | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23144
Crash type: Use-of-uninitialized-value
Crash state:
xmlStrdup
__xmlRaiseError
xmlErrValidNode
| null | 2021-03-09T04:49:05.688089Z | 2020-06-24T01:51:19.309469Z | MEDIUM | null | null | {'https://gitlab.gnome.org/GNOME/libxml2/commit/2af3c2a8b974cb5896cd3beb74561ba979de9f34', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23144'} | {'https://gitlab.gnome.org/GNOME/libxml2/commit/00ed736eecf93aeab49089abb06e0e5fc0e7e091'} |
OSS-Fuzz | OSV-2020-1233 | Heap-buffer-overflow in getTLScertificate | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269
```
Crash type: Heap-buffer-overflow READ 6
Crash state:
getTLScertificate
tlsDetectProtocolFromCertificate
ndpi_search_tls_tcp_udp
```
| null | 2022-04-13T03:04:36.352534Z | 2020-07-22T21:49:58.860561Z | MEDIUM | null | null | {'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269'} | {'https://github.com/ntop/nDPI/commit/e695dd6eade754b2d50bdf297ca8bdc4105f93ff'} |
OSS-Fuzz | OSV-2020-1726 | Heap-use-after-free in xmlXPathNodeSetAdd | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25536
Crash type: Heap-use-after-free READ 4
Crash state:
xmlXPathNodeSetAdd
xmlXPathGetElementsByIds
xmlXPathIdFunction
| null | 2021-03-09T04:49:05.408455Z | 2020-09-11T00:00:07.083398Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25536', 'https://gitlab.gnome.org/GNOME/libxml2/commit/b215c270fa3b1436314cc56654718bd12182cfec'} | {'https://gitlab.gnome.org/GNOME/libxml2/commit/f0fd1b67fc883a24cdd039abb3d4fe4696104d72'} |
OSS-Fuzz | OSV-2021-700 | UNKNOWN READ in ReadLEB_u32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749
```
Crash type: UNKNOWN READ
Crash state:
ReadLEB_u32
InitElements
Compile_ExtendedOpcode
```
| null | 2022-04-13T03:04:30.651451Z | 2021-04-29T00:00:12.162949Z | MEDIUM | null | null | {'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749'} | {'https://github.com/wasm3/wasm3/commit/8cb2fd424309fa6ff70cf00bfcedc4e66d3355c0'} |
OSS-Fuzz | OSV-2020-700 | Stack-buffer-overflow in ot::Message::Write | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380
```
Crash type: Stack-buffer-overflow READ {*}
Crash state:
ot::Message::Write
ot::Message::Append
ot::Mle::Mle::AppendResponse
```
| null | 2022-04-13T03:04:38.888636Z | 2020-07-01T00:00:25.618153Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380', 'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'} | {'https://github.com/openthread/openthread/commit/b694b00951eeeb4986387de1179d55dd38643a87'} |
OSS-Fuzz | OSV-2021-429 | Heap-buffer-overflow in blosc_d | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
blosc_d
_blosc_getitem
blosc2_getitem_ctx
```
| null | 2022-04-13T03:04:40.451804Z | 2021-02-22T00:00:20.030600Z | HIGH | null | null | {'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170'} | {'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'} |
OSS-Fuzz | OSV-2020-429 | Heap-buffer-overflow in MEM_read32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
MEM_read32
ZSTDv05_decodeSequence
ZSTDv05_decompressSequences
```
| null | 2022-04-13T03:04:31.653842Z | 2020-07-01T00:00:08.999234Z | MEDIUM | null | null | {'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368'} | {'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'} |
OSS-Fuzz | OSV-2020-2223 | Heap-use-after-free in e1000e_write_packet_to_guest | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28194
Crash type: Heap-use-after-free READ 8
Crash state:
e1000e_write_packet_to_guest
e1000e_receive_iov
e1000e_nc_receive_iov
| null | 2021-03-09T04:49:05.727354Z | 2020-12-04T00:00:19.497055Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28194', 'https://git.qemu.org/git/qemu/commit/b98b9fdef00e2383f63f939e079fe2c9eba87ca1'} | {'https://git.qemu.org/git/qemu/commit/7564bf7701f00214cdc8a678a9f7df765244def1'} |
OSS-Fuzz | OSV-2018-33 | Heap-buffer-overflow in yr_object_set_string | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
yr_object_set_string
dotnet_parse_us
dotnet_parse_com
```
| null | 2022-04-13T03:04:42.242196Z | 2021-01-13T00:00:14.651679Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560', 'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f'} | {'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'} |
OSS-Fuzz | OSV-2022-67 | Heap-buffer-overflow in cli_bcomp_freemeta | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
cli_bcomp_freemeta
cli_bcomp_addpatt
cli_parse_add
```
| null | 2022-04-13T03:04:39.425407Z | 2022-01-21T00:00:45.048694Z | MEDIUM | null | null | {'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816'} | {'https://github.com/Cisco-Talos/clamav/commit/0037f5825b0b17a789c7eb29c9cb9a2d39c452bc'} |
OSS-Fuzz | OSV-2020-1819 | Heap-buffer-overflow in void cv::copyToMat<int> | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
void cv::copyToMat<int>
cv::decodeSRGBData
cv::Jpeg2KOpjDecoder::readData
```
| null | 2022-04-13T03:04:31.501046Z | 2020-09-21T00:00:12.969129Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779', 'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731'} | {'https://github.com/opencv/opencv/commit/bfd056ceb1ad6529e1a2103f60e6f089c6b70109'} |
OSS-Fuzz | OSV-2021-1628 | Stack-buffer-overflow in sprint_realloc_hinted_integer | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41372
```
Crash type: Stack-buffer-overflow WRITE 1
Crash state:
sprint_realloc_hinted_integer
sprint_realloc_integer
snprint_integer
```
| null | 2022-04-13T03:04:35.842933Z | 2021-11-27T00:01:21.208846Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41372'} | {'https://github.com/net-snmp/net-snmp/commit/94436b16947c3f9039b96c4cc135507d864b422d'} |
OSS-Fuzz | OSV-2018-195 | Heap-buffer-overflow in gmp_emsa_pkcs1_signature_data | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
gmp_emsa_pkcs1_signature_data
verify_emsa_pkcs1_signature
verify
```
| null | 2022-04-13T03:04:34.061437Z | 2021-01-13T00:01:21.218732Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671', 'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09'} | {'https://github.com/strongswan/strongswan/commit/5955db5b124a1ee5f44c0845b6e00c86fddae67c'} |
OSS-Fuzz | OSV-2018-300 | Use-of-uninitialized-value in fz_unpack_tile | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=8326
Crash type: Use-of-uninitialized-value
Crash state:
fz_unpack_tile
fz_decomp_image_from_stream
compressed_image_get_pixmap
| null | 2021-06-23T06:24:53.189401Z | 2021-01-15T00:00:27.081384Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=8326', 'git://git.ghostscript.com/mupdf/commit/43a0278d42ac1b350ce6b582f9d0e3d7785a17b6'} | {'git://git.ghostscript.com/mupdf/commit/11ee2bcf4d23bcb443d6b39caa2ac62fdd9920b2'} |
OSS-Fuzz | OSV-2020-653 | Heap-buffer-overflow in perfetto::base::Hash::Update | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14753
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
perfetto::base::Hash::Update
perfetto::base::StringView::Hash
perfetto::trace_processor::StringPool::InternString
```
| null | 2022-04-13T03:40:10.578056Z | 2020-07-01T00:00:22.674176Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14753', 'https://android.googlesource.com/platform/external/perfetto//commit/71a18f6f4b01143a6ac7bba2261a4139076ea396'} | {'https://android.googlesource.com/platform/external/perfetto//commit/2ffc4a93685c45efec70e07c8acddf60eb1ae60a'} |
OSS-Fuzz | OSV-2017-16 | Heap-buffer-overflow in file_strncmp | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=750
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
file_strncmp
magiccheck
match
```
| null | 2022-04-13T03:04:30.843383Z | 2021-01-13T00:00:27.841127Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=750'} | {'https://github.com/file/file/commit/17f892b32cc92f7505f02d198142c1a57204582f'} |
OSS-Fuzz | OSV-2017-154 | Heap-buffer-overflow in TetrahedralInterpFloat | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
TetrahedralInterpFloat
_LUTeval16
CachedXFORM
```
| null | 2022-04-13T03:04:33.907967Z | 2021-01-15T00:01:25.369737Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852', 'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'} | {'https://github.com/mm2/Little-CMS/commit/46a9220375da02b179bb6c0314b5cef40a433792'} |
OSS-Fuzz | OSV-2021-1452 | Heap-buffer-overflow in mrb_funcall_with_block | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937
```
Crash type: Heap-buffer-overflow WRITE 8
Crash state:
mrb_funcall_with_block
mrb_instance_new
mrb_funcall_with_block
```
| null | 2022-04-13T03:04:39.698442Z | 2021-10-15T00:00:40.001741Z | HIGH | null | null | {'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937'} | {'https://github.com/mruby/mruby/commit/dccd66f9efecd0a974b735c62836fe566015cf37'} |
OSS-Fuzz | OSV-2020-1730 | Bad-cast to RDKit::Atom | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547
```
Crash type: Bad-cast
Crash state:
Bad-cast to RDKit::Atom
```
| null | 2022-04-13T03:04:41.515246Z | 2020-09-11T00:00:51.334144Z | HIGH | null | null | {'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547'} | {'https://github.com/rdkit/rdkit/commit/a9010da8a4af17479c706f2cf4e8c6acdc1585ce'} |
OSS-Fuzz | OSV-2018-245 | Use-of-uninitialized-value in fz_keep_imp | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6837
```
Crash type: Use-of-uninitialized-value
Crash state:
fz_keep_imp
pdf_copy_pattern_gstate
pdf_show_pattern
```
| null | 2022-04-13T03:04:31.216503Z | 2021-01-15T00:00:05.471739Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6837', 'git://git.ghostscript.com/mupdf/commit/04c37454b9ef5a0576c3dd34adc7426450bf18e7'} | {'git://git.ghostscript.com/mupdf/commit/11ee2bcf4d23bcb443d6b39caa2ac62fdd9920b2'} |
OSS-Fuzz | OSV-2020-1049 | Heap-use-after-free in WelsDec::WelsReorderRefList | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027
```
Crash type: Heap-use-after-free READ 4
Crash state:
WelsDec::WelsReorderRefList
WelsDec::InitRefPicList
WelsDec::DecodeCurrentAccessUnit
```
| null | 2022-04-13T03:04:37.547498Z | 2020-07-22T21:49:43.177956Z | HIGH | null | null | {'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027'} | {'https://github.com/cisco/openh264/commit/70eeb783515dbfee3e0c781d6667838caba5113b'} |
OSS-Fuzz | OSV-2020-829 | Heap-use-after-free in check_content_type_and_change_protocol | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834
```
Crash type: Heap-use-after-free READ 2
Crash state:
check_content_type_and_change_protocol
ndpi_check_http_tcp
ndpi_search_http_tcp
```
| null | 2022-04-13T03:04:36.363405Z | 2020-07-14T05:37:49.889652Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834', 'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'} | {'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'} |
OSS-Fuzz | OSV-2020-254 | Heap-buffer-overflow in pixReadFromTiffStream | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
pixReadFromTiffStream
pixReadMemTiff
pixReadMem
```
| null | 2022-04-13T03:04:32.633763Z | 2020-06-26T00:00:11.669926Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c', 'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e'} | {'https://github.com/DanBloomberg/leptonica/commit/26425b91ea850552d11af0ead0557eb0a328785f'} |
OSS-Fuzz | OSV-2017-41 | Heap-buffer-overflow in OSS_FUZZ_png_combine_row | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606
```
Crash type: Heap-buffer-overflow WRITE 4
Crash state:
OSS_FUZZ_png_combine_row
OSS_FUZZ_png_read_row
_start
```
| null | 2022-04-13T03:04:35.564255Z | 2021-01-13T21:56:05.092063Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606', 'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'} | {'https://github.com/glennrp/libpng/commit/ab791fc9d69580c1982af726c9f61b533357234f'} |
OSS-Fuzz | OSV-2020-604 | UNKNOWN READ in Sass::Parser::parseCompoundSelector | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904
```
Crash type: UNKNOWN READ
Crash state:
Sass::Parser::parseCompoundSelector
Sass::Parser::parseComplexSelector
Sass::Parser::parseSelectorList
```
| null | 2022-04-13T03:04:38.493199Z | 2020-07-01T00:00:19.975718Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904', 'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'} | {'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'} |
OSS-Fuzz | OSV-2021-1110 | Stack-buffer-overflow in TranslateWord2 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36932
```
Crash type: Stack-buffer-overflow WRITE 1
Crash state:
TranslateWord2
TranslateClause
SpeakNextClause
```
| null | 2022-04-13T03:04:34.189849Z | 2021-08-08T00:02:17.026887Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36932'} | {'https://github.com/espeak-ng/espeak-ng/commit/0a713d52bbf3e061823d1a7f35e5303e7320f27a'} |
OSS-Fuzz | OSV-2020-1272 | Heap-buffer-overflow in ASN1_get_object | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
ASN1_get_object
asn1_check_tlen
asn1_item_ex_d2i
```
| null | 2022-04-13T03:04:38.807734Z | 2020-07-22T21:50:02.220943Z | MEDIUM | null | null | {'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803'} | {'https://github.com/libressl-portable/portable/commit/4ea2a01a0d2cc889e95316f51c7a36f8f158df44'} |
OSS-Fuzz | OSV-2022-318 | UNKNOWN READ | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356
```
Crash type: UNKNOWN READ
Crash state:
NULL```
| null | 2022-04-13T03:04:38.037322Z | 2022-04-07T00:01:51.631058Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356', 'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1'} | {'https://github.com/libvips/libvips/commit/9228e50f46b79dc448b9416a5ae1dfdcfdfcf98c'} |
OSS-Fuzz | OSV-2021-1540 | Heap-buffer-overflow in consume_list | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
consume_list
pn_amqp_decode_DqEoQBIoIe
pn_message_decode
```
| null | 2022-04-13T03:04:36.938644Z | 2021-11-06T00:01:33.530210Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723', 'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'} | {'https://github.com/apache/qpid-proton/commit/72c87537a136dbfc63a0c811d159631ecd0e3986'} |
OSS-Fuzz | OSV-2018-212 | Heap-buffer-overflow in token_stream_prepare | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9805
Crash type: Heap-buffer-overflow READ 1
Crash state:
token_stream_prepare
parse
typedecl_parse
| null | 2021-06-23T06:25:21.922868Z | 2021-01-13T00:01:26.134181Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9805', 'https://gitlab.gnome.org/GNOME/glib/commit/297941e049f819771f0ce0ba5623a6e60da9c208'} | {'https://gitlab.gnome.org/GNOME/glib/commit/10ee7301e8edb13e59143ee5653cd2b46e26c044'} |
OSS-Fuzz | OSV-2021-1055 | UNKNOWN WRITE in jxl::ModularFrameDecoder::DecodeGroup | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456
```
Crash type: UNKNOWN WRITE
Crash state:
jxl::ModularFrameDecoder::DecodeGroup
jxl::FrameDecoder::ProcessACGroup
jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections
```
| null | 2022-04-13T03:30:05.347108Z | 2021-07-25T00:00:32.621715Z | HIGH | null | null | {'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456'} | {'https://github.com/libvips/libvips/commit/813a5f84cf94c9e7c0fe9b043c545500aef11411'} |
OSS-Fuzz | OSV-2020-741 | Heap-buffer-overflow in uri_decoder | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23815
Crash type: Heap-buffer-overflow READ 1
Crash state:
uri_decoder
uri_decode
g_uri_parse_params
| null | 2021-03-09T04:49:06.051645Z | 2020-07-04T00:00:01.437763Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23815', 'https://gitlab.gnome.org/GNOME/glib/commit/f9d165add1342ecae6cdde1b95e9ce63320768dd'} | {'https://gitlab.gnome.org/GNOME/glib/commit/44524b9daa622058e3e55617b9b0d4c986e3b8b3'} |
OSS-Fuzz | OSV-2020-891 | Heap-buffer-overflow in ccr_handle_message_from_client | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23965
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
ccr_handle_message_from_client
cras_rclient_buffer_from_client
rclient_message.cc
```
| null | 2022-04-13T03:04:42.581747Z | 2020-07-21T00:00:05.825108Z | MEDIUM | null | null | {'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/1cfc1dc496821d3c5d8d160cc10941b25b9f95a0', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23965'} | {'https://chromium.googlesource.com/chromiumos/third_party/adhd/commit/144bf3828e41b26c7746be463d17d6ea55dd7163'} |
OSS-Fuzz | OSV-2021-1686 | Segv on unknown address in chunk_free_object | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42312
Crash type: Segv on unknown address
Crash state:
chunk_free_object
file_close_file
sclose
| null | 2021-12-14T00:00:38.296462Z | 2021-12-14T00:00:38.296258Z | null | null | null | {'git://git.ghostscript.com/ghostpdl/commit/31e249d5cbd561d76dd2149ceee5fe3a2d84d658', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42312'} | {'git://git.ghostscript.com/ghostpdl/commit/6a4847cd2566e8446753fd0ba17fe2f42c6e0315'} |
OSS-Fuzz | OSV-2021-891 | Heap-buffer-overflow in __cil_cat_expr_range_to_bitmap_helper | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
__cil_cat_expr_range_to_bitmap_helper
__cil_expr_to_bitmap
__evaluate_cat_expression
```
| null | 2022-04-13T03:04:42.328918Z | 2021-06-24T00:00:40.542962Z | MEDIUM | null | null | {'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492'} | {'https://github.com/SELinuxProject/selinux/commit/982ec302b67f3c7f8df667dadb67352b1e4a6d18'} |
OSS-Fuzz | OSV-2020-468 | Stack-buffer-overflow in ot::Ip6::Address::FromString | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821
```
Crash type: Stack-buffer-overflow WRITE 1
Crash state:
ot::Ip6::Address::FromString
ot::Cli::Coap::ProcessRequest
ot::Cli::Interpreter::ProcessCoap
```
| null | 2022-04-13T03:04:38.893804Z | 2020-07-01T00:00:11.286088Z | HIGH | null | null | {'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821'} | {'https://github.com/openthread/openthread/commit/1a4b249a9527c88ea2f573fea9fda39bb025b5b1'} |
OSS-Fuzz | OSV-2018-72 | Use-of-uninitialized-value in read_pbkdf2_params | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10143
```
Crash type: Use-of-uninitialized-value
Crash state:
read_pbkdf2_params
_gnutls_read_pkcs_schema_params
pkcs8_key_decrypt
```
| null | 2022-04-13T03:04:35.613386Z | 2021-01-13T00:00:34.744580Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10143', 'https://gitlab.com/gnutls/gnutls/commit/f6b4695ccafd6945cc7affda4ab9f7b9f9ed8616'} | {'https://gitlab.com/gnutls/gnutls/commit/344b2cc8f68cdde1744198034276d0e6720b1d19'} |
OSS-Fuzz | OSV-2020-487 | UNKNOWN READ in crc32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278
```
Crash type: UNKNOWN READ
Crash state:
crc32
update_crc
push_data_ready
```
| null | 2022-04-13T03:04:41.162898Z | 2020-07-01T00:00:12.477818Z | MEDIUM | null | null | {'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278'} | {'https://github.com/libarchive/libarchive/commit/4bd12b6f40cb4413c8970c52f15f3b6885b5e32f'} |
OSS-Fuzz | OSV-2021-1239 | Heap-buffer-overflow in stbi__load_and_postprocess_8bit | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38394
```
Crash type: Heap-buffer-overflow READ 2
Crash state:
stbi__load_and_postprocess_8bit
stb_image.h
```
| null | 2022-04-13T03:04:40.826791Z | 2021-09-12T00:01:05.421369Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38394'} | {'https://github.com/nothings/stb/commit/8c15cc9c79bf6f180d74808657046caf2ec0b445'} |
OSS-Fuzz | OSV-2021-487 | UNKNOWN READ in blosc_run_decompression_with_context | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611
```
Crash type: UNKNOWN READ
Crash state:
blosc_run_decompression_with_context
blosc2_decompress_ctx
frame_decompress_chunk
```
| null | 2022-04-13T03:04:40.286519Z | 2021-03-04T00:02:22.600849Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611', 'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77'} | {'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'} |
PyPI | PYSEC-2020-85 | null | An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site. | {'CVE-2020-7936'} | 2020-01-24T21:32:00Z | 2020-01-23T21:15:00Z | null | null | null | {'https://plone.org/security/hotfix/20200121', 'https://www.openwall.com/lists/oss-security/2020/01/22/1', 'https://plone.org/security/hotfix/20200121/an-open-redirection-on-the-login-form-and-possibly-other-places', 'http://www.openwall.com/lists/oss-security/2020/01/24/1'} | null |
PyPI | GHSA-mq5c-prh3-3f3h | Invalid validation in `QuantizeAndDequantizeV2` | ### Impact
The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:
```python
import tensorflow as tf
input_tensor = tf.constant([0.0], shape=[1], dtype=float)
input_min = tf.constant(-10.0)
input_max = tf.constant(-10.0)
tf.raw_ops.QuantizeAndDequantizeV2(
input=input_tensor, input_min=input_min, input_max=input_max,
signed_input=False, num_bits=1, range_given=False, round_mode='HALF_TO_EVEN',
narrow_range=False, axis=-2)
```
The [validation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions:
```cc
OP_REQUIRES(ctx,
(axis_ == -1 || axis_ < input.shape().dims()),
errors::InvalidArgument(...));
```
If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap.
### Patches
We have patched the issue in GitHub commit [c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9](https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29610'} | 2022-03-03T05:14:14.075606Z | 2021-05-21T14:28:32Z | LOW | null | {'CWE-665'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h', 'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29610'} | null |
PyPI | PYSEC-2021-171 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29534', 'GHSA-6j9c-grc6-5m6g'} | 2021-08-27T03:22:27.421981Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g'} | null |
PyPI | PYSEC-2021-521 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-cfx7-2xpc-8w4h', 'CVE-2021-29593'} | 2021-12-09T06:34:57.775345Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h'} | null |
PyPI | GHSA-5wv5-4vpf-pj6m | Unexpected memory usage in Pallets Project Flask | The Pallets Project Flask before 1.0 is affected by unexpected memory usage. The impact is denial of service. The attack vector is crafted encoded JSON data. The fixed version is 1. NOTE this may overlap CVE-2018-1000656. | {'CVE-2019-1010083'} | 2022-03-03T05:14:18.976195Z | 2019-07-19T16:12:46Z | HIGH | null | {'CWE-400'} | {'https://www.palletsprojects.com/blog/flask-1-0-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010083'} | null |
PyPI | PYSEC-2014-20 | null | The django.util.http.is_safe_url function in Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4 does not properly validate URLs, which allows remote attackers to conduct open redirect attacks via a malformed URL, as demonstrated by "http:\\\djangoproject.com." | {'CVE-2014-3730'} | 2021-09-01T08:18:55.675902Z | 2014-05-16T15:55:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-updates/2014-09/msg00023.html', 'http://www.openwall.com/lists/oss-security/2014/05/15/3', 'http://secunia.com/advisories/61281', 'http://ubuntu.com/usn/usn-2212-1', 'http://www.securityfocus.com/bid/67410', 'https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/', 'http://www.openwall.com/lists/oss-security/2014/05/14/10', 'http://www.debian.org/security/2014/dsa-2934'} | null |
PyPI | PYSEC-2021-464 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly. However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29536', 'GHSA-2gfx-95x2-5v3x'} | 2021-12-09T06:34:48.953620Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x', 'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} | null |
PyPI | PYSEC-2022-57 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-98j8-c9q4-r38g', 'CVE-2022-21733'} | 2022-03-09T00:17:30.939427Z | 2022-02-03T12:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161', 'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g'} | null |
PyPI | PYSEC-2019-137 | null | Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0. | {'CVE-2019-16786', 'GHSA-g2xc-35jw-c63p'} | 2020-02-25T17:15:00Z | 2019-12-20T23:15:00Z | null | null | null | {'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes', 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'} | null |
PyPI | GHSA-qg48-85hg-mqc5 | Division by 0 in `DenseCountSparseOutput` | ### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`:
```python
import tensorflow as tf
values = tf.constant([], shape=[0, 0], dtype=tf.int64)
weights = tf.constant([])
tf.raw_ops.DenseCountSparseOutput(
values=values, weights=weights,
minlength=-1, maxlength=58, binary_output=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division:
```cc
int num_batch_elements = 1;
for (int i = 0; i < num_batch_dimensions; ++i) {
num_batch_elements *= data.shape().dim_size(i);
}
int num_value_elements = data.shape().num_elements() / num_batch_elements;
```
Since `data` is given by the `values` argument, `num_batch_elements` is 0.
### Patches
We have patched the issue in GitHub commit [da5ff2daf618591f64b2b62d9d9803951b945e9f](https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29554'} | 2022-03-03T05:14:16.368742Z | 2021-05-21T14:23:55Z | LOW | null | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29554', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5', 'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'} | null |
PyPI | GHSA-fvx8-v524-8579 | Cleartext Storage of Sensitive Information | django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. | {'CVE-2020-17495'} | 2022-03-03T05:13:08.031054Z | 2021-06-04T21:46:52Z | HIGH | null | {'CWE-312'} | {'https://github.com/celery/django-celery-results/issues/142', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17495'} | null |
PyPI | PYSEC-2018-8 | null | io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter. | {'GHSA-8jxq-75rw-fhj9', 'CVE-2018-8097'} | 2021-06-10T06:51:29.570871Z | 2018-03-14T12:29:00Z | null | null | null | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/advisories/GHSA-8jxq-75rw-fhj9'} | null |
PyPI | GHSA-3rcw-9p9x-582v | Code injection in `saved_model_cli` | ### Impact
TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it [calls `eval` on user supplied strings](https://github.com/tensorflow/tensorflow/blob/87462bfac761435a46641ff2f10ad0b6e5414a4b/tensorflow/python/tools/saved_model_cli.py#L524-L550)
```python
def preprocess_input_exprs_arg_string(input_exprs_str):
...
for input_raw in filter(bool, input_exprs_str.split(';')):
...
input_key, expr = input_raw.split('=', 1)
input_dict[input_key] = eval(expr)
...
```
This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs.
However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users.
### Patches
We have patched the issue in GitHub commit [8b202f08d52e8206af2bdb2112a62fafbc546ec7](https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Omer Kaspi from Vdoo. | {'CVE-2021-41228'} | 2022-03-03T05:13:08.134086Z | 2021-11-10T16:54:02Z | HIGH | null | {'CWE-78', 'CWE-94'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v', 'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41228'} | null |
PyPI | PYSEC-2017-30 | null | modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp. | {'CVE-2015-1839'} | 2021-07-05T00:01:26.213768Z | 2017-04-13T14:59:00Z | null | null | null | {'http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175568.html', 'https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html', 'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81', 'https://bugzilla.redhat.com/show_bug.cgi?id=1212788', 'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c'} | null |
PyPI | GHSA-p7xc-35m8-57pr | FedMsg not properly completing message validation | FedMsg 0.18.1 and older is vulnerable to a message validation flaw resulting in message validation not being enabled if configured to be on. | {'CVE-2017-1000001'} | 2022-04-26T18:17:10.344041Z | 2018-07-13T15:17:14Z | HIGH | null | {'CWE-20'} | {'https://github.com/fedora-infra/fedmsg/blob/0.18.2/CHANGELOG.rst', 'https://github.com/fedora-infra/fedmsg', 'https://github.com/advisories/GHSA-p7xc-35m8-57pr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000001'} | null |
PyPI | PYSEC-2020-258 | null | In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a tf.float16 value. Similar effects can be obtained by manipulating saved models and checkpoints whereby replacing a scalar tf.float16 value with a scalar string will trigger this issue due to automatic conversions. This can be easily reproduced by tf.constant("hello", tf.float16), if eager execution is enabled. This issue is patched in TensorFlow 1.15.1 and 2.0.1 with this vulnerability patched. TensorFlow 2.1.0 was released after we fixed the issue, thus it is not affected. Users are encouraged to switch to TensorFlow 1.15.1, 2.0.1 or 2.1.0. | {'GHSA-977j-xj7q-2jr9', 'CVE-2020-5215'} | 2021-08-27T03:22:23.423115Z | 2020-01-28T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1', 'https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2'} | null |
PyPI | PYSEC-2021-608 | null | TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-2p25-55c9-h58q', 'CVE-2021-41198'} | 2021-12-09T06:35:07.301547Z | 2021-11-05T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f', 'https://github.com/tensorflow/tensorflow/issues/46911', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q'} | null |
PyPI | GHSA-fvq6-392h-6mjj | Out-of-bounds Read in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the function icvCvt_BGRA2BGR_8u_C4C3R when reading an image file by using cv::imread. | {'CVE-2017-12599'} | 2022-03-03T05:14:01.003471Z | 2021-10-12T22:01:08Z | HIGH | null | {'CWE-125'} | {'https://github.com/opencv/opencv-python/releases/tag/11', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12599', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/opencv/opencv/pull/9376', 'https://github.com/opencv/opencv-python'} | null |
PyPI | PYSEC-2021-47 | null | Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic. | {'GHSA-5jqp-qgf6-3pvh', 'CVE-2021-29510'} | 2021-05-13T19:15:00Z | 2021-05-13T19:15:00Z | null | null | null | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh'} | null |
PyPI | GHSA-xv8x-pr4h-73jv | Memory corruption when returning a literal struct with a private call inside of it | ### Impact
When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack.
### Patches
0.3.0 / #2447
* | {'CVE-2021-41121'} | 2022-03-03T05:13:29.096526Z | 2021-10-12T15:59:29Z | HIGH | null | {'CWE-119'} | {'https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv', 'https://github.com/vyperlang/vyper/pull/2447', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41121', 'https://github.com/vyperlang/vyper'} | null |
PyPI | PYSEC-2021-258 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit d9204be9f49520cdaaeb2541d1dc5187b23f31d9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37636', 'GHSA-hp4c-x6r7-6555'} | 2021-08-27T03:22:42.737707Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555'} | null |
PyPI | PYSEC-2014-77 | null | Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code. | {'CVE-2014-3137'} | 2021-08-27T03:21:56.361083Z | 2014-10-25T22:55:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1093255', 'http://www.debian.org/security/2014/dsa-2948', 'https://github.com/defnull/bottle/issues/616', 'http://www.openwall.com/lists/oss-security/2014/05/01/15'} | null |
PyPI | PYSEC-2021-576 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. We have patched the issue in GitHub commit 6da6620efad397c85493b8f8667b821403516708. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-g25h-jr74-qp5j', 'CVE-2021-37663'} | 2021-12-09T06:35:04.358938Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j', 'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'} | null |
PyPI | PYSEC-2021-126 | null | A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. | {'CVE-2021-3533'} | 2022-05-04T22:49:28.127460Z | 2021-06-09T12:15:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1956477'} | null |
PyPI | PYSEC-2018-54 | null | helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL. | {'GHSA-894g-6j7q-2hx6', 'CVE-2018-16516'} | 2021-07-15T02:22:14.431955Z | 2018-09-05T14:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-894g-6j7q-2hx6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/', 'https://github.com/flask-admin/flask-admin/pull/1699'} | null |
PyPI | PYSEC-2020-126 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'GHSA-xmq7-7fxm-rr79', 'CVE-2020-15203'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} | null |
PyPI | GHSA-xm2v-8rrw-w9pm | Division by 0 in `Conv2DBackpropInput` | ### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`:
```python
import tensorflow as tf
input_tensor = tf.constant([52, 1, 1, 5], shape=[4], dtype=tf.int32)
filter_tensor = tf.constant([], shape=[0, 1, 5, 0], dtype=tf.float32)
out_backprop = tf.constant([], shape=[52, 1, 1, 0], dtype=tf.float32)
tf.raw_ops.Conv2DBackpropInput(input_sizes=input_tensor, filter=filter_tensor,
out_backprop=out_backprop, strides=[1, 1, 1, 1],
use_cudnn_on_gpu=True, padding='SAME',
explicit_paddings=[], data_format='NHWC',
dilations=[1, 1, 1, 1])
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller:
```cc
const size_t size_A = output_image_size * dims.out_depth;
const size_t size_B = filter_total_size * dims.out_depth;
const size_t size_C = output_image_size * filter_total_size;
const size_t work_unit_size = size_A + size_B + size_C;
...
const size_t shard_size =
use_parallel_contraction ? 1 :
(target_working_set_size + work_unit_size - 1) / work_unit_size;
```
### Patches
We have patched the issue in GitHub commit [2be2cdf3a123e231b16f766aa0e27d56b4606535](https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29525'} | 2022-03-03T05:14:18.787736Z | 2021-05-21T14:21:51Z | LOW | null | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29525', 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.