idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
223,568 | gpac | 5dd71c7201a3e5cf40732d585bfb21c906c171d3 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/5dd71c7201a3e5cf40732d585bfb21c906c171d3 | fixed #1901 | 0 | void naludmx_create_avc_decoder_config(GF_NALUDmxCtx *ctx, u8 **dsi, u32 *dsi_size, u8 **dsi_enh, u32 *dsi_enh_size, u32 *max_width, u32 *max_height, u32 *max_enh_width, u32 *max_enh_height, GF_Fraction *sar)
{
u32 i, count;
Bool first = GF_TRUE;
Bool first_svc = GF_TRUE;
GF_AVCConfig *cfg;
GF_AVCConfig *avcc;
GF... | 156,110,532,668,706,100,000,000,000,000,000,000,000 | reframe_nalu.c | 271,274,878,878,705,300,000,000,000,000,000,000,000 | [
"CWE-697"
] | CVE-2021-40562 | A Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40562 |
195,275 | linux | 7e78c597c3ebfd0cb329aa09a838734147e4f117 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117 | net: qrtr: fix another OOB Read in qrtr_endpoint_post
This check was incomplete, did not consider size is 0:
if (len != ALIGN(size, 4) + hdrlen)
goto err;
if size from qrtr_hdr is 0, the result of ALIGN(size, 4)
will be 0, In case of len == hdrlen and size == 0
in header this check won't fail an... | 1 | int qrtr_endpoint_post(struct qrtr_endpoint *ep, const void *data, size_t len)
{
struct qrtr_node *node = ep->node;
const struct qrtr_hdr_v1 *v1;
const struct qrtr_hdr_v2 *v2;
struct qrtr_sock *ipc;
struct sk_buff *skb;
struct qrtr_cb *cb;
size_t size;
unsigned int ver;
size_t hdrlen;
if (len == 0 || len & 3... | 178,168,426,202,246,070,000,000,000,000,000,000,000 | qrtr.c | 334,167,332,905,484,160,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-3743 | An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system av... | https://nvd.nist.gov/vuln/detail/CVE-2021-3743 |
223,730 | linux | 7e78c597c3ebfd0cb329aa09a838734147e4f117 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117 | net: qrtr: fix another OOB Read in qrtr_endpoint_post
This check was incomplete, did not consider size is 0:
if (len != ALIGN(size, 4) + hdrlen)
goto err;
if size from qrtr_hdr is 0, the result of ALIGN(size, 4)
will be 0, In case of len == hdrlen and size == 0
in header this check won't fail an... | 0 | int qrtr_endpoint_post(struct qrtr_endpoint *ep, const void *data, size_t len)
{
struct qrtr_node *node = ep->node;
const struct qrtr_hdr_v1 *v1;
const struct qrtr_hdr_v2 *v2;
struct qrtr_sock *ipc;
struct sk_buff *skb;
struct qrtr_cb *cb;
size_t size;
unsigned int ver;
size_t hdrlen;
if (len == 0 || len & 3... | 181,131,054,700,959,030,000,000,000,000,000,000,000 | qrtr.c | 275,084,536,035,822,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-3743 | An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system av... | https://nvd.nist.gov/vuln/detail/CVE-2021-3743 |
195,299 | tensorflow | 53b0dd6dc5957652f35964af16b892ec9af4a559 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559 | Fix nullptr exception in QuantizedMaxPool op when empty list is sent to min_input or max_input parameters.
PiperOrigin-RevId: 413960973
Change-Id: I9e3ded593f3c4eabf0d6d5dc356e6a19a3ad2682 | 1 | void Compute(OpKernelContext* context) override {
const float min_input = context->input(1).flat<float>()(0);
const float max_input = context->input(2).flat<float>()(0);
MaxPoolingOp<Device, T>::Compute(context);
Tensor* output_min = nullptr;
OP_REQUIRES_OK(context, context->allocate_output(1, {},... | 250,376,451,673,768,600,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2022-21739 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.... | https://nvd.nist.gov/vuln/detail/CVE-2022-21739 |
224,211 | tensorflow | 53b0dd6dc5957652f35964af16b892ec9af4a559 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559 | Fix nullptr exception in QuantizedMaxPool op when empty list is sent to min_input or max_input parameters.
PiperOrigin-RevId: 413960973
Change-Id: I9e3ded593f3c4eabf0d6d5dc356e6a19a3ad2682 | 0 | void Compute(OpKernelContext* context) override {
auto min_input_tensor = context->input(1);
auto max_input_tensor = context->input(2);
OP_REQUIRES(
context, min_input_tensor.NumElements() == 1,
errors::InvalidArgument(
"min_input must be a scalar float value, got tensor with s... | 20,085,953,845,069,124,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2022-21739 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.... | https://nvd.nist.gov/vuln/detail/CVE-2022-21739 |
195,307 | tensorflow | 23968a8bf65b009120c43b5ebcceaf52dbc9e943 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943 | Fix out of bound access in DequantizeOp by adding check for axis < input dimension
PiperOrigin-RevId: 411214268
Change-Id: I3249d2a69ddc82f182c589a3a5bbfb71543f4b29 | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor& input = ctx->input(0);
const Tensor& input_min_tensor = ctx->input(1);
const Tensor& input_max_tensor = ctx->input(2);
int num_slices = 1;
if (axis_ > -1) {
num_slices = input.dim_size(axis_);
}
OP_REQUIRES(ctx, input_min_t... | 86,357,967,950,458,980,000,000,000,000,000,000,000 | dequantize_op.cc | 69,135,831,713,880,660,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-21726 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21726 |
224,271 | tensorflow | 23968a8bf65b009120c43b5ebcceaf52dbc9e943 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943 | Fix out of bound access in DequantizeOp by adding check for axis < input dimension
PiperOrigin-RevId: 411214268
Change-Id: I3249d2a69ddc82f182c589a3a5bbfb71543f4b29 | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor& input = ctx->input(0);
const Tensor& input_min_tensor = ctx->input(1);
const Tensor& input_max_tensor = ctx->input(2);
OP_REQUIRES(
ctx, axis_ < input.dims(),
errors::InvalidArgument("Axis must be less than input dimension(",... | 112,731,004,970,073,300,000,000,000,000,000,000,000 | dequantize_op.cc | 245,182,934,111,104,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-21726 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21726 |
195,332 | postgres | 28e24125541545483093819efae9bca603441951 | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951 | Reject extraneous data after SSL or GSS encryption handshake.
The server collects up to a bufferload of data whenever it reads data
from the client socket. When SSL or GSS encryption is requested
during startup, any additional data received with the initial
request message remained in the buffer, and would be treated... | 1 | ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done)
{
int32 len;
char *buf;
ProtocolVersion proto;
MemoryContext oldcontext;
pq_startmsgread();
/*
* Grab the first byte of the length word separately, so that we can tell
* whether we have no data at all or an incomplete packet. (This might
... | 307,208,757,848,729,870,000,000,000,000,000,000,000 | postmaster.c | 159,297,942,961,047,380,000,000,000,000,000,000,000 | [
"CWE-89"
] | CVE-2021-23214 | When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. | https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
224,628 | postgres | 28e24125541545483093819efae9bca603441951 | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951 | Reject extraneous data after SSL or GSS encryption handshake.
The server collects up to a bufferload of data whenever it reads data
from the client socket. When SSL or GSS encryption is requested
during startup, any additional data received with the initial
request message remained in the buffer, and would be treated... | 0 | ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done)
{
int32 len;
char *buf;
ProtocolVersion proto;
MemoryContext oldcontext;
pq_startmsgread();
/*
* Grab the first byte of the length word separately, so that we can tell
* whether we have no data at all or an incomplete packet. (This might
... | 115,508,550,411,717,700,000,000,000,000,000,000,000 | postmaster.c | 120,483,641,159,036,720,000,000,000,000,000,000,000 | [
"CWE-89"
] | CVE-2021-23214 | When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. | https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
195,333 | tensorflow | 68422b215e618df5ad375bcdc6d2052e9fd3080a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a | Add shape checks to GPU TridiagonalMatMul.
When given invalid shapes, the GPU TridiagonalMatMul op could read invalid or uninitialized GPU memory.
PiperOrigin-RevId: 401775483
Change-Id: Ib5500aeb8225e50d4ce790b06d2c34751f544ad8 | 1 | void Compute(OpKernelContext* context) final {
const Tensor& superdiag = context->input(0);
const Tensor& maindiag = context->input(1);
const Tensor& subdiag = context->input(2);
const Tensor& rhs = context->input(3);
const int ndims = rhs.dims();
int64 batch_size = 1;
for (int i = 0; i <... | 241,753,953,545,458,540,000,000,000,000,000,000,000 | None | null | [
"CWE-354"
] | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
224,705 | tensorflow | 68422b215e618df5ad375bcdc6d2052e9fd3080a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a | Add shape checks to GPU TridiagonalMatMul.
When given invalid shapes, the GPU TridiagonalMatMul op could read invalid or uninitialized GPU memory.
PiperOrigin-RevId: 401775483
Change-Id: Ib5500aeb8225e50d4ce790b06d2c34751f544ad8 | 0 | void Compute(OpKernelContext* context) final {
const Tensor& superdiag = context->input(0);
const Tensor& maindiag = context->input(1);
const Tensor& subdiag = context->input(2);
const Tensor& rhs = context->input(3);
const int ndims = rhs.dims();
OP_REQUIRES(
context, ndims >= 2,
... | 195,409,529,863,658,870,000,000,000,000,000,000,000 | None | null | [
"CWE-354"
] | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
195,339 | ImageMagick | 02dadf116124cfba35d7ebd9ced3e5ad0be0f176 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176 | Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130 | 1 | static void WriteTo8BimProfile(Image *image,const char *name,
const StringInfo *profile)
{
const unsigned char
*datum,
*q;
register const unsigned char
*p;
size_t
length;
StringInfo
*profile_8bim;
ssize_t
count;
unsigned char
length_byte;
unsigned int
value;
unsi... | 174,726,671,216,694,370,000,000,000,000,000,000,000 | profile.c | 23,945,488,281,509,553,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-7536 | magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile. | https://nvd.nist.gov/vuln/detail/CVE-2016-7536 |
224,854 | ImageMagick | 02dadf116124cfba35d7ebd9ced3e5ad0be0f176 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176 | Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130 | 0 | static void WriteTo8BimProfile(Image *image,const char *name,
const StringInfo *profile)
{
const unsigned char
*datum,
*q;
register const unsigned char
*p;
size_t
length;
StringInfo
*profile_8bim;
ssize_t
count;
unsigned char
length_byte;
unsigned int
value;
unsi... | 152,226,650,007,865,700,000,000,000,000,000,000,000 | profile.c | 111,191,593,916,868,450,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-7536 | magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile. | https://nvd.nist.gov/vuln/detail/CVE-2016-7536 |
195,342 | gnutls | 51464af713d71802e3c6d5ac15f1a95132a354fe | http://git.savannah.gnu.org/cgit/gnutls | None | cdk_pkt_read: enforce packet limits
That ensures that there are no overflows in the subsequent
calculations.
Resolves the oss-fuzz found bug:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
Relates: #159
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | 1 | cdk_error_t cdk_pkt_read(cdk_stream_t inp, cdk_packet_t pkt)
{
int ctb, is_newctb;
int pkttype;
size_t pktlen = 0, pktsize = 0, is_partial = 0;
cdk_error_t rc;
if (!inp || !pkt)
return CDK_Inv_Value;
ctb = cdk_stream_getc(inp);
if (cdk_stream_eof(inp) || ctb == EOF)
return CDK_EOF;
else if (!ctb)
return... | 189,688,671,553,208,200,000,000,000,000,000,000,000 | read-packet.c | 21,146,640,525,433,682,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7869 | GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10. | https://nvd.nist.gov/vuln/detail/CVE-2017-7869 |
224,872 | gnutls | 51464af713d71802e3c6d5ac15f1a95132a354fe | http://git.savannah.gnu.org/cgit/gnutls | None | cdk_pkt_read: enforce packet limits
That ensures that there are no overflows in the subsequent
calculations.
Resolves the oss-fuzz found bug:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
Relates: #159
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | 0 | cdk_error_t cdk_pkt_read(cdk_stream_t inp, cdk_packet_t pkt)
{
int ctb, is_newctb;
int pkttype;
size_t pktlen = 0, pktsize = 0, is_partial = 0;
cdk_error_t rc;
if (!inp || !pkt)
return CDK_Inv_Value;
ctb = cdk_stream_getc(inp);
if (cdk_stream_eof(inp) || ctb == EOF)
return CDK_EOF;
else if (!ctb)
return... | 253,636,419,670,290,600,000,000,000,000,000,000,000 | read-packet.c | 14,248,314,301,910,845,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7869 | GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10. | https://nvd.nist.gov/vuln/detail/CVE-2017-7869 |
195,390 | tensorflow | 6f4d3e8139ec724dbbcb40505891c81dd1052c4a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a | Prevent crash due to integer overflow followed by allocating negative sized array.
PiperOrigin-RevId: 414891322
Change-Id: I5df390e0dc1d9f115209293708950cdf9306931c | 1 | void Compute(OpKernelContext* context) override {
const Tensor& indices = context->input(0);
const Tensor& values = context->input(1);
const Tensor& shape = context->input(2);
const Tensor& weights = context->input(3);
bool use_weights = weights.NumElements() > 0;
OP_REQUIRES(context, TensorS... | 46,420,925,493,068,430,000,000,000,000,000,000,000 | count_ops.cc | 78,129,872,428,127,460,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-21738 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.... | https://nvd.nist.gov/vuln/detail/CVE-2022-21738 |
225,120 | tensorflow | 6f4d3e8139ec724dbbcb40505891c81dd1052c4a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a | Prevent crash due to integer overflow followed by allocating negative sized array.
PiperOrigin-RevId: 414891322
Change-Id: I5df390e0dc1d9f115209293708950cdf9306931c | 0 | void Compute(OpKernelContext* context) override {
const Tensor& indices = context->input(0);
const Tensor& values = context->input(1);
const Tensor& shape = context->input(2);
const Tensor& weights = context->input(3);
bool use_weights = weights.NumElements() > 0;
OP_REQUIRES(context, TensorS... | 280,761,967,989,088,000,000,000,000,000,000,000,000 | count_ops.cc | 219,536,039,805,810,070,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-21738 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.... | https://nvd.nist.gov/vuln/detail/CVE-2022-21738 |
195,393 | tensorflow | a4e401da71458d253b05e41f28637b65baf64be4 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4 | Prevent segfault in `embedding_lookup_sparse.cc`
Previous fixes missed one additional case.
PiperOrigin-RevId: 417676944
Change-Id: I8ab412155cf9b1e897448a6611d209eaa7ca9e66 | 1 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
auto* params =
reinterpret_cast<TfLiteEmbeddingLookupSparseParams*>(node->builtin_data);
TfLiteTensor* output;
TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output));
const TfLiteTensor* ids;
TF_LITE_ENSURE_OK(context, GetInputS... | 192,037,970,851,066,600,000,000,000,000,000,000,000 | embedding_lookup_sparse.cc | 81,342,173,626,284,350,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-23559 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. I... | https://nvd.nist.gov/vuln/detail/CVE-2022-23559 |
225,126 | tensorflow | a4e401da71458d253b05e41f28637b65baf64be4 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4 | Prevent segfault in `embedding_lookup_sparse.cc`
Previous fixes missed one additional case.
PiperOrigin-RevId: 417676944
Change-Id: I8ab412155cf9b1e897448a6611d209eaa7ca9e66 | 0 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
auto* params =
reinterpret_cast<TfLiteEmbeddingLookupSparseParams*>(node->builtin_data);
TfLiteTensor* output;
TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output));
const TfLiteTensor* ids;
TF_LITE_ENSURE_OK(context, GetInputS... | 134,892,977,321,783,840,000,000,000,000,000,000,000 | embedding_lookup_sparse.cc | 171,114,382,450,185,170,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-23559 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. I... | https://nvd.nist.gov/vuln/detail/CVE-2022-23559 |
195,401 | libtiff | 681748ec2f5ce88da5f9fa6831e1653e46af8a66 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66 | JBIG: fix potential out-of-bounds write in JBIGDecode()
JBIGDecode doesn't check if the user provided buffer is large enough
to store the JBIG decoded image, which can potentially cause out-of-bounds
write in the buffer.
This issue was reported and analyzed by Thomas Dullien.
Also fixes a (harmless) potential use of ... | 1 | static int JBIGDecode(TIFF* tif, uint8* buffer, tmsize_t size, uint16 s)
{
struct jbg_dec_state decoder;
int decodeStatus = 0;
unsigned char* pImage = NULL;
(void) size, (void) s;
if (isFillOrder(tif, tif->tif_dir.td_fillorder))
{
TIFFReverseBits(tif->tif_rawdata, tif->tif_rawdatasize);
}
jbg_dec_init(&deco... | 53,072,747,061,210,565,000,000,000,000,000,000,000 | tif_jbig.c | 182,490,545,234,425,660,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-18557 | LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bound... | https://nvd.nist.gov/vuln/detail/CVE-2018-18557 |
225,523 | libtiff | 681748ec2f5ce88da5f9fa6831e1653e46af8a66 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66 | JBIG: fix potential out-of-bounds write in JBIGDecode()
JBIGDecode doesn't check if the user provided buffer is large enough
to store the JBIG decoded image, which can potentially cause out-of-bounds
write in the buffer.
This issue was reported and analyzed by Thomas Dullien.
Also fixes a (harmless) potential use of ... | 0 | static int JBIGDecode(TIFF* tif, uint8* buffer, tmsize_t size, uint16 s)
{
struct jbg_dec_state decoder;
int decodeStatus = 0;
unsigned char* pImage = NULL;
unsigned long decodedSize;
(void) s;
if (isFillOrder(tif, tif->tif_dir.td_fillorder))
{
TIFFReverseBits(tif->tif_rawcp, tif->tif_rawcc);
}
jbg_dec_ini... | 132,110,015,283,847,350,000,000,000,000,000,000,000 | tif_jbig.c | 248,754,323,253,149,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-18557 | LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bound... | https://nvd.nist.gov/vuln/detail/CVE-2018-18557 |
195,406 | ImageMagick | 90406972f108c4da71f998601b06abdc2ac6f06e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/90406972f108c4da71f998601b06abdc2ac6f06e | https://github.com/ImageMagick/ImageMagick/issues/281 | 1 | MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type,
ExceptionInfo *exception)
{
const char
*artifact;
ImageInfo
*image_info;
MagickBooleanType
status;
QuantizeInfo
*quantize_info;
assert(image != (Image *) NULL);
if (image->debug != MagickFalse)
(void) Lo... | 322,995,263,176,058,330,000,000,000,000,000,000,000 | attribute.c | 316,284,152,010,426,450,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-7906 | magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7906 |
225,574 | ImageMagick | 90406972f108c4da71f998601b06abdc2ac6f06e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/90406972f108c4da71f998601b06abdc2ac6f06e | https://github.com/ImageMagick/ImageMagick/issues/281 | 0 | MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type,
ExceptionInfo *exception)
{
const char
*artifact;
ImageInfo
*image_info;
MagickBooleanType
status;
QuantizeInfo
*quantize_info;
assert(image != (Image *) NULL);
if (image->debug != MagickFalse)
(void) Lo... | 318,583,879,285,649,460,000,000,000,000,000,000,000 | attribute.c | 298,444,983,704,141,000,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-7906 | magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7906 |
195,437 | Pillow | 5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9 | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b | PCD decoder overruns the shuffle buffer, Fixes #568 | 1 | ImagingPcdDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes)
{
int x;
int chunk;
UINT8* out;
UINT8* ptr;
ptr = buf;
chunk = 3 * state->xsize;
for (;;) {
/* We need data for two full lines before we can do anything */
if (bytes < chunk)
return ptr - buf;
/* Unpack... | 277,922,396,630,070,500,000,000,000,000,000,000,000 | PcdDecode.c | 87,085,758,316,024,080,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2533 | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-2533 |
226,443 | Pillow | 5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9 | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b | PCD decoder overruns the shuffle buffer, Fixes #568 | 0 | ImagingPcdDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes)
{
int x;
int chunk;
UINT8* out;
UINT8* ptr;
ptr = buf;
chunk = 3 * state->xsize;
for (;;) {
/* We need data for two full lines before we can do anything */
if (bytes < chunk)
return ptr - buf;
/* Unpack... | 86,638,288,498,790,120,000,000,000,000,000,000,000 | PcdDecode.c | 6,426,442,815,565,913,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2533 | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-2533 |
195,438 | hhvm | 4bff3bfbe90d10451e4638c2118d1ad1117bb3e3 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3 | CVE-2018-6340 Fix buffer overread
Summary:
snprintf() returns the number of would be written bytes if the buffer had
enough size, letting the original code to construct output string from
arbitrary data on the stack.
Fix this by properly assembling the String without trying to arbitrarily
limiting the length to 30 by... | 1 | static Array HHVM_METHOD(Memcache, getextendedstats,
const String& /*type*/ /* = null_string */,
int /*slabid*/ /* = 0 */, int /*limit*/ /* = 100 */) {
auto data = Native::data<MemcacheData>(this_);
memcached_return_t ret;
memcached_stat_st *stats;
stats = memc... | 124,612,751,390,209,830,000,000,000,000,000,000,000 | ext_memcache.cpp | 21,374,122,305,291,553,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-6340 | The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below). | https://nvd.nist.gov/vuln/detail/CVE-2018-6340 |
226,444 | hhvm | 4bff3bfbe90d10451e4638c2118d1ad1117bb3e3 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3 | CVE-2018-6340 Fix buffer overread
Summary:
snprintf() returns the number of would be written bytes if the buffer had
enough size, letting the original code to construct output string from
arbitrary data on the stack.
Fix this by properly assembling the String without trying to arbitrarily
limiting the length to 30 by... | 0 | static Array HHVM_METHOD(Memcache, getextendedstats,
const String& /*type*/ /* = null_string */,
int /*slabid*/ /* = 0 */, int /*limit*/ /* = 100 */) {
auto data = Native::data<MemcacheData>(this_);
memcached_return_t ret;
memcached_stat_st *stats;
stats = memc... | 114,326,634,663,497,850,000,000,000,000,000,000,000 | ext_memcache.cpp | 303,271,228,397,825,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-6340 | The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below). | https://nvd.nist.gov/vuln/detail/CVE-2018-6340 |
195,445 | audiofile | 7d65f89defb092b63bcbc5d98349fb222ca73b3c | https://github.com/antlarr/audiofile | https://github.com/antlarr/audiofile/commit/7d65f89defb092b63bcbc5d98349fb222ca73b3c | Check for multiplication overflow in sfconvert
Checks that a multiplication doesn't overflow when
calculating the buffer size, and if it overflows,
reduce the buffer size instead of failing.
This fixes the 00192-audiofile-signintoverflow-sfconvert case
in #41 | 1 | bool copyaudiodata (AFfilehandle infile, AFfilehandle outfile, int trackid)
{
int frameSize = afGetVirtualFrameSize(infile, trackid, 1);
const int kBufferFrameCount = 65536;
void *buffer = malloc(kBufferFrameCount * frameSize);
AFframecount totalFrames = afGetFrameCount(infile, AF_DEFAULT_TRACK);
AFframecount to... | 329,826,030,296,022,200,000,000,000,000,000,000,000 | sfconvert.c | 150,554,291,987,690,410,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-6838 | Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6838 |
226,603 | audiofile | 7d65f89defb092b63bcbc5d98349fb222ca73b3c | https://github.com/antlarr/audiofile | https://github.com/antlarr/audiofile/commit/7d65f89defb092b63bcbc5d98349fb222ca73b3c | Check for multiplication overflow in sfconvert
Checks that a multiplication doesn't overflow when
calculating the buffer size, and if it overflows,
reduce the buffer size instead of failing.
This fixes the 00192-audiofile-signintoverflow-sfconvert case
in #41 | 0 | bool copyaudiodata (AFfilehandle infile, AFfilehandle outfile, int trackid)
{
int frameSize = afGetVirtualFrameSize(infile, trackid, 1);
int kBufferFrameCount = 65536;
int bufferSize;
while (multiplyCheckOverflow(kBufferFrameCount, frameSize, &bufferSize))
kBufferFrameCount /= 2;
void *buffer = malloc(bufferSiz... | 231,969,644,079,445,680,000,000,000,000,000,000,000 | sfconvert.c | 89,781,109,277,876,000,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-6838 | Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6838 |
195,446 | audiofile | c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0 | https://github.com/antlarr/audiofile | https://github.com/antlarr/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0 | Always check the number of coefficients
When building the library with NDEBUG, asserts are eliminated
so it's better to always check that the number of coefficients
is inside the array range.
This fixes the 00191-audiofile-indexoob issue in #41 | 1 | status WAVEFile::parseFormat(const Tag &id, uint32_t size)
{
Track *track = getTrack();
uint16_t formatTag;
readU16(&formatTag);
uint16_t channelCount;
readU16(&channelCount);
uint32_t sampleRate;
readU32(&sampleRate);
uint32_t averageBytesPerSecond;
readU32(&averageBytesPerSecond);
uint16_t blockAlign;
rea... | 292,763,657,978,369,500,000,000,000,000,000,000,000 | WAVE.cpp | 123,036,620,254,353,550,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-6837 | WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients. | https://nvd.nist.gov/vuln/detail/CVE-2017-6837 |
226,624 | audiofile | c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0 | https://github.com/antlarr/audiofile | https://github.com/antlarr/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0 | Always check the number of coefficients
When building the library with NDEBUG, asserts are eliminated
so it's better to always check that the number of coefficients
is inside the array range.
This fixes the 00191-audiofile-indexoob issue in #41 | 0 | status WAVEFile::parseFormat(const Tag &id, uint32_t size)
{
Track *track = getTrack();
uint16_t formatTag;
readU16(&formatTag);
uint16_t channelCount;
readU16(&channelCount);
uint32_t sampleRate;
readU32(&sampleRate);
uint32_t averageBytesPerSecond;
readU32(&averageBytesPerSecond);
uint16_t blockAlign;
rea... | 96,805,288,724,732,450,000,000,000,000,000,000,000 | WAVE.cpp | 95,819,875,299,707,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-6837 | WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients. | https://nvd.nist.gov/vuln/detail/CVE-2017-6837 |
195,447 | Bento4 | 41cad602709436628f07b4c4f64e9ff7a611f687 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687 | fix for #184 | 1 | AP4_DataAtom::AP4_DataAtom(AP4_UI32 size, AP4_ByteStream& stream) :
AP4_Atom(AP4_ATOM_TYPE_DATA, size)
{
if (size < AP4_ATOM_HEADER_SIZE+8) return;
AP4_UI32 i;
stream.ReadUI32(i); m_DataType = (DataType)i;
stream.ReadUI32(i); m_DataLang = (DataLang)i;
// the stream for the data is a substream ... | 131,456,672,051,657,320,000,000,000,000,000,000,000 | Ap4MetaData.cpp | 14,025,921,001,401,261,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-14641 | A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-14641 |
226,681 | Bento4 | 41cad602709436628f07b4c4f64e9ff7a611f687 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687 | fix for #184 | 0 | AP4_DataAtom::AP4_DataAtom(AP4_UI32 size, AP4_ByteStream& stream) :
AP4_Atom(AP4_ATOM_TYPE_DATA, size),
m_Source(NULL)
{
if (size < AP4_ATOM_HEADER_SIZE+8) return;
AP4_UI32 i;
stream.ReadUI32(i); m_DataType = (DataType)i;
stream.ReadUI32(i); m_DataLang = (DataLang)i;
// the stream for the ... | 192,411,907,495,922,440,000,000,000,000,000,000,000 | Ap4MetaData.cpp | 23,974,099,848,983,620,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-14641 | A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-14641 |
195,448 | Bento4 | 41cad602709436628f07b4c4f64e9ff7a611f687 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687 | fix for #184 | 1 | AP4_DataAtom::AP4_DataAtom(const AP4_MetaData::Value& value) :
AP4_Atom(AP4_ATOM_TYPE_DATA, AP4_ATOM_HEADER_SIZE),
m_DataType(DATA_TYPE_BINARY)
{
AP4_MemoryByteStream* memory = new AP4_MemoryByteStream();
AP4_Size payload_size = 8;
m_Source = memory;
switch (value.GetType()) {
case ... | 336,931,089,358,740,660,000,000,000,000,000,000,000 | Ap4MetaData.cpp | 14,025,921,001,401,261,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-14641 | A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-14641 |
226,651 | Bento4 | 41cad602709436628f07b4c4f64e9ff7a611f687 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687 | fix for #184 | 0 | AP4_DataAtom::AP4_DataAtom(const AP4_MetaData::Value& value) :
AP4_Atom(AP4_ATOM_TYPE_DATA, AP4_ATOM_HEADER_SIZE),
m_DataType(DATA_TYPE_BINARY),
m_Source(NULL)
{
AP4_MemoryByteStream* memory = new AP4_MemoryByteStream();
AP4_Size payload_size = 8;
m_Source = memory;
switch (value.GetTyp... | 235,460,017,253,130,300,000,000,000,000,000,000,000 | Ap4MetaData.cpp | 23,974,099,848,983,620,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-14641 | A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-14641 |
195,449 | hhvm | 1c518555dba6ceb45d5ba61845b96e261219c3b7 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7 | Fix buffer overflow in mb_ereg_replace
Summary:
This diff has already been landed to release and to open-source branches. We're now landing it on master.
CVE-2019-11935
Reviewed By: jjergus
Differential Revision: D18177934
fbshipit-source-id: d108a59e38c67f5f5e835febd7255307605ba62c | 1 | static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern,
const String& replacement,
const String& str,
const String& option,
... | 150,690,663,859,486,660,000,000,000,000,000,000,000 | ext_mbstring.cpp | 27,162,148,208,504,263,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-11935 | Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1. | https://nvd.nist.gov/vuln/detail/CVE-2019-11935 |
226,732 | hhvm | 1c518555dba6ceb45d5ba61845b96e261219c3b7 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7 | Fix buffer overflow in mb_ereg_replace
Summary:
This diff has already been landed to release and to open-source branches. We're now landing it on master.
CVE-2019-11935
Reviewed By: jjergus
Differential Revision: D18177934
fbshipit-source-id: d108a59e38c67f5f5e835febd7255307605ba62c | 0 | static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern,
const String& replacement,
const String& str,
const String& option,
... | 278,266,252,190,934,560,000,000,000,000,000,000,000 | ext_mbstring.cpp | 34,536,365,220,079,264,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-11935 | Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1. | https://nvd.nist.gov/vuln/detail/CVE-2019-11935 |
195,450 | Bento4 | be7185faf7f52674028977dcf501c6039ff03aa5 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/be7185faf7f52674028977dcf501c6039ff03aa5 | fix for #182 | 1 | AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream& stream,
AP4_UI32 type,
AP4_UI32 size_32,
AP4_UI64 size_64,
AP4_Atom*& atom)
{
bool ... | 174,561,395,751,390,480,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2017-14638 | AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp in Bento4 version 1.5.0-617 has missing NULL checks, leading to a NULL pointer dereference, segmentation fault, and application crash in AP4_Atom::SetType in Core/Ap4Atom.h. | https://nvd.nist.gov/vuln/detail/CVE-2017-14638 |
226,802 | Bento4 | be7185faf7f52674028977dcf501c6039ff03aa5 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/be7185faf7f52674028977dcf501c6039ff03aa5 | fix for #182 | 0 | AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream& stream,
AP4_UI32 type,
AP4_UI32 size_32,
AP4_UI64 size_64,
AP4_Atom*& atom)
{
bool ... | 171,225,242,224,591,260,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2017-14638 | AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp in Bento4 version 1.5.0-617 has missing NULL checks, leading to a NULL pointer dereference, segmentation fault, and application crash in AP4_Atom::SetType in Core/Ap4Atom.h. | https://nvd.nist.gov/vuln/detail/CVE-2017-14638 |
195,469 | hhvm | 423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 | CVE-2016-1000109: Ignore Proxy HTTP header from fastcgi requests
Summary:
The default PHP behavior is to transform a Proxy header from requests
into the HTTP_PROXY environment variable in the PHP environment running the
request. Some scripts may use this env var to decide which HTTP proxy to
connect to, and we don't w... | 1 | void FastCGITransport::onHeader(std::unique_ptr<folly::IOBuf> key_chain,
std::unique_ptr<folly::IOBuf> value_chain) {
Cursor keyCur(key_chain.get());
auto key = keyCur.readFixedString(key_chain->computeChainDataLength());
Cursor valCur(value_chain.get());
auto value = valCur.rea... | 22,858,928,392,362,800,000,000,000,000,000,000,000 | fastcgi-transport.cpp | 60,897,937,304,696,425,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2016-1000109 | HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy s... | https://nvd.nist.gov/vuln/detail/CVE-2016-1000109 |
226,938 | hhvm | 423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 | CVE-2016-1000109: Ignore Proxy HTTP header from fastcgi requests
Summary:
The default PHP behavior is to transform a Proxy header from requests
into the HTTP_PROXY environment variable in the PHP environment running the
request. Some scripts may use this env var to decide which HTTP proxy to
connect to, and we don't w... | 0 | void FastCGITransport::onHeader(std::unique_ptr<folly::IOBuf> key_chain,
std::unique_ptr<folly::IOBuf> value_chain) {
Cursor keyCur(key_chain.get());
auto key = keyCur.readFixedString(key_chain->computeChainDataLength());
// Don't allow requests to inject an HTTP_PROXY environment... | 224,116,756,568,382,630,000,000,000,000,000,000,000 | fastcgi-transport.cpp | 142,752,180,239,000,800,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2016-1000109 | HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy s... | https://nvd.nist.gov/vuln/detail/CVE-2016-1000109 |
195,472 | hhvm | 2c9a8fcc73a151608634d3e712973d192027c271 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271 | Fix integer overflow in StringUtil::implode
Reviewed By: ricklavoie
Differential Revision: D3623922
fbshipit-source-id: 136d124a850c07cc6c63535afc11d36499d576fc | 1 | String StringUtil::Implode(const Variant& items, const String& delim,
const bool checkIsContainer /* = true */) {
if (checkIsContainer && !isContainer(items)) {
throw_param_is_not_container();
}
int size = getContainerSize(items);
if (size == 0) return empty_string();
req::vect... | 96,428,308,603,452,220,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-6872 | Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-6872 |
227,040 | hhvm | 2c9a8fcc73a151608634d3e712973d192027c271 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271 | Fix integer overflow in StringUtil::implode
Reviewed By: ricklavoie
Differential Revision: D3623922
fbshipit-source-id: 136d124a850c07cc6c63535afc11d36499d576fc | 0 | String StringUtil::Implode(const Variant& items, const String& delim,
const bool checkIsContainer /* = true */) {
if (checkIsContainer && !isContainer(items)) {
throw_param_is_not_container();
}
int size = getContainerSize(items);
if (size == 0) return empty_string();
req::vect... | 62,419,655,296,476,650,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-6872 | Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-6872 |
195,473 | src | ed8fdce754a5d8d14c09e989d8877707bd43906f | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/ed8fdce754a5d8d14c09e989d8877707bd43906f | Received SACK options are managed by a linked list at the TCP socket.
There is a global tunable limit net.inet.tcp.sackholelimit, default
is 32768. If an attacker manages to attach all these sack holes
to a few TCP connections, the lists may grow long. Traversing them
might cause higher CPU consumption on the victim ... | 1 | tcp_sack_option(struct tcpcb *tp, struct tcphdr *th, u_char *cp, int optlen)
{
int tmp_olen;
u_char *tmp_cp;
struct sackhole *cur, *p, *temp;
if (!tp->sack_enable)
return;
/* SACK without ACK doesn't make sense. */
if ((th->th_flags & TH_ACK) == 0)
return;
/* Make sure the ACK on this segment is in [s... | 87,584,992,195,013,410,000,000,000,000,000,000,000 | tcp_input.c | 219,708,352,113,828,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-8460 | OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-8460 |
227,053 | src | ed8fdce754a5d8d14c09e989d8877707bd43906f | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/ed8fdce754a5d8d14c09e989d8877707bd43906f | Received SACK options are managed by a linked list at the TCP socket.
There is a global tunable limit net.inet.tcp.sackholelimit, default
is 32768. If an attacker manages to attach all these sack holes
to a few TCP connections, the lists may grow long. Traversing them
might cause higher CPU consumption on the victim ... | 0 | tcp_sack_option(struct tcpcb *tp, struct tcphdr *th, u_char *cp, int optlen)
{
int tmp_olen;
u_char *tmp_cp;
struct sackhole *cur, *p, *temp;
if (!tp->sack_enable)
return;
/* SACK without ACK doesn't make sense. */
if ((th->th_flags & TH_ACK) == 0)
return;
/* Make sure the ACK on this segment is in [s... | 219,688,727,625,701,800,000,000,000,000,000,000,000 | tcp_input.c | 144,010,399,748,046,970,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-8460 | OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-8460 |
195,474 | hhvm | 1f91e076a585118495b976a413c1df40f6fd3d41 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/1f91e076a585118495b976a413c1df40f6fd3d41 | Fix integer overflow in chunk_split
Reviewed By: @ptarjan
Differential Revision: D1515947 | 1 | String string_chunk_split(const char *src, int srclen, const char *end,
int endlen, int chunklen) {
int chunks = srclen / chunklen; // complete chunks!
int restlen = srclen - chunks * chunklen; /* srclen % chunklen */
int out_len = (chunks + 1) * endlen + srclen;
String ret(out_len, R... | 41,070,013,776,066,670,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6228 | Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split function. | https://nvd.nist.gov/vuln/detail/CVE-2014-6228 |
227,093 | hhvm | 1f91e076a585118495b976a413c1df40f6fd3d41 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/1f91e076a585118495b976a413c1df40f6fd3d41 | Fix integer overflow in chunk_split
Reviewed By: @ptarjan
Differential Revision: D1515947 | 0 | String string_chunk_split(const char *src, int srclen, const char *end,
int endlen, int chunklen) {
int chunks = srclen / chunklen; // complete chunks!
int restlen = srclen - chunks * chunklen; /* srclen % chunklen */
String ret(
safe_address(
chunks + 1,
endlen,
s... | 265,839,374,442,538,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6228 | Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split function. | https://nvd.nist.gov/vuln/detail/CVE-2014-6228 |
195,478 | hhvm | 6937de5544c3eead3466b75020d8382080ed0cff | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff | [security][CVE-2018-6334] kill globals for file uploads in hhvm
Code should look at _GET, _POST, _FILES, etc. directly to avoid security concerns.
This included both `$GLOBALS` and `register_globals`-like behavior.
CVE-2018-6334 | 1 | void rfc1867PostHandler(Transport* transport,
Array& post,
Array& files,
size_t content_length,
const void*& data, size_t& size,
const std::string boundary) {
char *s=nullptr, *start_arr=nullptr;
... | 128,636,934,470,509,620,000,000,000,000,000,000,000 | upload.cpp | 236,082,494,226,434,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-6334 | Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below). | https://nvd.nist.gov/vuln/detail/CVE-2018-6334 |
227,160 | hhvm | 6937de5544c3eead3466b75020d8382080ed0cff | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff | [security][CVE-2018-6334] kill globals for file uploads in hhvm
Code should look at _GET, _POST, _FILES, etc. directly to avoid security concerns.
This included both `$GLOBALS` and `register_globals`-like behavior.
CVE-2018-6334 | 0 | void rfc1867PostHandler(Transport* transport,
Array& post,
Array& files,
size_t content_length,
const void*& data, size_t& size,
const std::string boundary) {
char *s=nullptr, *start_arr=nullptr;
... | 21,688,381,598,801,250,000,000,000,000,000,000,000 | upload.cpp | 62,953,226,843,582,260,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-6334 | Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below). | https://nvd.nist.gov/vuln/detail/CVE-2018-6334 |
195,479 | ImageMagick | f8c318d462270b03e77f082e2a3a32867cacd3c6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f8c318d462270b03e77f082e2a3a32867cacd3c6 | https://github.com/ImageMagick/ImageMagick/issues/96 | 1 | static ssize_t parse8BIM(Image *ifile, Image *ofile)
{
char
brkused,
quoted,
*line,
*token,
*newstr,
*name;
int
state,
next;
unsigned char
dataset;
unsigned int
recnum;
int
inputlen = MagickPathExtent;
MagickOffsetType
savedpos,
currentpos;
ssize_t... | 207,045,869,905,428,560,000,000,000,000,000,000,000 | meta.c | 338,570,079,382,616,140,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7524 | coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7524 |
227,192 | ImageMagick | f8c318d462270b03e77f082e2a3a32867cacd3c6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f8c318d462270b03e77f082e2a3a32867cacd3c6 | https://github.com/ImageMagick/ImageMagick/issues/96 | 0 | static ssize_t parse8BIM(Image *ifile, Image *ofile)
{
char
brkused,
quoted,
*line,
*token,
*newstr,
*name;
int
state,
next;
unsigned char
dataset;
unsigned int
recnum;
int
inputlen = MagickPathExtent;
MagickOffsetType
savedpos,
currentpos;
ssize_t... | 261,909,825,210,254,150,000,000,000,000,000,000,000 | meta.c | 1,618,187,714,745,459,400,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7524 | coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7524 |
195,480 | hhvm | 46003b4ab564b2abcd8470035fc324fe36aa8c75 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75 | Prevent strrpos and strripos from visiting out-of-bounds memory.
Reviewed By: alexeyt
Differential Revision: D14669668
fbshipit-source-id: 16bb4674bccf83ffd737e60d1fd9fd4a0093f77c | 1 | int string_rfind(const char *input, int len, const char *s, int s_len,
int pos, bool case_sensitive) {
assertx(input);
assertx(s);
if (!s_len || pos < -len || pos > len) {
return -1;
}
void *ptr;
if (case_sensitive) {
if (pos >= 0) {
ptr = bstrrstr(input + pos, len - pos, s, s... | 93,314,297,151,024,460,000,000,000,000,000,000,000 | zend-string.cpp | 157,727,558,891,612,040,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3561 | Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below). | https://nvd.nist.gov/vuln/detail/CVE-2019-3561 |
227,223 | hhvm | 46003b4ab564b2abcd8470035fc324fe36aa8c75 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75 | Prevent strrpos and strripos from visiting out-of-bounds memory.
Reviewed By: alexeyt
Differential Revision: D14669668
fbshipit-source-id: 16bb4674bccf83ffd737e60d1fd9fd4a0093f77c | 0 | int string_rfind(const char *input, int len, const char *s, int s_len,
int pos, bool case_sensitive) {
assertx(input);
assertx(s);
if (!s_len || pos < -len || pos > len) {
return -1;
}
void *ptr;
if (case_sensitive) {
if (pos >= 0) {
ptr = bstrrstr(input + pos, len - pos, s, s... | 74,978,037,068,485,980,000,000,000,000,000,000,000 | zend-string.cpp | 48,155,053,696,740,280,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3561 | Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below). | https://nvd.nist.gov/vuln/detail/CVE-2019-3561 |
195,481 | hhvm | 97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed | Fix default FastCGI interface
Reviewed By: alexeyt
Differential Revision: D15567393
fbshipit-source-id: ffab228f689d4ddca9ea4835c70aecf16da2aa9f | 1 | FastCGIServer::FastCGIServer(const std::string &address,
int port,
int workers,
bool useFileSocket)
: Server(address, port),
m_worker(&m_eventBaseManager),
m_dispatcher(workers, workers,
RuntimeOption::Serv... | 27,698,960,967,847,704,000,000,000,000,000,000,000 | fastcgi-server.cpp | 182,286,601,505,163,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-3569 | HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, an... | https://nvd.nist.gov/vuln/detail/CVE-2019-3569 |
227,233 | hhvm | 97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed | Fix default FastCGI interface
Reviewed By: alexeyt
Differential Revision: D15567393
fbshipit-source-id: ffab228f689d4ddca9ea4835c70aecf16da2aa9f | 0 | FastCGIServer::FastCGIServer(const std::string &address,
int port,
int workers,
bool useFileSocket)
: Server(address, port),
m_worker(&m_eventBaseManager),
m_dispatcher(workers, workers,
RuntimeOption::Serv... | 29,669,343,257,428,630,000,000,000,000,000,000,000 | fastcgi-server.cpp | 7,595,977,892,686,557,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-3569 | HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, an... | https://nvd.nist.gov/vuln/detail/CVE-2019-3569 |
195,482 | hhvm | 324701c9fd31beb4f070f1b7ef78b115fbdfec34 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34 | HTMLEncode strings in wddx_serialize_value()
Summary: Strings returned through wddx_serialize_value should be HTMLEncode()'d during
serialization.
Fixes #4283
{sync, type="child", parent="internal", parentrevid="1691695", parentrevfbid="1537976659780590", parentdiffid="5726084"}
Reviewed By: @JoelMarcey
Differenti... | 1 | bool WddxPacket::recursiveAddVar(const String& varName,
const Variant& varVariant,
bool hasVarTag) {
bool isArray = varVariant.isArray();
bool isObject = varVariant.isObject();
if (isArray || isObject) {
if (hasVarTag) {
m_packetString ... | 233,010,274,338,692,160,000,000,000,000,000,000,000 | ext_wddx.cpp | 282,173,662,128,018,200,000,000,000,000,000,000,000 | [
"CWE-79"
] | CVE-2014-9714 | Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function. | https://nvd.nist.gov/vuln/detail/CVE-2014-9714 |
227,244 | hhvm | 324701c9fd31beb4f070f1b7ef78b115fbdfec34 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34 | HTMLEncode strings in wddx_serialize_value()
Summary: Strings returned through wddx_serialize_value should be HTMLEncode()'d during
serialization.
Fixes #4283
{sync, type="child", parent="internal", parentrevid="1691695", parentrevfbid="1537976659780590", parentdiffid="5726084"}
Reviewed By: @JoelMarcey
Differenti... | 0 | bool WddxPacket::recursiveAddVar(const String& varName,
const Variant& varVariant,
bool hasVarTag) {
bool isArray = varVariant.isArray();
bool isObject = varVariant.isObject();
if (isArray || isObject) {
if (hasVarTag) {
m_packetString ... | 50,491,605,162,683,820,000,000,000,000,000,000,000 | ext_wddx.cpp | 308,422,966,656,733,080,000,000,000,000,000,000,000 | [
"CWE-79"
] | CVE-2014-9714 | Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function. | https://nvd.nist.gov/vuln/detail/CVE-2014-9714 |
195,487 | hhvm | 7135ec229882370a00411aa50030eada6034cc1b | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/7135ec229882370a00411aa50030eada6034cc1b | Fix potential security leak in HashContext
Summary: CVE-2014-6229
This is not a NUL-terminated string, it's a fixed-size block of data.
The risks were key truncation (if there happens to be a NUL byte in the
key) or over-reading (which would be information leakage).
Reviewed By: @ptarjan
Differential Revision: D153... | 1 | explicit HashContext(const HashContext* ctx) {
assert(ctx->ops);
assert(ctx->ops->context_size >= 0);
ops = ctx->ops;
context = malloc(ops->context_size);
ops->hash_copy(context, ctx->context);
options = ctx->options;
key = ctx->key ? strdup(ctx->key) : nullptr;
} | 214,231,899,432,368,370,000,000,000,000,000,000,000 | ext_hash.cpp | 309,558,397,349,101,870,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2014-6229 | The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string, and makes it easier... | https://nvd.nist.gov/vuln/detail/CVE-2014-6229 |
227,349 | hhvm | 7135ec229882370a00411aa50030eada6034cc1b | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/7135ec229882370a00411aa50030eada6034cc1b | Fix potential security leak in HashContext
Summary: CVE-2014-6229
This is not a NUL-terminated string, it's a fixed-size block of data.
The risks were key truncation (if there happens to be a NUL byte in the
key) or over-reading (which would be information leakage).
Reviewed By: @ptarjan
Differential Revision: D153... | 0 | explicit HashContext(const HashContext* ctx) {
assert(ctx->ops);
assert(ctx->ops->context_size >= 0);
ops = ctx->ops;
context = malloc(ops->context_size);
ops->hash_copy(context, ctx->context);
options = ctx->options;
if (ctx->key) {
key = static_cast<char*>(malloc(ops->block_size));... | 207,240,633,761,840,370,000,000,000,000,000,000,000 | ext_hash.cpp | 323,289,236,110,819,230,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2014-6229 | The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string, and makes it easier... | https://nvd.nist.gov/vuln/detail/CVE-2014-6229 |
195,492 | proxygen | 52cf331743ebd74194d6343a6c2ec52bb917c982 | https://github.com/facebook/proxygen | https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982 | Fix h2 codec state after bad priority header.
Summary:
It's possible for the http2 codec to enter an invalid state after processing a http2 header with invalid priorities.
CVE-2018-6346
Reviewed By: maxgeorg
Differential Revision: D13510025
fbshipit-source-id: 7c4e42daf1cd2b912454d13a66ab8488d1863263 | 1 | folly::Optional<ErrorCode> HTTP2Codec::parseHeadersDecodeFrames(
const folly::Optional<http2::PriorityUpdate>& priority,
const folly::Optional<uint32_t>& promisedStream,
const folly::Optional<ExAttributes>& exAttributes,
std::unique_ptr<HTTPMessage>& msg) {
// decompress headers
Cursor headerCursor(... | 14,091,148,304,699,886,000,000,000,000,000,000,000 | None | null | [
"CWE-388"
] | CVE-2018-6346 | A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00. | https://nvd.nist.gov/vuln/detail/CVE-2018-6346 |
227,580 | proxygen | 52cf331743ebd74194d6343a6c2ec52bb917c982 | https://github.com/facebook/proxygen | https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982 | Fix h2 codec state after bad priority header.
Summary:
It's possible for the http2 codec to enter an invalid state after processing a http2 header with invalid priorities.
CVE-2018-6346
Reviewed By: maxgeorg
Differential Revision: D13510025
fbshipit-source-id: 7c4e42daf1cd2b912454d13a66ab8488d1863263 | 0 | folly::Optional<ErrorCode> HTTP2Codec::parseHeadersDecodeFrames(
const folly::Optional<http2::PriorityUpdate>& priority,
const folly::Optional<uint32_t>& promisedStream,
const folly::Optional<ExAttributes>& exAttributes,
std::unique_ptr<HTTPMessage>& msg) {
// decompress headers
Cursor headerCursor(... | 179,487,345,148,118,030,000,000,000,000,000,000,000 | None | null | [
"CWE-388"
] | CVE-2018-6346 | A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00. | https://nvd.nist.gov/vuln/detail/CVE-2018-6346 |
195,493 | hhvm | 524d2e60cfe910406ec6109e4286d7edd545ab36 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36 | ext_mbstring: Fix invalid free() in php_mb_parse_encoding
Summary:
A chunk of memory allocated by 'req::calloc_noptrs' was being freed by 'free'. The former internally calls 'calloc' and returns a pointer at an index sizeof(MallocNode) inside the allocated buffer. This led to freeing invalid memory.
CVE-2019-11930
R... | 1 | static bool php_mb_parse_encoding(const Variant& encoding,
mbfl_encoding ***return_list,
int *return_size, bool persistent) {
bool ret;
if (encoding.isArray()) {
ret = php_mb_parse_encoding_array(encoding.toArray(),
... | 251,344,227,985,335,080,000,000,000,000,000,000,000 | ext_mbstring.cpp | 34,536,365,220,079,264,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-11930 | An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1. | https://nvd.nist.gov/vuln/detail/CVE-2019-11930 |
227,595 | hhvm | 524d2e60cfe910406ec6109e4286d7edd545ab36 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36 | ext_mbstring: Fix invalid free() in php_mb_parse_encoding
Summary:
A chunk of memory allocated by 'req::calloc_noptrs' was being freed by 'free'. The former internally calls 'calloc' and returns a pointer at an index sizeof(MallocNode) inside the allocated buffer. This led to freeing invalid memory.
CVE-2019-11930
R... | 0 | static bool php_mb_parse_encoding(const Variant& encoding,
mbfl_encoding ***return_list,
int *return_size, bool persistent) {
bool ret;
if (encoding.isArray()) {
ret = php_mb_parse_encoding_array(encoding.toArray(),
... | 9,077,306,852,533,246,000,000,000,000,000,000,000 | ext_mbstring.cpp | 166,648,600,061,547,450,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-11930 | An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1. | https://nvd.nist.gov/vuln/detail/CVE-2019-11930 |
195,494 | src | 7afb2d41c6d373cf965285840b85c45011357115 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/7afb2d41c6d373cf965285840b85c45011357115 | Fix return value check for openssl API used during pubkey validation.
Found thanks to bug report by Michael Scheibel <m.Scheibel (at) tuvit (dot) de>
ok patrick@, markus@, tb@ | 1 | ca_validate_pubkey(struct iked *env, struct iked_static_id *id,
void *data, size_t len, struct iked_id *out)
{
BIO *rawcert = NULL;
RSA *peerrsa = NULL, *localrsa = NULL;
EC_KEY *peerec = NULL;
EVP_PKEY *peerkey = NULL, *localkey = NULL;
int ret = -1;
FILE *fp = NULL;
char idstr[IKED_ID_SIZE];
char ... | 44,678,367,820,527,340,000,000,000,000,000,000,000 | ca.c | 99,489,708,618,331,940,000,000,000,000,000,000,000 | [
"CWE-639"
] | CVE-2020-16088 | iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches. | https://nvd.nist.gov/vuln/detail/CVE-2020-16088 |
227,602 | src | 7afb2d41c6d373cf965285840b85c45011357115 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/7afb2d41c6d373cf965285840b85c45011357115 | Fix return value check for openssl API used during pubkey validation.
Found thanks to bug report by Michael Scheibel <m.Scheibel (at) tuvit (dot) de>
ok patrick@, markus@, tb@ | 0 | ca_validate_pubkey(struct iked *env, struct iked_static_id *id,
void *data, size_t len, struct iked_id *out)
{
BIO *rawcert = NULL;
RSA *peerrsa = NULL, *localrsa = NULL;
EC_KEY *peerec = NULL;
EVP_PKEY *peerkey = NULL, *localkey = NULL;
int ret = -1;
FILE *fp = NULL;
char idstr[IKED_ID_SIZE];
char ... | 178,347,449,510,880,130,000,000,000,000,000,000,000 | ca.c | 317,673,040,972,141,270,000,000,000,000,000,000,000 | [
"CWE-639"
] | CVE-2020-16088 | iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches. | https://nvd.nist.gov/vuln/detail/CVE-2020-16088 |
195,495 | linux | f958d7b528b1b40c44cfda5eabe2d82760d868c3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3 | mm: make page ref count overflow check tighter and more explicit
We have a VM_BUG_ON() to check that the page reference count doesn't
underflow (or get close to overflow) by checking the sign of the count.
That's all fine, but we actually want to allow people to use a "get page
ref unless it's already very high" help... | 1 | static inline void get_page(struct page *page)
{
page = compound_head(page);
/*
* Getting a normal page or the head of a compound page
* requires to already have an elevated page->_refcount.
*/
VM_BUG_ON_PAGE(page_ref_count(page) <= 0, page);
page_ref_inc(page);
} | 205,759,811,558,459,150,000,000,000,000,000,000,000 | mm.h | 186,130,907,500,487,770,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11487 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11487 |
227,668 | linux | f958d7b528b1b40c44cfda5eabe2d82760d868c3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3 | mm: make page ref count overflow check tighter and more explicit
We have a VM_BUG_ON() to check that the page reference count doesn't
underflow (or get close to overflow) by checking the sign of the count.
That's all fine, but we actually want to allow people to use a "get page
ref unless it's already very high" help... | 0 | static inline void get_page(struct page *page)
{
page = compound_head(page);
/*
* Getting a normal page or the head of a compound page
* requires to already have an elevated page->_refcount.
*/
VM_BUG_ON_PAGE(page_ref_zero_or_close_to_overflow(page), page);
page_ref_inc(page);
} | 272,612,905,804,825,670,000,000,000,000,000,000,000 | mm.h | 271,828,639,087,441,930,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11487 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11487 |
195,499 | ioq3 | f61fe5f6a0419ef4a88d46a128052f2e8352e85d | https://github.com/ioquake/ioq3 | https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d | Don't open .pk3 files as OpenAL drivers. | 1 | qboolean S_AL_Init( soundInterface_t *si )
{
#ifdef USE_OPENAL
const char* device = NULL;
const char* inputdevice = NULL;
int i;
if( !si ) {
return qfalse;
}
for (i = 0; i < MAX_RAW_STREAMS; i++) {
streamSourceHandles[i] = -1;
streamPlaying[i] = qfalse;
streamSources[i] = 0;
streamNumBuffers[i] = 0;
... | 285,376,067,674,533,300,000,000,000,000,000,000,000 | snd_openal.c | 263,036,232,976,126,770,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
227,933 | ioq3 | f61fe5f6a0419ef4a88d46a128052f2e8352e85d | https://github.com/ioquake/ioq3 | https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d | Don't open .pk3 files as OpenAL drivers. | 0 | qboolean S_AL_Init( soundInterface_t *si )
{
#ifdef USE_OPENAL
const char* device = NULL;
const char* inputdevice = NULL;
int i;
if( !si ) {
return qfalse;
}
for (i = 0; i < MAX_RAW_STREAMS; i++) {
streamSourceHandles[i] = -1;
streamPlaying[i] = qfalse;
streamSources[i] = 0;
streamNumBuffers[i] = 0;
... | 292,949,543,489,260,260,000,000,000,000,000,000,000 | snd_openal.c | 265,865,512,864,732,080,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
195,548 | Bento4 | 2f267f89f957088197f4b1fc254632d1645b415d | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/2f267f89f957088197f4b1fc254632d1645b415d | fix for #183 | 1 | AP4_AtomSampleTable::GetSample(AP4_Ordinal index,
AP4_Sample& sample)
{
AP4_Result result;
// check that we have an stsc atom
if (!m_StscAtom) {
return AP4_ERROR_INVALID_FORMAT;
}
// check that we have a chunk offset table
if (m_StcoAtom == NULL && m... | 273,959,235,933,699,700,000,000,000,000,000,000,000 | Ap4AtomSampleTable.cpp | 244,943,401,588,861,740,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-14640 | A NULL pointer dereference was discovered in AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-14640 |
228,406 | Bento4 | 2f267f89f957088197f4b1fc254632d1645b415d | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/2f267f89f957088197f4b1fc254632d1645b415d | fix for #183 | 0 | AP4_AtomSampleTable::GetSample(AP4_Ordinal index,
AP4_Sample& sample)
{
AP4_Result result;
// check that we have an stsc atom
if (!m_StscAtom) {
return AP4_ERROR_INVALID_FORMAT;
}
// check that we have a chunk offset table
if (m_StcoAtom == NULL && m... | 21,987,022,557,370,318,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2017-14640 | A NULL pointer dereference was discovered in AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-14640 |
195,550 | ioq3 | b173ac05993f634a42be3d3535e1b158de0c3372 | https://github.com/ioquake/ioq3 | https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372 | Merge some file writing extension checks from OpenJK.
Thanks Ensiform.
https://github.com/JACoders/OpenJK/commit/05928a57f9e4aae15a3bd0
https://github.com/JACoders/OpenJK/commit/ef124fd0fc48af164581176 | 1 | void Con_Dump_f (void)
{
int l, x, i;
short *line;
fileHandle_t f;
int bufferlen;
char *buffer;
char filename[MAX_QPATH];
if (Cmd_Argc() != 2)
{
Com_Printf ("usage: condump <filename>\n");
return;
}
Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) );
COM_DefaultExtension( filename, sizeof( fil... | 298,648,795,184,875,400,000,000,000,000,000,000,000 | cl_console.c | 141,523,712,533,740,970,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
228,410 | ioq3 | b173ac05993f634a42be3d3535e1b158de0c3372 | https://github.com/ioquake/ioq3 | https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372 | Merge some file writing extension checks from OpenJK.
Thanks Ensiform.
https://github.com/JACoders/OpenJK/commit/05928a57f9e4aae15a3bd0
https://github.com/JACoders/OpenJK/commit/ef124fd0fc48af164581176 | 0 | void Con_Dump_f (void)
{
int l, x, i;
short *line;
fileHandle_t f;
int bufferlen;
char *buffer;
char filename[MAX_QPATH];
if (Cmd_Argc() != 2)
{
Com_Printf ("usage: condump <filename>\n");
return;
}
Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) );
COM_DefaultExtension( filename, sizeof( fil... | 56,996,131,935,974,910,000,000,000,000,000,000,000 | cl_console.c | 105,723,350,746,074,650,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
195,553 | Bento4 | 03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda | fix for #190 | 1 | AP4_VisualSampleEntry::ReadFields(AP4_ByteStream& stream)
{
// sample entry
AP4_Result result = AP4_SampleEntry::ReadFields(stream);
if (result < 0) return result;
// read fields from this class
stream.ReadUI16(m_Predefined1);
stream.ReadUI16(m_Reserved2);
stream.Read(m_Predefined2, sizeof(... | 291,858,126,646,171,140,000,000,000,000,000,000,000 | Ap4SampleEntry.cpp | 150,692,137,233,250,730,000,000,000,000,000,000,000 | [
"CWE-843"
] | CVE-2017-14639 | AP4_VisualSampleEntry::ReadFields in Core/Ap4SampleEntry.cpp in Bento4 1.5.0-617 uses incorrect character data types, which causes a stack-based buffer underflow and out-of-bounds write, leading to denial of service (application crash) or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14639 |
228,526 | Bento4 | 03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda | fix for #190 | 0 | AP4_VisualSampleEntry::ReadFields(AP4_ByteStream& stream)
{
// sample entry
AP4_Result result = AP4_SampleEntry::ReadFields(stream);
if (result < 0) return result;
// read fields from this class
stream.ReadUI16(m_Predefined1);
stream.ReadUI16(m_Reserved2);
stream.Read(m_Predefined2, sizeof(... | 143,158,700,757,899,990,000,000,000,000,000,000,000 | Ap4SampleEntry.cpp | 12,062,684,135,760,506,000,000,000,000,000,000,000 | [
"CWE-843"
] | CVE-2017-14639 | AP4_VisualSampleEntry::ReadFields in Core/Ap4SampleEntry.cpp in Bento4 1.5.0-617 uses incorrect character data types, which causes a stack-based buffer underflow and out-of-bounds write, leading to denial of service (application crash) or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14639 |
195,567 | Bento4 | 5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647 | fix for #187 | 1 | AP4_HdlrAtom::AP4_HdlrAtom(AP4_UI32 size,
AP4_UI08 version,
AP4_UI32 flags,
AP4_ByteStream& stream) :
AP4_Atom(AP4_ATOM_TYPE_HDLR, size, version, flags)
{
AP4_UI32 predefined;
stream.ReadUI32(predefined);
... | 139,780,581,548,442,280,000,000,000,000,000,000,000 | Ap4HdlrAtom.cpp | 185,668,344,662,796,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14643 | The AP4_HdlrAtom class in Core/Ap4HdlrAtom.cpp in Bento4 version 1.5.0-617 uses an incorrect character data type, leading to a heap-based buffer over-read and application crash in AP4_BytesToUInt32BE in Core/Ap4Utils.h. | https://nvd.nist.gov/vuln/detail/CVE-2017-14643 |
228,566 | Bento4 | 5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647 | fix for #187 | 0 | AP4_HdlrAtom::AP4_HdlrAtom(AP4_UI32 size,
AP4_UI08 version,
AP4_UI32 flags,
AP4_ByteStream& stream) :
AP4_Atom(AP4_ATOM_TYPE_HDLR, size, version, flags)
{
AP4_UI32 predefined;
stream.ReadUI32(predefined);
... | 125,108,718,056,462,480,000,000,000,000,000,000,000 | Ap4HdlrAtom.cpp | 27,669,121,668,231,960,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14643 | The AP4_HdlrAtom class in Core/Ap4HdlrAtom.cpp in Bento4 version 1.5.0-617 uses an incorrect character data type, leading to a heap-based buffer over-read and application crash in AP4_BytesToUInt32BE in Core/Ap4Utils.h. | https://nvd.nist.gov/vuln/detail/CVE-2017-14643 |
195,568 | kdeconnect-kde | ce0f00fc2d3eccb51d0af4eba61a4f60de086a59 | https://github.com/KDE/kdeconnect-kde | https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59 | Limit the ports we try to connect to to the port range of KDE Connect
So we can't trigger connections to other services.
Thanks Matthias Gerstner <mgerstner@suse.de> for reporting this. | 1 | void LanLinkProvider::udpBroadcastReceived()
{
while (m_udpSocket.hasPendingDatagrams()) {
QByteArray datagram;
datagram.resize(m_udpSocket.pendingDatagramSize());
QHostAddress sender;
m_udpSocket.readDatagram(datagram.data(), datagram.size(), &sender);
if (sender.isLoopba... | 151,001,223,268,024,100,000,000,000,000,000,000,000 | lanlinkprovider.cpp | 10,768,406,022,709,875,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2020-26164 | In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack. | https://nvd.nist.gov/vuln/detail/CVE-2020-26164 |
228,574 | kdeconnect-kde | ce0f00fc2d3eccb51d0af4eba61a4f60de086a59 | https://github.com/KDE/kdeconnect-kde | https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59 | Limit the ports we try to connect to to the port range of KDE Connect
So we can't trigger connections to other services.
Thanks Matthias Gerstner <mgerstner@suse.de> for reporting this. | 0 | void LanLinkProvider::udpBroadcastReceived()
{
while (m_udpSocket.hasPendingDatagrams()) {
QByteArray datagram;
datagram.resize(m_udpSocket.pendingDatagramSize());
QHostAddress sender;
m_udpSocket.readDatagram(datagram.data(), datagram.size(), &sender);
if (sender.isLoopba... | 233,962,280,599,683,340,000,000,000,000,000,000,000 | lanlinkprovider.cpp | 122,426,479,794,157,680,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2020-26164 | In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack. | https://nvd.nist.gov/vuln/detail/CVE-2020-26164 |
195,572 | hhvm | 8e7266fef1f329b805b37f32c9ad0090215ab269 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269 | Type safety in simplexml import routines
Reviewed By: Orvid
Differential Revision: D3447275
fbshipit-source-id: d859c97f9d85c520b0e371cef6dcb19bb2ef7dbf | 1 | xmlNodePtr SimpleXMLElement_exportNode(const Object& sxe) {
assert(sxe->instanceof(SimpleXMLElement_classof()));
auto data = Native::data<SimpleXMLElement>(sxe.get());
return php_sxe_get_first_node(data, data->nodep());
} | 191,864,301,088,947,100,000,000,000,000,000,000,000 | ext_simplexml.cpp | 256,254,425,784,196,880,000,000,000,000,000,000,000 | [
"CWE-345"
] | CVE-2016-1000004 | Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive). | https://nvd.nist.gov/vuln/detail/CVE-2016-1000004 |
228,820 | hhvm | 8e7266fef1f329b805b37f32c9ad0090215ab269 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269 | Type safety in simplexml import routines
Reviewed By: Orvid
Differential Revision: D3447275
fbshipit-source-id: d859c97f9d85c520b0e371cef6dcb19bb2ef7dbf | 0 | xmlNodePtr SimpleXMLElement_exportNode(const Object& sxe) {
if (!sxe->instanceof(SimpleXMLElement_classof())) return nullptr;
auto data = Native::data<SimpleXMLElement>(sxe.get());
return php_sxe_get_first_node(data, data->nodep());
} | 199,698,879,063,053,850,000,000,000,000,000,000,000 | ext_simplexml.cpp | 197,253,127,696,964,920,000,000,000,000,000,000,000 | [
"CWE-345"
] | CVE-2016-1000004 | Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive). | https://nvd.nist.gov/vuln/detail/CVE-2016-1000004 |
195,574 | hhvm | ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e | Fix mcrypt_create_iv(..., MCRYPT_RAND) to auto-seed RNG
Summary: Without seeding the random number generator,
we'll always get the same IV, and that reduces the security
of this function.
Fortunately, f_rand() has all of that logic for auto-seeding
and selection of a suitable initial seed built-in.
Realistically, us... | 1 | Variant HHVM_FUNCTION(mcrypt_create_iv, int size, int source /* = 0 */) {
if (size <= 0 || size >= INT_MAX) {
raise_warning("Can not create an IV with a size of less than 1 or "
"greater than %d", INT_MAX);
return false;
}
int n = 0;
char *iv = (char*)calloc(size + 1, 1);
if (sour... | 122,930,791,493,003,970,000,000,000,000,000,000,000 | ext_mcrypt.cpp | 12,007,436,905,327,050,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-5386 | The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initialization vector. | https://nvd.nist.gov/vuln/detail/CVE-2014-5386 |
228,848 | hhvm | ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e | Fix mcrypt_create_iv(..., MCRYPT_RAND) to auto-seed RNG
Summary: Without seeding the random number generator,
we'll always get the same IV, and that reduces the security
of this function.
Fortunately, f_rand() has all of that logic for auto-seeding
and selection of a suitable initial seed built-in.
Realistically, us... | 0 | Variant HHVM_FUNCTION(mcrypt_create_iv, int size, int source /* = 0 */) {
if (size <= 0 || size >= INT_MAX) {
raise_warning("Can not create an IV with a size of less than 1 or "
"greater than %d", INT_MAX);
return false;
}
int n = 0;
char *iv = (char*)calloc(size + 1, 1);
if (sour... | 23,541,377,156,896,640,000,000,000,000,000,000,000 | ext_mcrypt.cpp | 310,969,514,556,034,770,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-5386 | The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initialization vector. | https://nvd.nist.gov/vuln/detail/CVE-2014-5386 |
195,608 | hhvm | 851fff90a9b7461df2393af32239ba217bc25946 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946 | Drop supplementary groups when changing to non-root
Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user.
Reviewed By:... | 1 | bool Capability::ChangeUnixUser(uid_t uid) {
if (setInitialCapabilities()) {
struct passwd *pw;
if ((pw = getpwuid(uid)) == nullptr) {
Logger::Error("unable to getpwuid(%d): %s", uid,
folly::errnoStr(errno).c_str());
return false;
}
if (pw->pw_gid == 0 || setgid(pw->p... | 204,378,463,174,552,160,000,000,000,000,000,000,000 | capability.cpp | 11,716,426,207,720,806,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-2209 | Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-2209 |
229,042 | hhvm | 851fff90a9b7461df2393af32239ba217bc25946 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946 | Drop supplementary groups when changing to non-root
Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user.
Reviewed By:... | 0 | bool Capability::ChangeUnixUser(uid_t uid) {
if (setInitialCapabilities()) {
struct passwd *pw;
if ((pw = getpwuid(uid)) == nullptr) {
Logger::Error("unable to getpwuid(%d): %s", uid,
folly::errnoStr(errno).c_str());
return false;
}
if (initgroups(pw->pw_name, pw->pw_... | 56,845,751,146,719,340,000,000,000,000,000,000,000 | capability.cpp | 35,283,005,336,875,270,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-2209 | Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-2209 |
195,609 | hhvm | 851fff90a9b7461df2393af32239ba217bc25946 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946 | Drop supplementary groups when changing to non-root
Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user.
Reviewed By:... | 1 | static void do_change_user(FILE *fin, FILE *fout) {
std::string uname;
lwp_read(fin, uname);
if (uname.length() > 0) {
struct passwd *pw = getpwnam(uname.c_str());
if (pw) {
if (pw->pw_gid) {
setgid(pw->pw_gid);
}
if (pw->pw_uid) {
setuid(pw->pw_uid);
}
}
}
} | 61,372,006,412,745,630,000,000,000,000,000,000,000 | light-process.cpp | 152,028,194,502,348,390,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-2209 | Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-2209 |
229,075 | hhvm | 851fff90a9b7461df2393af32239ba217bc25946 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946 | Drop supplementary groups when changing to non-root
Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user.
Reviewed By:... | 0 | static void do_change_user(FILE *fin, FILE *fout) {
std::string uname;
lwp_read(fin, uname);
if (uname.length() > 0) {
struct passwd *pw = getpwnam(uname.c_str());
if (pw) {
if (pw->pw_gid) {
initgroups(pw->pw_name, pw->pw_gid);
setgid(pw->pw_gid);
}
if (pw->pw_uid) {
... | 54,948,825,547,458,770,000,000,000,000,000,000,000 | light-process.cpp | 79,993,282,835,522,970,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-2209 | Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-2209 |
195,610 | hhvm | 6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles
Summary:
These File subclasses return -1 on read errors which is not what is
expected for readImpl--this made File::readRecord behave unusually if the read
fails, causing it to read (size_t)(-1) bytes from its stream buffer; which,
unsurprisingly produc... | 1 | int64_t OutputFile::readImpl(char* /*buffer*/, int64_t /*length*/) {
raise_warning("cannot read from a php://output stream");
return -1;
} | 337,322,187,543,142,100,000,000,000,000,000,000,000 | output-file.cpp | 9,794,863,746,011,051,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3557 | The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v... | https://nvd.nist.gov/vuln/detail/CVE-2019-3557 |
229,097 | hhvm | 6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles
Summary:
These File subclasses return -1 on read errors which is not what is
expected for readImpl--this made File::readRecord behave unusually if the read
fails, causing it to read (size_t)(-1) bytes from its stream buffer; which,
unsurprisingly produc... | 0 | int64_t OutputFile::readImpl(char* /*buffer*/, int64_t /*length*/) {
raise_warning("cannot read from a php://output stream");
return 0;
} | 11,936,769,161,372,925,000,000,000,000,000,000,000 | output-file.cpp | 134,179,565,871,971,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3557 | The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v... | https://nvd.nist.gov/vuln/detail/CVE-2019-3557 |
195,611 | hhvm | 6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles
Summary:
These File subclasses return -1 on read errors which is not what is
expected for readImpl--this made File::readRecord behave unusually if the read
fails, causing it to read (size_t)(-1) bytes from its stream buffer; which,
unsurprisingly produc... | 1 | int64_t BZ2File::readImpl(char * buf, int64_t length) {
if (length == 0) {
return 0;
}
assertx(m_bzFile);
int len = BZ2_bzread(m_bzFile, buf, length);
/* Sometimes libbz2 will return fewer bytes than requested, and set bzerror
* to BZ_STREAM_END, but it's not actually EOF, and you can keep reading from... | 338,038,434,053,643,400,000,000,000,000,000,000,000 | bz2-file.cpp | 68,927,935,171,536,810,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3557 | The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v... | https://nvd.nist.gov/vuln/detail/CVE-2019-3557 |
229,096 | hhvm | 6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994 | CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles
Summary:
These File subclasses return -1 on read errors which is not what is
expected for readImpl--this made File::readRecord behave unusually if the read
fails, causing it to read (size_t)(-1) bytes from its stream buffer; which,
unsurprisingly produc... | 0 | int64_t BZ2File::readImpl(char * buf, int64_t length) {
if (length == 0) {
return 0;
}
assertx(m_bzFile);
int len = BZ2_bzread(m_bzFile, buf, length);
/* Sometimes libbz2 will return fewer bytes than requested, and set bzerror
* to BZ_STREAM_END, but it's not actually EOF, and you can keep reading from... | 201,114,122,229,752,200,000,000,000,000,000,000,000 | bz2-file.cpp | 37,884,756,135,230,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3557 | The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v... | https://nvd.nist.gov/vuln/detail/CVE-2019-3557 |
195,630 | electron | ce361a12e355f9e1e99c989f1ea056c9e502dbe7 | https://github.com/electron/electron | https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7 | Use case-insensitive switch comparisons | 1 | bool IsBlacklistedArg(const base::CommandLine::CharType* arg) {
#if defined(OS_WIN)
const auto converted = base::WideToUTF8(arg);
const char* a = converted.c_str();
#else
const char* a = arg;
#endif
static const char* prefixes[] = {"--", "-", "/"};
int prefix_length = 0;
for (auto& prefix : prefixes) {
... | 337,018,550,088,046,860,000,000,000,000,000,000,000 | command_line_args.cc | 198,356,772,242,024,040,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1000118 | Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electro... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000118 |
229,354 | electron | ce361a12e355f9e1e99c989f1ea056c9e502dbe7 | https://github.com/electron/electron | https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7 | Use case-insensitive switch comparisons | 0 | bool IsBlacklistedArg(const base::CommandLine::CharType* arg) {
#if defined(OS_WIN)
const auto converted = base::WideToUTF8(arg);
const char* a = converted.c_str();
#else
const char* a = arg;
#endif
static const char* prefixes[] = {"--", "-", "/"};
int prefix_length = 0;
for (auto& prefix : prefixes) {
... | 142,984,060,109,921,260,000,000,000,000,000,000,000 | command_line_args.cc | 286,126,598,103,602,100,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1000118 | Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electro... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000118 |
195,646 | tensorflow | e0b6e58c328059829c3eb968136f17aa72b6c876 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876 | Fix segfault/heap buffer overflow in `{Experimental,}DatasetToTFRecord` where dataset is numeric.
Code assumes only strings inputs and then interprets numbers as valid `tstring`s. Then, when trying to compute the CRC of the record this results in heap buffer overflow.
PiperOrigin-RevId: 387675909
Change-Id: I7396b9b8... | 1 | Status DoCompute(OpKernelContext* ctx) {
tensorflow::ResourceTagger tag(kTFDataResourceTag,
ctx->op_kernel().type_string());
tstring filename;
TF_RETURN_IF_ERROR(
ParseScalarArgument<tstring>(ctx, "filename", &filename));
tstring compression_type;
TF_RETU... | 292,166,234,781,191,280,000,000,000,000,000,000,000 | to_tf_record_op.cc | 36,822,953,656,946,894,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-37650 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24... | https://nvd.nist.gov/vuln/detail/CVE-2021-37650 |
229,847 | tensorflow | e0b6e58c328059829c3eb968136f17aa72b6c876 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876 | Fix segfault/heap buffer overflow in `{Experimental,}DatasetToTFRecord` where dataset is numeric.
Code assumes only strings inputs and then interprets numbers as valid `tstring`s. Then, when trying to compute the CRC of the record this results in heap buffer overflow.
PiperOrigin-RevId: 387675909
Change-Id: I7396b9b8... | 0 | Status DoCompute(OpKernelContext* ctx) {
tensorflow::ResourceTagger tag(kTFDataResourceTag,
ctx->op_kernel().type_string());
tstring filename;
TF_RETURN_IF_ERROR(
ParseScalarArgument<tstring>(ctx, "filename", &filename));
tstring compression_type;
TF_RETU... | 222,055,149,982,737,140,000,000,000,000,000,000,000 | to_tf_record_op.cc | 46,043,404,800,283,230,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-37650 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24... | https://nvd.nist.gov/vuln/detail/CVE-2021-37650 |
195,658 | oniguruma | b4bf968ad52afe14e60a2dc8a95d3555c543353a | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a | fix #55 : check too big code point value for single byte value in next_state_val() | 1 | next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v,
int* vs_israw, int v_israw,
enum CCVALTYPE intype, enum CCVALTYPE* type,
enum CCSTATE* state, ScanEnv* env)
{
int r;
switch (*state) {
case CCS_VALUE:
if (*type == CCV_SB) {
BITSET_SET_BIT(cc->bs, (int )(*vs));
... | 140,805,157,103,947,400,000,000,000,000,000,000,000 | regparse.c | 305,266,319,944,342,200,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-9226 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_... | https://nvd.nist.gov/vuln/detail/CVE-2017-9226 |
230,000 | oniguruma | b4bf968ad52afe14e60a2dc8a95d3555c543353a | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a | fix #55 : check too big code point value for single byte value in next_state_val() | 0 | next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v,
int* vs_israw, int v_israw,
enum CCVALTYPE intype, enum CCVALTYPE* type,
enum CCSTATE* state, ScanEnv* env)
{
int r;
switch (*state) {
case CCS_VALUE:
if (*type == CCV_SB) {
if (*vs > 0xff)
return ONIGE... | 57,764,420,093,491,890,000,000,000,000,000,000,000 | regparse.c | 205,767,443,219,914,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-9226 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_... | https://nvd.nist.gov/vuln/detail/CVE-2017-9226 |
195,666 | ImageMagick | f13c6b54a879aaa771ec64b5a066b939e8f8e7f0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f13c6b54a879aaa771ec64b5a066b939e8f8e7f0 | https://github.com/ImageMagick/ImageMagick/issues/501 | 1 | static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*option;
Image
*image;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
opj_codestream_index_t
*codestream_index = (opj_codestream_index_t *) NULL;
opj_dparameters_t... | 227,607,753,646,632,050,000,000,000,000,000,000,000 | jp2.c | 35,911,165,762,958,540,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-13145 | In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash. | https://nvd.nist.gov/vuln/detail/CVE-2017-13145 |
230,319 | ImageMagick | f13c6b54a879aaa771ec64b5a066b939e8f8e7f0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f13c6b54a879aaa771ec64b5a066b939e8f8e7f0 | https://github.com/ImageMagick/ImageMagick/issues/501 | 0 | static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*option;
Image
*image;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
opj_codestream_index_t
*codestream_index = (opj_codestream_index_t *) NULL;
opj_dparameters_t... | 211,048,824,504,751,460,000,000,000,000,000,000,000 | jp2.c | 299,186,446,646,628,600,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-13145 | In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash. | https://nvd.nist.gov/vuln/detail/CVE-2017-13145 |
195,681 | tensorflow | 13d38a07ce9143e044aa737cfd7bb759d0e9b400 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400 | Fix tf.raw_ops.UnsortedSegmentJoin vulnerability with invalid num_segments.
Check that input is actually a scalar before treating it as such.
PiperOrigin-RevId: 445206880 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const TensorShape& input_shape = input.shape();
const int32_t input_dims = input_shape.dims();
const Tensor& segment_id = context->input(1);
const TensorShape& segment_id_shape = segment_id.shape();
con... | 282,038,238,333,656,560,000,000,000,000,000,000,000 | unsorted_segment_join_op.cc | 146,876,308,978,777,240,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29197 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `n... | https://nvd.nist.gov/vuln/detail/CVE-2022-29197 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.