idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
230,608 | tensorflow | 13d38a07ce9143e044aa737cfd7bb759d0e9b400 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400 | Fix tf.raw_ops.UnsortedSegmentJoin vulnerability with invalid num_segments.
Check that input is actually a scalar before treating it as such.
PiperOrigin-RevId: 445206880 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const TensorShape& input_shape = input.shape();
const int32_t input_dims = input_shape.dims();
const Tensor& segment_id = context->input(1);
const TensorShape& segment_id_shape = segment_id.shape();
con... | 65,248,679,843,968,420,000,000,000,000,000,000,000 | unsorted_segment_join_op.cc | 272,660,497,308,848,180,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29197 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `n... | https://nvd.nist.gov/vuln/detail/CVE-2022-29197 |
195,687 | haproxy | 3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 | https://github.com/haproxy/haproxy | https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 | BUG/MAJOR: htx: fix missing header name length check in htx_add_header/trailer
Ori Hollander of JFrog Security reported that htx_add_header() and
htx_add_trailer() were missing a length check on the header name. While
this does not allow to overwrite any memory area, it results in bits of
the header name length to sli... | 1 | static inline struct htx_blk *htx_add_header(struct htx *htx, const struct ist name,
const struct ist value)
{
struct htx_blk *blk;
/* FIXME: check name.len (< 256B) and value.len (< 1MB) */
blk = htx_add_blk(htx, HTX_BLK_HDR, name.len + value.len);
if (!blk)
return NULL;
blk->info += (value.len << 8... | 298,891,256,359,096,300,000,000,000,000,000,000,000 | htx.h | 174,016,802,291,091,360,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-40346 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. | https://nvd.nist.gov/vuln/detail/CVE-2021-40346 |
230,842 | haproxy | 3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 | https://github.com/haproxy/haproxy | https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 | BUG/MAJOR: htx: fix missing header name length check in htx_add_header/trailer
Ori Hollander of JFrog Security reported that htx_add_header() and
htx_add_trailer() were missing a length check on the header name. While
this does not allow to overwrite any memory area, it results in bits of
the header name length to sli... | 0 | static inline struct htx_blk *htx_add_header(struct htx *htx, const struct ist name,
const struct ist value)
{
struct htx_blk *blk;
if (name.len > 255 || value.len > 1048575)
return NULL;
blk = htx_add_blk(htx, HTX_BLK_HDR, name.len + value.len);
if (!blk)
return NULL;
blk->info += (value.len << 8... | 58,472,739,533,880,380,000,000,000,000,000,000,000 | htx.h | 82,485,125,932,367,870,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-40346 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. | https://nvd.nist.gov/vuln/detail/CVE-2021-40346 |
195,693 | tensorflow | d94ffe08a65400f898241c0374e9edc6fa8ed257 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257 | Prevent an OOB read in `expand_dims.cc`
The for loop that follows this check assumes that `axis` is between `0` and `input_dims.size`. If user supplied `axis` is negative, the if code before this check is supposed to bring it back to positive (similar to how in Python one can do `l[-3]` to mean `l[-3 + len(l)]`).
Pip... | 1 | TfLiteStatus ExpandTensorDim(TfLiteContext* context, const TfLiteTensor& input,
int axis, TfLiteTensor* output) {
const TfLiteIntArray& input_dims = *input.dims;
if (axis < 0) {
axis = input_dims.size + 1 + axis;
}
TF_LITE_ENSURE(context, axis <= input_dims.size);
TfLiteIntAr... | 68,745,352,576,737,850,000,000,000,000,000,000,000 | expand_dims.cc | 193,638,638,891,517,460,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-37685 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside... | https://nvd.nist.gov/vuln/detail/CVE-2021-37685 |
231,063 | tensorflow | d94ffe08a65400f898241c0374e9edc6fa8ed257 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257 | Prevent an OOB read in `expand_dims.cc`
The for loop that follows this check assumes that `axis` is between `0` and `input_dims.size`. If user supplied `axis` is negative, the if code before this check is supposed to bring it back to positive (similar to how in Python one can do `l[-3]` to mean `l[-3 + len(l)]`).
Pip... | 0 | TfLiteStatus ExpandTensorDim(TfLiteContext* context, const TfLiteTensor& input,
int axis, TfLiteTensor* output) {
const TfLiteIntArray& input_dims = *input.dims;
if (axis < 0) {
axis = input_dims.size + 1 + axis;
}
TF_LITE_ENSURE(context, axis <= input_dims.size);
TF_LITE_ENSU... | 169,164,928,832,289,940,000,000,000,000,000,000,000 | expand_dims.cc | 197,423,725,030,643,570,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-37685 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside... | https://nvd.nist.gov/vuln/detail/CVE-2021-37685 |
195,698 | qemu | 3de46e6fc489c52c9431a8a832ad8170a7569bd8 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8 | e1000: fail early for evil descriptor
During procss_tx_desc(), driver can try to chain data descriptor with
legacy descriptor, when will lead underflow for the following
calculation in process_tx_desc() for bytes:
if (tp->size + bytes > msh)
bytes = msh - tp->size;
This will lead a infini... | 1 | process_tx_desc(E1000State *s, struct e1000_tx_desc *dp)
{
PCIDevice *d = PCI_DEVICE(s);
uint32_t txd_lower = le32_to_cpu(dp->lower.data);
uint32_t dtype = txd_lower & (E1000_TXD_CMD_DEXT | E1000_TXD_DTYP_D);
unsigned int split_size = txd_lower & 0xffff, bytes, sz;
unsigned int msh = 0xfffff;
ui... | 74,125,544,352,553,390,000,000,000,000,000,000,000 | e1000.c | 81,059,158,982,762,300,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2021-20257 | An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The high... | https://nvd.nist.gov/vuln/detail/CVE-2021-20257 |
231,108 | qemu | 3de46e6fc489c52c9431a8a832ad8170a7569bd8 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8 | e1000: fail early for evil descriptor
During procss_tx_desc(), driver can try to chain data descriptor with
legacy descriptor, when will lead underflow for the following
calculation in process_tx_desc() for bytes:
if (tp->size + bytes > msh)
bytes = msh - tp->size;
This will lead a infini... | 0 | process_tx_desc(E1000State *s, struct e1000_tx_desc *dp)
{
PCIDevice *d = PCI_DEVICE(s);
uint32_t txd_lower = le32_to_cpu(dp->lower.data);
uint32_t dtype = txd_lower & (E1000_TXD_CMD_DEXT | E1000_TXD_DTYP_D);
unsigned int split_size = txd_lower & 0xffff, bytes, sz;
unsigned int msh = 0xfffff;
ui... | 286,300,002,648,459,670,000,000,000,000,000,000,000 | e1000.c | 47,410,790,699,069,030,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2021-20257 | An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The high... | https://nvd.nist.gov/vuln/detail/CVE-2021-20257 |
195,709 | freeradius-server | 4dc7800b866f889a1247685bbaa6dd4238a56279 | https://github.com/alandekok/freeradius-server | http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279 | Fix endless loop when there are multiple DHCP options | 1 | int fr_dhcp_decode(RADIUS_PACKET *packet)
{
int i;
uint8_t *p, *next;
uint32_t giaddr;
VALUE_PAIR *head, *vp, **tail;
VALUE_PAIR *maxms, *mtu;
char buffer[2048];
head = NULL;
tail = &head;
p = packet->data;
if ((fr_debug_flag > 2) && fr_log_fp) {
for (i = 0; i < packet->data_len; i++) {
if ((i & 0x0f)... | 227,854,104,156,128,660,000,000,000,000,000,000,000 | dhcp.c | 108,402,175,319,933,540,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2010-3696 | The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of thes... | https://nvd.nist.gov/vuln/detail/CVE-2010-3696 |
231,426 | freeradius-server | 4dc7800b866f889a1247685bbaa6dd4238a56279 | https://github.com/alandekok/freeradius-server | http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279 | Fix endless loop when there are multiple DHCP options | 0 | int fr_dhcp_decode(RADIUS_PACKET *packet)
{
int i;
uint8_t *p, *next;
uint32_t giaddr;
VALUE_PAIR *head, *vp, **tail;
VALUE_PAIR *maxms, *mtu;
char buffer[2048];
head = NULL;
tail = &head;
p = packet->data;
if ((fr_debug_flag > 2) && fr_log_fp) {
for (i = 0; i < packet->data_len; i++) {
if ((i & 0x0f)... | 208,226,852,670,389,930,000,000,000,000,000,000,000 | dhcp.c | 129,985,582,471,630,830,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2010-3696 | The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of thes... | https://nvd.nist.gov/vuln/detail/CVE-2010-3696 |
195,726 | taglib | cb9f07d9dcd791b63e622da43f7b232adaec0a9a | https://github.com/taglib/taglib | https://github.com/taglib/taglib/commit/cb9f07d9dcd791b63e622da43f7b232adaec0a9a | Don't assume TDRC is an instance of TextIdentificationFrame (#831)
If TDRC is encrypted, FrameFactory::createFrame() returns UnknownFrame
which causes problems in rebuildAggregateFrames() when it is assumed
that TDRC is a TextIdentificationFrame | 1 | void FrameFactory::rebuildAggregateFrames(ID3v2::Tag *tag) const
{
if(tag->header()->majorVersion() < 4 &&
tag->frameList("TDRC").size() == 1 &&
tag->frameList("TDAT").size() == 1)
{
TextIdentificationFrame *tdrc =
static_cast<TextIdentificationFrame *>(tag->frameList("TDRC").front());
Unkno... | 60,884,634,851,824,770,000,000,000,000,000,000,000 | id3v2framefactory.cpp | 180,566,829,970,563,900,000,000,000,000,000,000 | [
"CWE-352"
] | CVE-2017-12678 | In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12678 |
232,080 | taglib | cb9f07d9dcd791b63e622da43f7b232adaec0a9a | https://github.com/taglib/taglib | https://github.com/taglib/taglib/commit/cb9f07d9dcd791b63e622da43f7b232adaec0a9a | Don't assume TDRC is an instance of TextIdentificationFrame (#831)
If TDRC is encrypted, FrameFactory::createFrame() returns UnknownFrame
which causes problems in rebuildAggregateFrames() when it is assumed
that TDRC is a TextIdentificationFrame | 0 | void FrameFactory::rebuildAggregateFrames(ID3v2::Tag *tag) const
{
if(tag->header()->majorVersion() < 4 &&
tag->frameList("TDRC").size() == 1 &&
tag->frameList("TDAT").size() == 1)
{
TextIdentificationFrame *tdrc =
dynamic_cast<TextIdentificationFrame *>(tag->frameList("TDRC").front());
Unkn... | 200,663,420,292,346,700,000,000,000,000,000,000,000 | id3v2framefactory.cpp | 334,378,625,730,669,240,000,000,000,000,000,000,000 | [
"CWE-352"
] | CVE-2017-12678 | In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12678 |
195,728 | libiec61850 | 033ab5b6488250c8c3b838f25a7cbc3e099230bb | https://github.com/mz-automation/libiec61850 | https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb | - COTP: fixed possible heap buffer overflow when handling message with invalid (zero) value in length field (#250) | 1 | CotpConnection_readToTpktBuffer(CotpConnection* self)
{
uint8_t* buffer = self->readBuffer->buffer;
int bufferSize = self->readBuffer->maxSize;
int bufPos = self->readBuffer->size;
assert (bufferSize > 4);
int readBytes;
if (bufPos < 4) {
readBytes = readFromSocket(self, buffer + buf... | 91,769,707,100,972,450,000,000,000,000,000,000,000 | cotp.c | 42,221,220,259,850,007,000,000,000,000,000,000,000 | [
"CWE-122"
] | CVE-2020-15158 | In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or ther... | https://nvd.nist.gov/vuln/detail/CVE-2020-15158 |
232,235 | libiec61850 | 033ab5b6488250c8c3b838f25a7cbc3e099230bb | https://github.com/mz-automation/libiec61850 | https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb | - COTP: fixed possible heap buffer overflow when handling message with invalid (zero) value in length field (#250) | 0 | CotpConnection_readToTpktBuffer(CotpConnection* self)
{
uint8_t* buffer = self->readBuffer->buffer;
int bufferSize = self->readBuffer->maxSize;
int bufPos = self->readBuffer->size;
assert (bufferSize > 4);
int readBytes;
if (bufPos < 4) {
readBytes = readFromSocket(self, buffer + buf... | 18,187,040,219,387,954,000,000,000,000,000,000,000 | cotp.c | 117,984,707,644,528,530,000,000,000,000,000,000,000 | [
"CWE-122"
] | CVE-2020-15158 | In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or ther... | https://nvd.nist.gov/vuln/detail/CVE-2020-15158 |
195,751 | tensorflow | 14607c0707040d775e06b6817325640cb4b5864c | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c | Fix nullptr deref in `tf.raw_ops.CTCLoss`.
PiperOrigin-RevId: 372266334
Change-Id: Ic52c3e9f13a38f54482d670907eda1688450862b | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor* inputs;
const Tensor* labels_indices;
const Tensor* labels_values;
const Tensor* seq_len;
OP_REQUIRES_OK(ctx, ctx->input("inputs", &inputs));
OP_REQUIRES_OK(ctx, ctx->input("labels_indices", &labels_indices));
OP_REQUIRES_OK(ctx, ... | 284,621,168,675,240,780,000,000,000,000,000,000,000 | ctc_loss_op.cc | 42,387,040,029,811,200,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2021-29613 | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and Tensor... | https://nvd.nist.gov/vuln/detail/CVE-2021-29613 |
232,400 | tensorflow | 14607c0707040d775e06b6817325640cb4b5864c | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c | Fix nullptr deref in `tf.raw_ops.CTCLoss`.
PiperOrigin-RevId: 372266334
Change-Id: Ic52c3e9f13a38f54482d670907eda1688450862b | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor* inputs;
const Tensor* labels_indices;
const Tensor* labels_values;
const Tensor* seq_len;
OP_REQUIRES_OK(ctx, ctx->input("inputs", &inputs));
OP_REQUIRES_OK(ctx, ctx->input("labels_indices", &labels_indices));
OP_REQUIRES_OK(ctx, ... | 64,604,746,349,545,040,000,000,000,000,000,000,000 | ctc_loss_op.cc | 38,178,606,228,397,564,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2021-29613 | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and Tensor... | https://nvd.nist.gov/vuln/detail/CVE-2021-29613 |
195,764 | tensorflow | 953f28dca13c92839ba389c055587cfe6c723578 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578 | Prevent a null pointer exception in TFLite
PiperOrigin-RevId: 370800206
Change-Id: Idd437ebce4ff224120d8eefc1c14c062173b71d6 | 1 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
OpContext op_context(context, node);
switch (op_context.output->type) {
case kTfLiteFloat32:
TFLiteOperation<kernel_type, float, OpType>(context, node, op_context);
break;
case kTfLiteUInt8:
TFLiteOperation<kernel_t... | 86,827,718,223,722,850,000,000,000,000,000,000,000 | maximum_minimum.cc | 231,104,653,070,167,870,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-29590 | TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://git... | https://nvd.nist.gov/vuln/detail/CVE-2021-29590 |
232,739 | tensorflow | 953f28dca13c92839ba389c055587cfe6c723578 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578 | Prevent a null pointer exception in TFLite
PiperOrigin-RevId: 370800206
Change-Id: Idd437ebce4ff224120d8eefc1c14c062173b71d6 | 0 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
OpContext op_context(context, node);
// If inputs have no element, shortcircuit.
if (NumElements(op_context.input1) == 0 ||
NumElements(op_context.input2) == 0) {
return kTfLiteOk;
}
switch (op_context.output->type) {
case kTfLiteFl... | 162,444,068,527,362,600,000,000,000,000,000,000,000 | maximum_minimum.cc | 284,901,546,559,497,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-29590 | TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://git... | https://nvd.nist.gov/vuln/detail/CVE-2021-29590 |
195,777 | asylo | 8fed5e334131abaf9c5e17307642fbf6ce4a57ec | https://github.com/google/asylo | https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec | Check sockaddr size in inet_pton
PiperOrigin-RevId: 333821843
Change-Id: Ie0b694f1edd3f7a4a3de6df964d68566961accf6 | 1 | int enc_untrusted_inet_pton(int af, const char *src, void *dst) {
if (!src || !dst) {
return 0;
}
MessageWriter input;
input.Push<int>(TokLinuxAfFamily(af));
input.PushByReference(Extent{
src, std::min(strlen(src) + 1, static_cast<size_t>(INET6_ADDRSTRLEN))});
MessageReader output;
const auto ... | 30,807,987,413,685,380,000,000,000,000,000,000,000 | host_calls.cc | 83,935,641,637,319,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-8941 | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size includ... | https://nvd.nist.gov/vuln/detail/CVE-2020-8941 |
233,066 | asylo | 8fed5e334131abaf9c5e17307642fbf6ce4a57ec | https://github.com/google/asylo | https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec | Check sockaddr size in inet_pton
PiperOrigin-RevId: 333821843
Change-Id: Ie0b694f1edd3f7a4a3de6df964d68566961accf6 | 0 | int enc_untrusted_inet_pton(int af, const char *src, void *dst) {
if (!src || !dst) {
return 0;
}
MessageWriter input;
input.Push<int>(TokLinuxAfFamily(af));
input.PushByReference(Extent{
src, std::min(strlen(src) + 1, static_cast<size_t>(INET6_ADDRSTRLEN))});
MessageReader output;
const auto ... | 88,417,366,320,740,520,000,000,000,000,000,000,000 | host_calls.cc | 3,167,262,574,095,635,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-8941 | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size includ... | https://nvd.nist.gov/vuln/detail/CVE-2020-8941 |
195,787 | nDPI | 61066fb106efa6d3d95b67e47b662de208b2b622 | https://github.com/ntop/nDPI | https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622 | Added check for heap buffer overflow read | 1 | void ndpi_parse_packet_line_info(struct ndpi_detection_module_struct *ndpi_str, struct ndpi_flow_struct *flow) {
u_int32_t a;
struct ndpi_packet_struct *packet = &flow->packet;
if((packet->payload_packet_len < 3) || (packet->payload == NULL))
return;
if(packet->packet_lines_parsed_complete != 0)
retur... | 290,131,674,294,143,000,000,000,000,000,000,000,000 | ndpi_main.c | 313,082,086,761,718,160,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-15471 | In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-15471 |
233,272 | nDPI | 61066fb106efa6d3d95b67e47b662de208b2b622 | https://github.com/ntop/nDPI | https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622 | Added check for heap buffer overflow read | 0 | void ndpi_parse_packet_line_info(struct ndpi_detection_module_struct *ndpi_str, struct ndpi_flow_struct *flow) {
u_int32_t a;
struct ndpi_packet_struct *packet = &flow->packet;
if((packet->payload_packet_len < 3) || (packet->payload == NULL))
return;
if(packet->packet_lines_parsed_complete != 0)
retur... | 13,742,627,443,378,073,000,000,000,000,000,000,000 | ndpi_main.c | 15,742,709,859,397,380,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-15471 | In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-15471 |
195,791 | bfgminer | c80ad8548251eb0e15329fc240c89070640c9d79 | https://github.com/luke-jr/bfgminer | https://github.com/luke-jr/bfgminer/commit/c80ad8548251eb0e15329fc240c89070640c9d79 | Stratum: extract_sockaddr: Truncate overlong addresses rather than stack overflow
Thanks to Mick Ayzenberg <mick@dejavusecurity.com> for finding this! | 1 | bool extract_sockaddr(struct pool *pool, char *url)
{
char *url_begin, *url_end, *ipv6_begin, *ipv6_end, *port_start = NULL;
char url_address[256], port[6];
int url_len, port_len = 0;
url_begin = strstr(url, "//");
if (!url_begin)
url_begin = url;
else
url_begin += 2;
/* Look for numeric ipv6 entries */
i... | 241,738,802,868,952,140,000,000,000,000,000,000,000 | util.c | 42,076,426,286,321,793,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-4501 | Multiple stack-based buffer overflows in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 3.3.0 allow remote pool servers to have unspecified impact via a long URL in a client.reconnect stratum message to the (1) extract_sockaddr or (2) parse_reconnect functions in util.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-4501 |
233,569 | bfgminer | c80ad8548251eb0e15329fc240c89070640c9d79 | https://github.com/luke-jr/bfgminer | https://github.com/luke-jr/bfgminer/commit/c80ad8548251eb0e15329fc240c89070640c9d79 | Stratum: extract_sockaddr: Truncate overlong addresses rather than stack overflow
Thanks to Mick Ayzenberg <mick@dejavusecurity.com> for finding this! | 0 | bool extract_sockaddr(struct pool *pool, char *url)
{
char *url_begin, *url_end, *ipv6_begin, *ipv6_end, *port_start = NULL;
char url_address[256], port[6];
int url_len, port_len = 0;
url_begin = strstr(url, "//");
if (!url_begin)
url_begin = url;
else
url_begin += 2;
/* Look for numeric ipv6 entries */
i... | 38,747,426,849,797,766,000,000,000,000,000,000,000 | util.c | 122,106,294,667,611,740,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-4501 | Multiple stack-based buffer overflows in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 3.3.0 allow remote pool servers to have unspecified impact via a long URL in a client.reconnect stratum message to the (1) extract_sockaddr or (2) parse_reconnect functions in util.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-4501 |
195,802 | tensorflow | 33be22c65d86256e6826666662e40dbdfe70ee83 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83 | Prevent format string vulnerability in `tf.strings.as_string`.
The `printf` format specifier only allows `#`, `0`, `-`, `+` and space as flag characters. Others are interpreted as width/precision/length modifier or conversion specifiers. If a character does not fit into any of these sets `printf` just displays it.
Al... | 1 | explicit AsStringOp(OpKernelConstruction* ctx) : OpKernel(ctx) {
int32 precision;
bool scientific;
bool shortest;
int32 width;
string fill_string;
DataType dtype;
OP_REQUIRES_OK(ctx, ctx->GetAttr("T", &dtype));
OP_REQUIRES_OK(ctx, ctx->GetAttr("precision", &precision));
OP_REQUIRES... | 243,009,376,597,345,030,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2020-15203 | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issu... | https://nvd.nist.gov/vuln/detail/CVE-2020-15203 |
233,918 | tensorflow | 33be22c65d86256e6826666662e40dbdfe70ee83 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83 | Prevent format string vulnerability in `tf.strings.as_string`.
The `printf` format specifier only allows `#`, `0`, `-`, `+` and space as flag characters. Others are interpreted as width/precision/length modifier or conversion specifiers. If a character does not fit into any of these sets `printf` just displays it.
Al... | 0 | explicit AsStringOp(OpKernelConstruction* ctx) : OpKernel(ctx) {
int32 precision;
bool scientific;
bool shortest;
int32 width;
string fill_string;
DataType dtype;
OP_REQUIRES_OK(ctx, ctx->GetAttr("T", &dtype));
OP_REQUIRES_OK(ctx, ctx->GetAttr("precision", &precision));
OP_REQUIRES... | 254,538,744,777,016,200,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2020-15203 | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issu... | https://nvd.nist.gov/vuln/detail/CVE-2020-15203 |
195,803 | suricata | 9f0294fadca3dcc18c919424242a41e01f3e8318 | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/9f0294fadca3dcc18c919424242a41e01f3e8318 | stream: fix SYN_SENT RST/FIN injection
RST injection during the SYN_SENT state could trick Suricata into marking
a session as CLOSED. The way this was done is: using invalid TSECR value
in RST+ACK packet. The ACK was needed to force Linux into considering the
TSECR value and compare it to the TSVAL from the SYN packet... | 1 | static int StreamTcpPacketStateSynSent(ThreadVars *tv, Packet *p,
StreamTcpThread *stt, TcpSession *ssn, PacketQueue *pq)
{
if (ssn == NULL)
return -1;
SCLogDebug("ssn %p: pkt received: %s", ssn, PKT_IS_TOCLIENT(p) ?
"toclient":"toserver");
/* RST */
if (... | 132,276,836,917,259,370,000,000,000,000,000,000,000 | stream-tcp.c | 64,322,315,854,531,100,000,000,000,000,000,000,000 | [
"CWE-74"
] | CVE-2019-18625 | An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK pa... | https://nvd.nist.gov/vuln/detail/CVE-2019-18625 |
233,929 | suricata | 9f0294fadca3dcc18c919424242a41e01f3e8318 | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/9f0294fadca3dcc18c919424242a41e01f3e8318 | stream: fix SYN_SENT RST/FIN injection
RST injection during the SYN_SENT state could trick Suricata into marking
a session as CLOSED. The way this was done is: using invalid TSECR value
in RST+ACK packet. The ACK was needed to force Linux into considering the
TSECR value and compare it to the TSVAL from the SYN packet... | 0 | static int StreamTcpPacketStateSynSent(ThreadVars *tv, Packet *p,
StreamTcpThread *stt, TcpSession *ssn, PacketQueue *pq)
{
if (ssn == NULL)
return -1;
SCLogDebug("ssn %p: pkt received: %s", ssn, PKT_IS_TOCLIENT(p) ?
"toclient":"toserver");
/* check for bad r... | 43,714,262,139,516,210,000,000,000,000,000,000,000 | stream-tcp.c | 311,441,045,090,367,700,000,000,000,000,000,000,000 | [
"CWE-74"
] | CVE-2019-18625 | An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK pa... | https://nvd.nist.gov/vuln/detail/CVE-2019-18625 |
195,812 | wolfssl | 23878512c65834d12811b1107d19a001478eca5d | https://github.com/wolfSSL/wolfssl | https://github.com/wolfSSL/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d | Change signature generation to verify by default | 1 | int wc_SignatureGenerateHash(
enum wc_HashType hash_type, enum wc_SignatureType sig_type,
const byte* hash_data, word32 hash_len,
byte* sig, word32 *sig_len,
const void* key, word32 key_len, WC_RNG* rng)
{
int ret;
/* Suppress possible unused arg if all signature types are disabled */
(void... | 71,377,739,331,289,540,000,000,000,000,000,000,000 | signature.c | 315,118,741,825,853,080,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-19962 | wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography. | https://nvd.nist.gov/vuln/detail/CVE-2019-19962 |
233,972 | wolfssl | 23878512c65834d12811b1107d19a001478eca5d | https://github.com/wolfSSL/wolfssl | https://github.com/wolfSSL/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d | Change signature generation to verify by default | 0 | int wc_SignatureGenerateHash_ex(
enum wc_HashType hash_type, enum wc_SignatureType sig_type,
const byte* hash_data, word32 hash_len,
byte* sig, word32 *sig_len,
const void* key, word32 key_len, WC_RNG* rng, int verify)
{
int ret;
/* Suppress possible unused arg if all signature types are disabl... | 197,972,866,141,619,200,000,000,000,000,000,000,000 | signature.c | 107,892,772,942,291,660,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-19962 | wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography. | https://nvd.nist.gov/vuln/detail/CVE-2019-19962 |
195,817 | ImageMagick | d9a8234d211da30baf9526fbebe9a8438ea7e11c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d9a8234d211da30baf9526fbebe9a8438ea7e11c | https://github.com/ImageMagick/ImageMagick/issues/712 | 1 | static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
name[MagickPathExtent];
Image
*image;
MagickBooleanType
status;
register ssize_t
i,
x;
register Quantum
*q;
register unsigned char
*p;
short int
hex_d... | 126,746,378,143,995,860,000,000,000,000,000,000,000 | xbm.c | 212,881,994,908,310,860,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-14175 | In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consum... | https://nvd.nist.gov/vuln/detail/CVE-2017-14175 |
234,027 | ImageMagick | d9a8234d211da30baf9526fbebe9a8438ea7e11c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d9a8234d211da30baf9526fbebe9a8438ea7e11c | https://github.com/ImageMagick/ImageMagick/issues/712 | 0 | static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
name[MagickPathExtent];
Image
*image;
int
c;
MagickBooleanType
status;
register ssize_t
i,
x;
register Quantum
*q;
register unsigned char
*p;
short... | 94,041,080,862,089,880,000,000,000,000,000,000,000 | xbm.c | 169,463,213,136,454,080,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-14175 | In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consum... | https://nvd.nist.gov/vuln/detail/CVE-2017-14175 |
195,818 | ImageMagick | f0232a2a45dfd003c1faf6079497895df3ab0ee1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f0232a2a45dfd003c1faf6079497895df3ab0ee1 | Fixed incorrect call to WriteBlob reported in #490. | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 218,465,767,313,382,300,000,000,000,000,000,000,000 | png.c | 14,607,067,448,821,954,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-9142 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9142 |
60,043 | ImageMagick | 8ca35831e91c3db8c6d281d09b605001003bec08 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08 | coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference
https://github.com/ImageMagick/ImageMagick/issues/517). | 0 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 254,511,850,915,179,300,000,000,000,000,000,000,000 | png.c | 133,390,610,587,338,430,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11310 | The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files. | https://nvd.nist.gov/vuln/detail/CVE-2017-11310 |
195,825 | tensorflow | ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412 | Prevent array OOB read/write
PiperOrigin-RevId: 371026165
Change-Id: I26ac6372c87246e03c7eb8c94e84c84d86054b36 | 1 | TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node,
const TfLiteTensor* input,
const TfLiteTensor* size_splits,
const TfLiteTensor* axis) {
int axis_value = GetTensorData<int>(axis)[0];
if (axis... | 240,977,795,944,225,060,000,000,000,000,000,000,000 | split_v.cc | 118,714,096,309,212,030,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-29606 | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_val... | https://nvd.nist.gov/vuln/detail/CVE-2021-29606 |
234,264 | tensorflow | ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412 | Prevent array OOB read/write
PiperOrigin-RevId: 371026165
Change-Id: I26ac6372c87246e03c7eb8c94e84c84d86054b36 | 0 | TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node,
const TfLiteTensor* input,
const TfLiteTensor* size_splits,
const TfLiteTensor* axis) {
int axis_value = GetTensorData<int>(axis)[0];
if (axis... | 120,880,467,925,626,180,000,000,000,000,000,000,000 | split_v.cc | 161,041,721,655,361,370,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-29606 | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_val... | https://nvd.nist.gov/vuln/detail/CVE-2021-29606 |
195,826 | detect-character-encoding | 992a11007fff6cfd40b952150ab8d30410c4a20a | https://github.com/sonicdoe/detect-character-encoding | https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a | Return null if no charset matches
Fixes a segmentation fault if no charset matches. According to http://icu-project.org/apiref/icu4c/ucsdet_8h.html#aff2633b5055d472cff4108d94f97cf7d, ucsdet_detect() may return NULL if no charset matches.
Fixes: #15
Co-authored-by: chenzhip <letme2010@gmail.com> | 1 | NAN_METHOD(DetectCharacterEncoding) {
Nan::HandleScope scope;
v8::Local<v8::Object> inputBuffer = info[0]->ToObject();
UCharsetDetector *charsetDetector;
const UCharsetMatch *charsetMatch;
UErrorCode errorCode = U_ZERO_ERROR;
charsetDetector = ucsdet_open(&errorCode);
if(U_FAILURE(errorCode)) {
Nan::ThrowE... | 68,592,644,305,386,580,000,000,000,000,000,000,000 | icuWrapper.cpp | 35,599,923,964,401,176,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2021-39157 | detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/relea... | https://nvd.nist.gov/vuln/detail/CVE-2021-39157 |
234,269 | detect-character-encoding | 992a11007fff6cfd40b952150ab8d30410c4a20a | https://github.com/sonicdoe/detect-character-encoding | https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a | Return null if no charset matches
Fixes a segmentation fault if no charset matches. According to http://icu-project.org/apiref/icu4c/ucsdet_8h.html#aff2633b5055d472cff4108d94f97cf7d, ucsdet_detect() may return NULL if no charset matches.
Fixes: #15
Co-authored-by: chenzhip <letme2010@gmail.com> | 0 | NAN_METHOD(DetectCharacterEncoding) {
Nan::HandleScope scope;
v8::Local<v8::Object> inputBuffer = info[0]->ToObject();
UCharsetDetector *charsetDetector;
const UCharsetMatch *charsetMatch;
UErrorCode errorCode = U_ZERO_ERROR;
charsetDetector = ucsdet_open(&errorCode);
if(U_FAILURE(errorCode)) {
Nan::ThrowE... | 182,079,526,297,611,250,000,000,000,000,000,000,000 | icuWrapper.cpp | 94,823,889,412,320,650,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2021-39157 | detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/relea... | https://nvd.nist.gov/vuln/detail/CVE-2021-39157 |
195,912 | wangle | 5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6 | https://github.com/facebook/wangle | https://github.com/facebook/wangle/commit/5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6 | Peek for \n in LineBasedFrameDecoder.
Summary:
Previously this could underflow if there was not a following \n.
CVE-2019-3563
Reviewed By: siyengar
Differential Revision: D14935715
fbshipit-source-id: 25c3eecf373f89efa1232456aeeb092f13b7fa06 | 1 | int64_t LineBasedFrameDecoder::findEndOfLine(IOBufQueue& buf) {
Cursor c(buf.front());
for (uint32_t i = 0; i < maxLength_ && i < buf.chainLength(); i++) {
auto b = c.read<char>();
if (b == '\n' && terminatorType_ != TerminatorType::CARRIAGENEWLINE) {
return i;
} else if (terminatorType_ != Termin... | 7,559,219,273,500,247,000,000,000,000,000,000,000 | LineBasedFrameDecoder.cpp | 48,038,939,344,336,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-3563 | Wangle's LineBasedFrameDecoder contains logic for identifying newlines which incorrectly advances a buffer, leading to a potential underflow. This affects versions of Wangle prior to v2019.04.22.00 | https://nvd.nist.gov/vuln/detail/CVE-2019-3563 |
234,901 | wangle | 5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6 | https://github.com/facebook/wangle | https://github.com/facebook/wangle/commit/5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6 | Peek for \n in LineBasedFrameDecoder.
Summary:
Previously this could underflow if there was not a following \n.
CVE-2019-3563
Reviewed By: siyengar
Differential Revision: D14935715
fbshipit-source-id: 25c3eecf373f89efa1232456aeeb092f13b7fa06 | 0 | int64_t LineBasedFrameDecoder::findEndOfLine(IOBufQueue& buf) {
Cursor c(buf.front());
for (uint32_t i = 0; i < maxLength_ && i < buf.chainLength(); i++) {
auto b = c.read<char>();
if (b == '\n' && terminatorType_ != TerminatorType::CARRIAGENEWLINE) {
return i;
} else if (
terminatorType_ ... | 182,763,480,115,366,970,000,000,000,000,000,000,000 | LineBasedFrameDecoder.cpp | 14,946,006,717,307,908,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-3563 | Wangle's LineBasedFrameDecoder contains logic for identifying newlines which incorrectly advances a buffer, leading to a potential underflow. This affects versions of Wangle prior to v2019.04.22.00 | https://nvd.nist.gov/vuln/detail/CVE-2019-3563 |
195,916 | sfntly | c56b85408bab232efd7e650f0994272a174e3b92 | https://github.com/googlei18n/sfntly | https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 | Add a bounds check to ByteArray::Get(). | 1 | int32_t ByteArray::Get(int32_t index) {
return InternalGet(index) & 0xff;
} | 67,678,066,191,927,460,000,000,000,000,000,000,000 | byte_array.cc | 294,475,653,167,790,770,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-1709 | Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font. | https://nvd.nist.gov/vuln/detail/CVE-2016-1709 |
235,140 | sfntly | c56b85408bab232efd7e650f0994272a174e3b92 | https://github.com/googlei18n/sfntly | https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92 | Add a bounds check to ByteArray::Get(). | 0 | int32_t ByteArray::Get(int32_t index) {
if (index < 0 || index >= Length())
return -1;
return InternalGet(index) & 0xff;
} | 14,287,791,023,644,650,000,000,000,000,000,000,000 | byte_array.cc | 301,186,539,677,861,300,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-1709 | Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font. | https://nvd.nist.gov/vuln/detail/CVE-2016-1709 |
195,941 | cpp-peglib | 0061f393de54cf0326621c079dc2988336d1ebb3 | https://github.com/yhirose/cpp-peglib | https://github.com/yhirose/cpp-peglib/commit/0061f393de54cf0326621c079dc2988336d1ebb3 | Fix #121 | 1 | std::shared_ptr<Grammar> perform_core(const char *s, size_t n,
const Rules &rules, std::string &start,
Log log) {
Data data;
any dt = &data;
auto r = g["Grammar"].parse(s, n, dt);
if (!r.ret) {
if (log) {
if... | 172,756,209,645,119,500,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2020-23914 | An issue was discovered in cpp-peglib through v0.1.12. A NULL pointer dereference exists in the peg::AstOptimizer::optimize() located in peglib.h. It allows an attacker to cause Denial of Service. | https://nvd.nist.gov/vuln/detail/CVE-2020-23914 |
235,632 | cpp-peglib | 0061f393de54cf0326621c079dc2988336d1ebb3 | https://github.com/yhirose/cpp-peglib | https://github.com/yhirose/cpp-peglib/commit/0061f393de54cf0326621c079dc2988336d1ebb3 | Fix #121 | 0 | std::shared_ptr<Grammar> perform_core(const char *s, size_t n,
const Rules &rules, std::string &start,
Log log) {
Data data;
any dt = &data;
auto r = g["Grammar"].parse(s, n, dt);
if (!r.ret) {
if (log) {
if... | 321,311,870,582,880,580,000,000,000,000,000,000,000 | peglib.h | 168,591,356,101,478,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-23914 | An issue was discovered in cpp-peglib through v0.1.12. A NULL pointer dereference exists in the peg::AstOptimizer::optimize() located in peglib.h. It allows an attacker to cause Denial of Service. | https://nvd.nist.gov/vuln/detail/CVE-2020-23914 |
195,956 | ImageMagick | d5559407ce29f4371e5df9c1cbde65455fe5854c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c | https://github.com/ImageMagick/ImageMagick/issues/572 | 1 | static MagickBooleanType WriteINLINEImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
char
*base64,
message[MagickPathExtent];
const MagickInfo
*magick_info;
Image
*write_image;
ImageInfo
*write_info;
MagickBooleanType
status;
size_t
blob_length,
... | 151,006,512,755,735,200,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2017-12666 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteINLINEImage in coders/inline.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12666 |
235,657 | ImageMagick | d5559407ce29f4371e5df9c1cbde65455fe5854c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c | https://github.com/ImageMagick/ImageMagick/issues/572 | 0 | static MagickBooleanType WriteINLINEImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
char
*base64,
message[MagickPathExtent];
const MagickInfo
*magick_info;
Image
*write_image;
ImageInfo
*write_info;
MagickBooleanType
status;
size_t
blob_length,
... | 207,271,106,348,869,930,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2017-12666 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteINLINEImage in coders/inline.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12666 |
195,957 | qemu | 4f1c6cb2f9afafda05eab150fd2bd284edce6676 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676 | hw/core/loader: Fix possible crash in rom_copy()
Both, "rom->addr" and "addr" are derived from the binary image
that can be loaded with the "-kernel" paramer. The code in
rom_copy() then calculates:
d = dest + (rom->addr - addr);
and uses "d" as destination in a memcpy() some lines later. Now with
bad kernel ima... | 1 | int rom_copy(uint8_t *dest, hwaddr addr, size_t size)
{
hwaddr end = addr + size;
uint8_t *s, *d = dest;
size_t l = 0;
Rom *rom;
QTAILQ_FOREACH(rom, &roms, next) {
if (rom->fw_file) {
continue;
}
if (rom->mr) {
continue;
}
if (rom->add... | 9,853,742,337,349,726,000,000,000,000,000,000,000 | loader.c | 192,373,255,711,382,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-13765 | rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation. | https://nvd.nist.gov/vuln/detail/CVE-2020-13765 |
235,681 | qemu | 4f1c6cb2f9afafda05eab150fd2bd284edce6676 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676 | hw/core/loader: Fix possible crash in rom_copy()
Both, "rom->addr" and "addr" are derived from the binary image
that can be loaded with the "-kernel" paramer. The code in
rom_copy() then calculates:
d = dest + (rom->addr - addr);
and uses "d" as destination in a memcpy() some lines later. Now with
bad kernel ima... | 0 | int rom_copy(uint8_t *dest, hwaddr addr, size_t size)
{
hwaddr end = addr + size;
uint8_t *s, *d = dest;
size_t l = 0;
Rom *rom;
QTAILQ_FOREACH(rom, &roms, next) {
if (rom->fw_file) {
continue;
}
if (rom->mr) {
continue;
}
if (rom->add... | 231,085,536,918,406,050,000,000,000,000,000,000,000 | loader.c | 36,097,717,211,958,270,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-13765 | rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation. | https://nvd.nist.gov/vuln/detail/CVE-2020-13765 |
195,960 | Bento4 | 4d3f0bebd5f8518fd775f671c12bea58c68e814e | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e | fixed possible crashes on malformed inputs. | 1 | AP4_Processor::Process(AP4_ByteStream& input,
AP4_ByteStream& output,
AP4_ByteStream* fragments,
ProgressListener* listener,
AP4_AtomFactory& atom_factory)
{
// read all atoms.
// keep all atoms except [mdat]
... | 145,752,004,308,763,700,000,000,000,000,000,000,000 | Ap4Processor.cpp | 154,465,198,806,954,940,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12476 | The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12476 |
235,736 | Bento4 | 4d3f0bebd5f8518fd775f671c12bea58c68e814e | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e | fixed possible crashes on malformed inputs. | 0 | AP4_Processor::Process(AP4_ByteStream& input,
AP4_ByteStream& output,
AP4_ByteStream* fragments,
ProgressListener* listener,
AP4_AtomFactory& atom_factory)
{
// read all atoms.
// keep all atoms except [mdat]
... | 266,736,834,593,454,420,000,000,000,000,000,000,000 | Ap4Processor.cpp | 2,271,093,154,568,076,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12476 | The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12476 |
195,961 | Bento4 | 4d3f0bebd5f8518fd775f671c12bea58c68e814e | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e | fixed possible crashes on malformed inputs. | 1 | AP4_AvccAtom::InspectFields(AP4_AtomInspector& inspector)
{
inspector.AddField("Configuration Version", m_ConfigurationVersion);
const char* profile_name = GetProfileName(m_Profile);
if (profile_name) {
inspector.AddField("Profile", profile_name);
} else {
inspector.AddField("Profile", m... | 174,541,416,060,620,020,000,000,000,000,000,000,000 | Ap4AvccAtom.cpp | 65,032,902,554,530,120,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12476 | The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12476 |
235,746 | Bento4 | 4d3f0bebd5f8518fd775f671c12bea58c68e814e | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e | fixed possible crashes on malformed inputs. | 0 | AP4_AvccAtom::InspectFields(AP4_AtomInspector& inspector)
{
inspector.AddField("Configuration Version", m_ConfigurationVersion);
const char* profile_name = GetProfileName(m_Profile);
if (profile_name) {
inspector.AddField("Profile", profile_name);
} else {
inspector.AddField("Profile", m... | 213,566,481,025,774,200,000,000,000,000,000,000,000 | Ap4AvccAtom.cpp | 26,725,286,725,359,955,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12476 | The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12476 |
195,983 | tensorflow | 6972f9dfe325636b3db4e0bc517ee22a159365c0 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0 | Add missing valuidation to FusedBatchNorm.
PiperOrigin-RevId: 372460336
Change-Id: Ic8c4e4de67c58a741bd87f2e182bed07247d1126 | 1 | virtual void ComputeWithReservedSpace(OpKernelContext* context,
bool use_reserved_space) {
Tensor x = context->input(0);
const Tensor& scale = context->input(1);
const Tensor& offset = context->input(2);
const Tensor& estimated_mean = context->input(3);
cons... | 66,340,177,584,073,390,000,000,000,000,000,000,000 | fused_batch_norm_op.cc | 325,719,922,759,190,770,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29583 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow. If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers. The implementation(https://github.com/tensorf... | https://nvd.nist.gov/vuln/detail/CVE-2021-29583 |
236,108 | tensorflow | 6972f9dfe325636b3db4e0bc517ee22a159365c0 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0 | Add missing valuidation to FusedBatchNorm.
PiperOrigin-RevId: 372460336
Change-Id: Ic8c4e4de67c58a741bd87f2e182bed07247d1126 | 0 | virtual void ComputeWithReservedSpace(OpKernelContext* context,
bool use_reserved_space) {
Tensor x = context->input(0);
const Tensor& scale = context->input(1);
const Tensor& offset = context->input(2);
const Tensor& estimated_mean = context->input(3);
cons... | 19,416,726,105,322,845,000,000,000,000,000,000,000 | fused_batch_norm_op.cc | 315,185,939,329,327,040,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29583 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow. If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers. The implementation(https://github.com/tensorf... | https://nvd.nist.gov/vuln/detail/CVE-2021-29583 |
195,987 | libdwarf-code | 8151575a6ace77d005ca5bb5d71c1bfdba3f7069 | https://github.com/davea42/libdwarf-code | https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069 | Fixes vulnerability DW202205-001
Reports error instead of crashing the when reading
a specially crafted (corrupted) .debug_pubnames
or .debug_pubtypes section.
modified: src/lib/libdwarf/dwarf_global.c | 1 | _dwarf_internal_get_pubnames_like_data(Dwarf_Debug dbg,
const char *secname,
Dwarf_Small * section_data_ptr,
Dwarf_Unsigned section_length,
Dwarf_Global ** globals,
Dwarf_Signed * return_count,
Dwarf_Error * error,
int context_DLA_code,
int global_DLA_code,
int length_err_num,
in... | 157,104,169,876,880,900,000,000,000,000,000,000,000 | dwarf_global.c | 160,524,441,026,175,030,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-32200 | libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-32200 |
236,252 | libdwarf-code | 8151575a6ace77d005ca5bb5d71c1bfdba3f7069 | https://github.com/davea42/libdwarf-code | https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069 | Fixes vulnerability DW202205-001
Reports error instead of crashing the when reading
a specially crafted (corrupted) .debug_pubnames
or .debug_pubtypes section.
modified: src/lib/libdwarf/dwarf_global.c | 0 | _dwarf_internal_get_pubnames_like_data(Dwarf_Debug dbg,
const char *secname,
Dwarf_Small * section_data_ptr,
Dwarf_Unsigned section_length,
Dwarf_Global ** globals,
Dwarf_Signed * return_count,
Dwarf_Error * error,
int context_DLA_code,
int global_DLA_code,
int length_err_num,
in... | 5,468,163,685,543,887,000,000,000,000,000,000,000 | dwarf_global.c | 180,943,935,883,829,040,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-32200 | libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-32200 |
195,999 | tensorflow | d6b57f461b39fd1aa8c1b870f1b974aac3554955 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955 | Prevent nullptr dereference in MLIR TFLite dialect/optimizer.
PiperOrigin-RevId: 387220762
Change-Id: Id136ef04bb3d36123b4685d316ae81a9ec924d6b | 1 | bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) {
if (sq_op.getType().cast<ShapedType>().getRank() - 1 ==
*axis.getValues<int>().begin() ||
*axis.getValues<int>().begin() == -1) {
return true;
}
if (sq_op.getType().cast<ShapedType>().getRank() != axis.getNumElements()) {
re... | 126,359,880,382,894,470,000,000,000,000,000,000,000 | optimize.cc | 312,164,065,414,284,080,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-37689 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implement... | https://nvd.nist.gov/vuln/detail/CVE-2021-37689 |
236,413 | tensorflow | d6b57f461b39fd1aa8c1b870f1b974aac3554955 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955 | Prevent nullptr dereference in MLIR TFLite dialect/optimizer.
PiperOrigin-RevId: 387220762
Change-Id: Id136ef04bb3d36123b4685d316ae81a9ec924d6b | 0 | bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) {
if (axis.getNumElements() == 0) {
return false;
}
if (sq_op.getType().cast<ShapedType>().getRank() - 1 ==
*axis.getValues<int>().begin() ||
*axis.getValues<int>().begin() == -1) {
return true;
}
if (sq_op.getType().cast<... | 300,281,697,952,747,500,000,000,000,000,000,000,000 | optimize.cc | 256,323,957,113,985,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-37689 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implement... | https://nvd.nist.gov/vuln/detail/CVE-2021-37689 |
196,263 | fmt | 8cf30aa2be256eba07bb1cefb998c52326e846e7 | https://github.com/fmtlib/fmt | https://github.com/fmtlib/fmt/commit/8cf30aa2be256eba07bb1cefb998c52326e846e7 | Fix segfault on complex pointer formatting (#642) | 1 | BasicWriter<Char>::prepare_int_buffer(
unsigned num_digits, const Spec &spec,
const char *prefix, unsigned prefix_size) {
unsigned width = spec.width();
Alignment align = spec.align();
Char fill = internal::CharTraits<Char>::cast(spec.fill());
if (spec.precision() > static_cast<int>(num_digits)) {
... | 5,956,982,953,693,642,000,000,000,000,000,000,000 | format.h | 137,266,836,299,752,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-1000052 | fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000052 |
237,531 | fmt | 8cf30aa2be256eba07bb1cefb998c52326e846e7 | https://github.com/fmtlib/fmt | https://github.com/fmtlib/fmt/commit/8cf30aa2be256eba07bb1cefb998c52326e846e7 | Fix segfault on complex pointer formatting (#642) | 0 | BasicWriter<Char>::prepare_int_buffer(
unsigned num_digits, const Spec &spec,
const char *prefix, unsigned prefix_size) {
unsigned width = spec.width();
Alignment align = spec.align();
Char fill = internal::CharTraits<Char>::cast(spec.fill());
if (spec.precision() > static_cast<int>(num_digits)) {
... | 5,619,543,278,846,389,000,000,000,000,000,000,000 | format.h | 338,498,615,030,644,670,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-1000052 | fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000052 |
196,265 | tensorflow | 6d36ba65577006affb272335b7c1abd829010708 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708 | Prevent division by 0
PiperOrigin-RevId: 370984990
Change-Id: Ib324955bbeb1cbd97c82fd5d61a00a2697c9a2de | 1 | TfLiteStatus ResizeOutputTensor(TfLiteContext* context,
SpaceToBatchNDContext* op_context) {
TfLiteIntArray* input_size = op_context->input->dims;
const int32* block_shape = GetTensorData<int32>(op_context->block_shape);
const int32* paddings_data = GetTensorData<int32>(op_context-... | 244,203,462,885,213,770,000,000,000,000,000,000,000 | space_to_batch_nd.cc | 76,053,121,648,330,480,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29597 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83). An a... | https://nvd.nist.gov/vuln/detail/CVE-2021-29597 |
237,663 | tensorflow | 6d36ba65577006affb272335b7c1abd829010708 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708 | Prevent division by 0
PiperOrigin-RevId: 370984990
Change-Id: Ib324955bbeb1cbd97c82fd5d61a00a2697c9a2de | 0 | TfLiteStatus ResizeOutputTensor(TfLiteContext* context,
SpaceToBatchNDContext* op_context) {
TfLiteIntArray* input_size = op_context->input->dims;
const int32* block_shape = GetTensorData<int32>(op_context->block_shape);
const int32* paddings_data = GetTensorData<int32>(op_context-... | 331,699,575,458,146,160,000,000,000,000,000,000,000 | space_to_batch_nd.cc | 150,993,650,108,506,900,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29597 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83). An a... | https://nvd.nist.gov/vuln/detail/CVE-2021-29597 |
196,268 | mintty | bd52109993440b6996760aaccb66e68e782762b9 | https://github.com/mintty/mintty | https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9 | tame some window operations, just in case | 1 | do_winop(void)
{
int arg1 = term.csi_argv[1], arg2 = term.csi_argv[2];
if (*cfg.suppress_win && contains(cfg.suppress_win, term.csi_argv[0]))
// skip suppressed window operation
return;
switch (term.csi_argv[0]) {
when 1: win_set_iconic(false);
when 2: win_set_iconic(true);
when 3: win_set_pos... | 9,542,499,771,721,612,000,000,000,000,000,000,000 | termout.c | 116,609,680,721,553,560,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-28848 | Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title chang... | https://nvd.nist.gov/vuln/detail/CVE-2021-28848 |
237,732 | mintty | bd52109993440b6996760aaccb66e68e782762b9 | https://github.com/mintty/mintty | https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9 | tame some window operations, just in case | 0 | do_winop(void)
{
int arg1 = term.csi_argv[1], arg2 = term.csi_argv[2];
if (*cfg.suppress_win && contains(cfg.suppress_win, term.csi_argv[0]))
// skip suppressed window operation
return;
switch (term.csi_argv[0]) {
when 1: win_set_iconic(false);
when 2: win_set_iconic(true);
when 3: win_set_pos... | 174,904,579,461,277,760,000,000,000,000,000,000,000 | termout.c | 25,680,163,971,220,390,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-28848 | Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title chang... | https://nvd.nist.gov/vuln/detail/CVE-2021-28848 |
196,272 | Pillow | 6dcbf5bd96b717c58d7b642949da8d323099928e | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e | Fix for buffer overflow in TiffDecode.c CVE-2016-0740 | 1 | int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) {
TIFFSTATE *clientstate = (TIFFSTATE *)state->context;
char *filename = "tempfile.tif";
char *mode = "r";
TIFF *tiff;
int size;
/* buffer is the encoded file, bytes is the length of the encoded file */
/* it all ends up i... | 226,805,016,077,354,560,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-0740 | Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-0740 |
237,812 | Pillow | 6dcbf5bd96b717c58d7b642949da8d323099928e | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e | Fix for buffer overflow in TiffDecode.c CVE-2016-0740 | 0 | int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) {
TIFFSTATE *clientstate = (TIFFSTATE *)state->context;
char *filename = "tempfile.tif";
char *mode = "r";
TIFF *tiff;
tsize_t size;
/* buffer is the encoded file, bytes is the length of the encoded file */
/* it all ends ... | 64,629,344,350,316,830,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-0740 | Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-0740 |
196,279 | linux | 26bef1318adc1b3a530ecc807ef99346db2aa8b0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0 | x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround
Before we do an EMMS in the AMD FXSAVE information leak workaround we
need to clear any pending exceptions, otherwise we trap with a
floating-point exception inside this code.
Reported-by: halfdog <me@halfdog.net>
Tested-by: Borislav Petkov <bp@suse.de>
Link: h... | 1 | static inline int restore_fpu_checking(struct task_struct *tsk)
{
/* AMD K7/K8 CPUs don't save/restore FDP/FIP/FOP unless an exception
is pending. Clear the x87 state here by setting it to fixed
values. "m" is a random variable that should be in L1 */
alternative_input(
ASM_NOP8 ASM_NOP2,
"emms\n\t" /* ... | 160,911,480,057,649,970,000,000,000,000,000,000,000 | fpu-internal.h | 62,303,957,108,102,540,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2014-1438 | The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafte... | https://nvd.nist.gov/vuln/detail/CVE-2014-1438 |
237,938 | linux | 26bef1318adc1b3a530ecc807ef99346db2aa8b0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0 | x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround
Before we do an EMMS in the AMD FXSAVE information leak workaround we
need to clear any pending exceptions, otherwise we trap with a
floating-point exception inside this code.
Reported-by: halfdog <me@halfdog.net>
Tested-by: Borislav Petkov <bp@suse.de>
Link: h... | 0 | static inline int restore_fpu_checking(struct task_struct *tsk)
{
/* AMD K7/K8 CPUs don't save/restore FDP/FIP/FOP unless an exception
is pending. Clear the x87 state here by setting it to fixed
values. "m" is a random variable that should be in L1 */
if (unlikely(static_cpu_has(X86_FEATURE_FXSAVE_LEAK))) {
... | 249,642,903,586,033,050,000,000,000,000,000,000,000 | fpu-internal.h | 281,986,845,786,766,870,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2014-1438 | The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafte... | https://nvd.nist.gov/vuln/detail/CVE-2014-1438 |
196,290 | znc | a7bfbd93812950b7444841431e8e297e62cb524e | https://github.com/znc/znc | https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e | Don't let attackers inject rogue values into znc.conf
Because of this vulnerability, existing ZNC users could get Admin
permissions.
Thanks for Jeriko One <jeriko.one@gmx.us> for finding and reporting this. | 1 | void CConfig::Write(CFile& File, unsigned int iIndentation) {
CString sIndentation = CString(iIndentation, '\t');
for (const auto& it : m_ConfigEntries) {
for (const CString& sValue : it.second) {
File.Write(sIndentation + it.first + " = " + sValue + "\n");
}
}
for (const a... | 161,401,620,008,865,480,000,000,000,000,000,000,000 | Config.cpp | 73,135,015,563,394,670,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-14055 | ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf. | https://nvd.nist.gov/vuln/detail/CVE-2018-14055 |
238,153 | znc | a7bfbd93812950b7444841431e8e297e62cb524e | https://github.com/znc/znc | https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e | Don't let attackers inject rogue values into znc.conf
Because of this vulnerability, existing ZNC users could get Admin
permissions.
Thanks for Jeriko One <jeriko.one@gmx.us> for finding and reporting this. | 0 | void CConfig::Write(CFile& File, unsigned int iIndentation) {
CString sIndentation = CString(iIndentation, '\t');
auto SingleLine = [](const CString& s) {
return s.Replace_n("\r", "").Replace_n("\n", "");
};
for (const auto& it : m_ConfigEntries) {
for (const CString& sValue : it.secon... | 173,350,986,155,571,800,000,000,000,000,000,000,000 | Config.cpp | 41,795,347,238,739,115,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-14055 | ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf. | https://nvd.nist.gov/vuln/detail/CVE-2018-14055 |
196,313 | ImageMagick | 0417cea1b6d72f90bd4f1f573f91e42a8ba66a89 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89 | https://github.com/ImageMagick/ImageMagick/issues/574 | 1 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelInfo
transpix;
QuantizeInfo
*quantize_info;
register ssize_t
x... | 171,216,561,167,147,580,000,000,000,000,000,000,000 | palm.c | 118,888,611,678,143,520,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12664 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12664 |
238,197 | ImageMagick | 0417cea1b6d72f90bd4f1f573f91e42a8ba66a89 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89 | https://github.com/ImageMagick/ImageMagick/issues/574 | 0 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelInfo
transpix;
QuantizeInfo
*quantize_info;
register ssize_t
x... | 146,232,625,343,954,790,000,000,000,000,000,000,000 | palm.c | 65,510,581,705,344,600,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12664 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12664 |
196,314 | nanopb | 45582f1f97f49e2abfdba1463d1e1027682d9856 | https://github.com/nanopb/nanopb | https://github.com/nanopb/nanopb/commit/45582f1f97f49e2abfdba1463d1e1027682d9856 | Fix invalid free() after failed realloc() (GHSA-gcx3-7m76-287p) | 1 | static bool checkreturn decode_pointer_field(pb_istream_t *stream, pb_wire_type_t wire_type, pb_field_iter_t *field)
{
#ifndef PB_ENABLE_MALLOC
PB_UNUSED(wire_type);
PB_UNUSED(field);
PB_RETURN_ERROR(stream, "no malloc support");
#else
switch (PB_HTYPE(field->type))
{
case PB_HTYPE_REQUIRED:... | 78,676,253,641,844,470,000,000,000,000,000,000,000 | pb_decode.c | 43,723,406,899,528,080,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-5235 | There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a repeated string, bytes or message field and realloc() runs out of memory when expanding the array nanopb can end up calling `free()... | https://nvd.nist.gov/vuln/detail/CVE-2020-5235 |
238,240 | nanopb | 45582f1f97f49e2abfdba1463d1e1027682d9856 | https://github.com/nanopb/nanopb | https://github.com/nanopb/nanopb/commit/45582f1f97f49e2abfdba1463d1e1027682d9856 | Fix invalid free() after failed realloc() (GHSA-gcx3-7m76-287p) | 0 | static bool checkreturn decode_pointer_field(pb_istream_t *stream, pb_wire_type_t wire_type, pb_field_iter_t *field)
{
#ifndef PB_ENABLE_MALLOC
PB_UNUSED(wire_type);
PB_UNUSED(field);
PB_RETURN_ERROR(stream, "no malloc support");
#else
switch (PB_HTYPE(field->type))
{
case PB_HTYPE_REQUIRED:... | 86,835,937,515,518,390,000,000,000,000,000,000,000 | pb_decode.c | 48,108,367,603,645,790,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-5235 | There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a repeated string, bytes or message field and realloc() runs out of memory when expanding the array nanopb can end up calling `free()... | https://nvd.nist.gov/vuln/detail/CVE-2020-5235 |
196,315 | gpac | 6170024568f4dda310e98ef7508477b425c58d09 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09 | fixed potential crash - cf #1263 | 1 | GF_Err ilst_item_box_read(GF_Box *s,GF_BitStream *bs)
{
GF_Err e;
u32 sub_type;
GF_Box *a = NULL;
GF_ListItemBox *ptr = (GF_ListItemBox *)s;
/*iTunes way: there's a data atom containing the data*/
sub_type = gf_bs_peek_bits(bs, 32, 4);
if (sub_type == GF_ISOM_BOX_TYPE_DATA ) {
e = gf_isom_box_parse(&a, bs);
... | 146,852,552,995,497,060,000,000,000,000,000,000,000 | box_code_apple.c | 240,252,095,245,784,050,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-19488 | An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read. | https://nvd.nist.gov/vuln/detail/CVE-2020-19488 |
238,309 | gpac | 6170024568f4dda310e98ef7508477b425c58d09 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09 | fixed potential crash - cf #1263 | 0 | GF_Err ilst_item_box_read(GF_Box *s,GF_BitStream *bs)
{
GF_Err e;
u32 sub_type;
GF_Box *a = NULL;
GF_ListItemBox *ptr = (GF_ListItemBox *)s;
/*iTunes way: there's a data atom containing the data*/
sub_type = gf_bs_peek_bits(bs, 32, 4);
if (sub_type == GF_ISOM_BOX_TYPE_DATA ) {
e = gf_isom_box_parse(&a, bs);
... | 70,304,557,597,998,670,000,000,000,000,000,000,000 | box_code_apple.c | 157,238,358,621,492,020,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-19488 | An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read. | https://nvd.nist.gov/vuln/detail/CVE-2020-19488 |
196,577 | neomutt | 57971dba06346b2d7179294f4528b8d4427a7c5d | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d | Selectively cache headers
Co-authored-by: JerikoOne <jeriko.one@gmx.us> | 1 | header_cache_t *imap_hcache_open(struct ImapData *idata, const char *path)
{
struct ImapMbox mx;
struct Url url;
char cachepath[PATH_MAX];
char mbox[PATH_MAX];
if (path)
imap_cachepath(idata, path, mbox, sizeof(mbox));
else
{
if (!idata->ctx || imap_parse_path(idata->ctx->path, &mx) < 0)
re... | 120,804,337,805,826,060,000,000,000,000,000,000,000 | util.c | 263,446,847,107,873,700,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-14355 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name. | https://nvd.nist.gov/vuln/detail/CVE-2018-14355 |
240,228 | neomutt | 57971dba06346b2d7179294f4528b8d4427a7c5d | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d | Selectively cache headers
Co-authored-by: JerikoOne <jeriko.one@gmx.us> | 0 | header_cache_t *imap_hcache_open(struct ImapData *idata, const char *path)
{
struct ImapMbox mx;
struct Url url;
char cachepath[PATH_MAX];
char mbox[PATH_MAX];
if (path)
imap_cachepath(idata, path, mbox, sizeof(mbox));
else
{
if (!idata->ctx || imap_parse_path(idata->ctx->path, &mx) < 0)
re... | 248,277,110,721,002,800,000,000,000,000,000,000,000 | util.c | 210,410,034,595,130,370,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-14355 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name. | https://nvd.nist.gov/vuln/detail/CVE-2018-14355 |
196,602 | ImageMagick | 2ba8f335fa06daf1165e0878462686028e633a74 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74 | https://github.com/ImageMagick/ImageMagick/issues/575 | 1 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const Quantum
*p;
register ssize_t
i,
... | 176,318,642,758,577,160,000,000,000,000,000,000,000 | pcx.c | 208,589,698,877,131,100,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12668 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12668 |
240,837 | ImageMagick | 2ba8f335fa06daf1165e0878462686028e633a74 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74 | https://github.com/ImageMagick/ImageMagick/issues/575 | 0 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const Quantum
*p;
register ssize_t
i,
... | 257,265,362,010,933,140,000,000,000,000,000,000,000 | pcx.c | 6,946,983,931,600,103,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12668 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12668 |
196,615 | tensorflow | 237822b59fc504dda2c564787f5d3ad9c4aa62d9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9 | Fix tf.compat.v1.placeholder_with_default vulnerability with quantized types.
When iterating through the tensor to extract shape values, an underlying missing kernel
(`StridedSlice` for quantized types) causes an error, which then results in a `nullptr`
being passed to `ParseDimensionValue()`, causing a segfault.
The... | 1 | bool SetOpAttrScalar(TFE_Context* ctx, TFE_Op* op, const char* key,
PyObject* py_value, TF_AttrType type,
tensorflow::gtl::FlatMap<string, int64_t>* attr_list_sizes,
TF_Status* status) {
if (type == TF_ATTR_STRING) {
tensorflow::StringPiece value;
... | 123,078,089,302,997,150,000,000,000,000,000,000,000 | pywrap_tfe_src.cc | 277,124,603,653,640,930,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-29205 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29205 |
241,202 | tensorflow | 237822b59fc504dda2c564787f5d3ad9c4aa62d9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9 | Fix tf.compat.v1.placeholder_with_default vulnerability with quantized types.
When iterating through the tensor to extract shape values, an underlying missing kernel
(`StridedSlice` for quantized types) causes an error, which then results in a `nullptr`
being passed to `ParseDimensionValue()`, causing a segfault.
The... | 0 | bool SetOpAttrScalar(TFE_Context* ctx, TFE_Op* op, const char* key,
PyObject* py_value, TF_AttrType type,
tensorflow::gtl::FlatMap<string, int64_t>* attr_list_sizes,
TF_Status* status) {
if (type == TF_ATTR_STRING) {
tensorflow::StringPiece value;
... | 318,691,286,161,216,330,000,000,000,000,000,000,000 | pywrap_tfe_src.cc | 205,113,568,441,167,200,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-29205 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29205 |
196,622 | tensorflow | 4e2565483d0ffcadc719bd44893fb7f609bb5f12 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12 | Fix bug that could cause map_fn to produce incorrect results (rather than an error)
when mapping over a ragged tensor with an inappropriate fn_output_signature. (Note: there are cases where the default value for fn_output_signature is not appropriate, so the user needs to explicitly specify the correct output signatur... | 1 | Status NestedStackRaggedTensors(
const std::vector<RaggedTensorVariant>& ragged_components,
const std::vector<int>& nested_dim_sizes, const int input_ragged_rank,
const int output_ragged_rank, RaggedTensorVariant* output_ragged) {
output_ragged->mutable_nested_splits()->reserve(output_ragged_rank);
cons... | 174,323,946,927,784,480,000,000,000,000,000,000,000 | ragged_tensor_from_variant_op.cc | 181,903,524,865,628,630,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-37679 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills ou... | https://nvd.nist.gov/vuln/detail/CVE-2021-37679 |
241,318 | tensorflow | 4e2565483d0ffcadc719bd44893fb7f609bb5f12 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12 | Fix bug that could cause map_fn to produce incorrect results (rather than an error)
when mapping over a ragged tensor with an inappropriate fn_output_signature. (Note: there are cases where the default value for fn_output_signature is not appropriate, so the user needs to explicitly specify the correct output signatur... | 0 | Status NestedStackRaggedTensors(
const std::vector<RaggedTensorVariant>& ragged_components,
const std::vector<int>& nested_dim_sizes, const int input_ragged_rank,
const int output_ragged_rank, RaggedTensorVariant* output_ragged) {
output_ragged->mutable_nested_splits()->reserve(output_ragged_rank);
cons... | 67,376,286,576,312,820,000,000,000,000,000,000,000 | ragged_tensor_from_variant_op.cc | 331,792,781,186,921,280,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-37679 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills ou... | https://nvd.nist.gov/vuln/detail/CVE-2021-37679 |
196,628 | UltraVNC | 36a31b37b98f70c1db0428f5ad83170d604fb352 | https://github.com/ultravnc/UltraVNC | https://github.com/ultravnc/UltraVNC/commit/36a31b37b98f70c1db0428f5ad83170d604fb352 | security fix | 1 | vncProperties::DialogProc(HWND hwnd,
UINT uMsg,
WPARAM wParam,
LPARAM lParam )
{
// We use the dialog-box's USERDATA to store a _this pointer
// This is set only once WM_INITDIALOG has been recieved, though!
vncProperties *_this = helper::SafeGetWindowUserData<vncProperties>(hwnd);... | 291,924,002,574,413,480,000,000,000,000,000,000,000 | vncproperties.cpp | 147,164,361,005,981,700,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-24750 | UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugi... | https://nvd.nist.gov/vuln/detail/CVE-2022-24750 |
241,344 | UltraVNC | 36a31b37b98f70c1db0428f5ad83170d604fb352 | https://github.com/ultravnc/UltraVNC | https://github.com/ultravnc/UltraVNC/commit/36a31b37b98f70c1db0428f5ad83170d604fb352 | security fix | 0 | vncProperties::DialogProc(HWND hwnd,
UINT uMsg,
WPARAM wParam,
LPARAM lParam )
{
// We use the dialog-box's USERDATA to store a _this pointer
// This is set only once WM_INITDIALOG has been recieved, though!
vncProperties *_this = helper::SafeGetWindowUserData<vncProperties>(hwnd);... | 239,132,687,360,846,260,000,000,000,000,000,000,000 | vncproperties.cpp | 304,246,563,024,987,540,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-24750 | UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugi... | https://nvd.nist.gov/vuln/detail/CVE-2022-24750 |
196,630 | tensorflow | b055b9c474cd376259dde8779908f9eeaf097d93 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93 | Fix `tf.raw_ops.RaggedTensorToVariant` invalid resize.
PiperOrigin-RevId: 368299574
Change-Id: I751c186325aa0bab397928845e790e60c2d90918 | 1 | void Compute(OpKernelContext* context) override {
// Read ragged_splits inputs.
OpInputList ragged_nested_splits_in;
OP_REQUIRES_OK(context, context->input_list("rt_nested_splits",
&ragged_nested_splits_in));
const int ragged_nested_splits_len = ragged_n... | 321,186,616,318,723,800,000,000,000,000,000,000,000 | ragged_tensor_to_variant_op.cc | 255,384,629,922,530,840,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-29516 | TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6... | https://nvd.nist.gov/vuln/detail/CVE-2021-29516 |
241,372 | tensorflow | b055b9c474cd376259dde8779908f9eeaf097d93 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93 | Fix `tf.raw_ops.RaggedTensorToVariant` invalid resize.
PiperOrigin-RevId: 368299574
Change-Id: I751c186325aa0bab397928845e790e60c2d90918 | 0 | void Compute(OpKernelContext* context) override {
// Read inputs.
Tensor encoded_variant = context->input(0);
Tensor row_splits = context->input(1);
auto flat_row_splits = row_splits.flat<SPLIT_TYPE>();
TensorShape dense_values_shape;
OP_REQUIRES_OK(context,
TensorShapeUtils... | 92,316,279,706,216,640,000,000,000,000,000,000,000 | ragged_tensor_to_variant_op.cc | 103,790,733,078,302,020,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-29516 | TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6... | https://nvd.nist.gov/vuln/detail/CVE-2021-29516 |
196,683 | libjpeg | 51c3241b6da39df30f016b63f43f31c4011222c7 | https://github.com/thorfdbg/libjpeg | https://github.com/thorfdbg/libjpeg/commit/51c3241b6da39df30f016b63f43f31c4011222c7 | Fixed a NULL-pointer access in the line-based reconstruction process
in case no valid scan was found and no data is present. | 1 | void LineBitmapRequester::ReconstructRegion(const RectAngle<LONG> &orgregion,const struct RectangleRequest *rr)
{
class ColorTrafo *ctrafo = ColorTrafoOf(false,!rr->rr_bColorTrafo);
UBYTE i;
if (m_bSubsampling && rr->rr_bUpsampling) {
for(i = rr->rr_usFirstComponent;i <= rr->rr_usLastComponent;i++) {
... | 22,786,320,761,470,908,000,000,000,000,000,000,000 | linebitmaprequester.cpp | 249,102,353,200,291,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-32202 | In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2022-32202 |
242,278 | libjpeg | 51c3241b6da39df30f016b63f43f31c4011222c7 | https://github.com/thorfdbg/libjpeg | https://github.com/thorfdbg/libjpeg/commit/51c3241b6da39df30f016b63f43f31c4011222c7 | Fixed a NULL-pointer access in the line-based reconstruction process
in case no valid scan was found and no data is present. | 0 | void LineBitmapRequester::ReconstructRegion(const RectAngle<LONG> &orgregion,const struct RectangleRequest *rr)
{
class ColorTrafo *ctrafo = ColorTrafoOf(false,!rr->rr_bColorTrafo);
UBYTE i;
if (m_bSubsampling && rr->rr_bUpsampling) {
for(i = rr->rr_usFirstComponent;i <= rr->rr_usLastComponent;i++) {
... | 41,706,398,553,486,573,000,000,000,000,000,000,000 | linebitmaprequester.cpp | 75,196,685,226,911,500,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-32202 | In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2022-32202 |
196,684 | tensorflow | 6fc9141f42f6a72180ecd24021c3e6b36165fe0d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d | Fix assertion failure in pooling_ops_3d
PiperOrigin-RevId: 372364504
Change-Id: Iecde4fe26b47a8fa935d6e2611b5585ed5777781 | 1 | static void launch(OpKernelContext* context,
const TensorShape& tensor_in_shape,
const Tensor& out_backprop,
const std::array<int64, 3>& window,
const std::array<int64, 3>& stride,
const std::array<int64, 3>& outp... | 141,252,726,654,814,530,000,000,000,000,000,000,000 | pooling_ops_3d.cc | 177,962,698,535,603,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-29577 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) ... | https://nvd.nist.gov/vuln/detail/CVE-2021-29577 |
242,290 | tensorflow | 6fc9141f42f6a72180ecd24021c3e6b36165fe0d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d | Fix assertion failure in pooling_ops_3d
PiperOrigin-RevId: 372364504
Change-Id: Iecde4fe26b47a8fa935d6e2611b5585ed5777781 | 0 | static void launch(OpKernelContext* context,
const TensorShape& tensor_in_shape,
const Tensor& out_backprop,
const std::array<int64, 3>& window,
const std::array<int64, 3>& stride,
const std::array<int64, 3>& outp... | 294,444,368,887,786,530,000,000,000,000,000,000,000 | pooling_ops_3d.cc | 70,094,518,751,070,020,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-29577 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) ... | https://nvd.nist.gov/vuln/detail/CVE-2021-29577 |
196,686 | md4c | 4fc808d8fe8d8904f8525bb4231d854f45e23a19 | https://github.com/mity/md4c | https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19 | md_analyze_line: Avoid reading 1 byte beyond the input size.
Fixes #155. | 1 | md_analyze_line(MD_CTX* ctx, OFF beg, OFF* p_end,
const MD_LINE_ANALYSIS* pivot_line, MD_LINE_ANALYSIS* line)
{
unsigned total_indent = 0;
int n_parents = 0;
int n_brothers = 0;
int n_children = 0;
MD_CONTAINER container = { 0 };
int prev_line_has_list_loosening_effect = ctx->las... | 96,035,180,300,223,760,000,000,000,000,000,000,000 | md4c.c | 41,009,858,163,502,510,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-30027 | md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document. | https://nvd.nist.gov/vuln/detail/CVE-2021-30027 |
242,464 | md4c | 4fc808d8fe8d8904f8525bb4231d854f45e23a19 | https://github.com/mity/md4c | https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19 | md_analyze_line: Avoid reading 1 byte beyond the input size.
Fixes #155. | 0 | md_analyze_line(MD_CTX* ctx, OFF beg, OFF* p_end,
const MD_LINE_ANALYSIS* pivot_line, MD_LINE_ANALYSIS* line)
{
unsigned total_indent = 0;
int n_parents = 0;
int n_brothers = 0;
int n_children = 0;
MD_CONTAINER container = { 0 };
int prev_line_has_list_loosening_effect = ctx->las... | 195,714,220,958,926,430,000,000,000,000,000,000,000 | md4c.c | 126,193,858,639,279,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-30027 | md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document. | https://nvd.nist.gov/vuln/detail/CVE-2021-30027 |
196,696 | nghttp2 | f8da73bd042f810f34d19f9eae02b46d870af394 | https://github.com/nghttp2/nghttp2 | https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394 | Earlier check for settings flood | 1 | ssize_t nghttp2_session_mem_recv(nghttp2_session *session, const uint8_t *in,
size_t inlen) {
const uint8_t *first = in, *last = in + inlen;
nghttp2_inbound_frame *iframe = &session->iframe;
size_t readlen;
ssize_t padlen;
int rv;
int busy = 0;
nghttp2_frame_hd cont_hd;
... | 298,735,501,613,373,500,000,000,000,000,000,000,000 | None | null | [
"CWE-707"
] | CVE-2020-11080 | In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100... | https://nvd.nist.gov/vuln/detail/CVE-2020-11080 |
242,728 | nghttp2 | f8da73bd042f810f34d19f9eae02b46d870af394 | https://github.com/nghttp2/nghttp2 | https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394 | Earlier check for settings flood | 0 | ssize_t nghttp2_session_mem_recv(nghttp2_session *session, const uint8_t *in,
size_t inlen) {
const uint8_t *first = in, *last = in + inlen;
nghttp2_inbound_frame *iframe = &session->iframe;
size_t readlen;
ssize_t padlen;
int rv;
int busy = 0;
nghttp2_frame_hd cont_hd;
... | 217,680,737,255,236,500,000,000,000,000,000,000,000 | None | null | [
"CWE-707"
] | CVE-2020-11080 | In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100... | https://nvd.nist.gov/vuln/detail/CVE-2020-11080 |
196,714 | ImageMagick | f6463ca9588579633bbaed9460899d892aa3c64a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a | Zero pixel buffer | 1 | static Image *ReadJPEGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
value[MagickPathExtent];
const char
*option;
ErrorManager
error_manager;
Image
*image;
JSAMPLE
*volatile jpeg_pixels;
JSAMPROW
scanline[1];
MagickBooleanType
debug,
status;
... | 184,612,899,923,392,700,000,000,000,000,000,000,000 | jpeg.c | 140,674,320,265,086,580,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-11448 | The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11448 |
243,072 | ImageMagick | f6463ca9588579633bbaed9460899d892aa3c64a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a | Zero pixel buffer | 0 | static Image *ReadJPEGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
value[MagickPathExtent];
const char
*option;
ErrorManager
error_manager;
Image
*image;
JSAMPLE
*volatile jpeg_pixels;
JSAMPROW
scanline[1];
MagickBooleanType
debug,
status;
... | 172,659,905,221,303,200,000,000,000,000,000,000,000 | jpeg.c | 10,190,873,673,155,645,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-11448 | The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11448 |
196,715 | tensorflow | 32fdcbff9d06d010d908fcc4bd4b36eb3ce15925 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925 | Validate arguments of `FractionalMaxPoolGrad`
PiperOrigin-RevId: 372274982
Change-Id: If46b0c442efa4eaef635ce6a476717060420122c | 1 | void Compute(OpKernelContext* context) override {
// There are two steps when calculating gradient for FractionalMaxPool.
// 1) Walk through the process of calculating fractional pooling given
// pooling region; however, in the process, keep track of where the max
// element comes from. (arg_max... | 1,069,766,852,211,935,300,000,000,000,000,000,000 | fractional_max_pool_op.cc | 132,429,668,210,309,730,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29580 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty. The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process. The ... | https://nvd.nist.gov/vuln/detail/CVE-2021-29580 |
243,095 | tensorflow | 32fdcbff9d06d010d908fcc4bd4b36eb3ce15925 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925 | Validate arguments of `FractionalMaxPoolGrad`
PiperOrigin-RevId: 372274982
Change-Id: If46b0c442efa4eaef635ce6a476717060420122c | 0 | void Compute(OpKernelContext* context) override {
// There are two steps when calculating gradient for FractionalMaxPool.
// 1) Walk through the process of calculating fractional pooling given
// pooling region; however, in the process, keep track of where the max
// element comes from. (arg_max... | 95,514,870,069,264,010,000,000,000,000,000,000,000 | fractional_max_pool_op.cc | 61,833,506,020,194,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29580 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty. The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process. The ... | https://nvd.nist.gov/vuln/detail/CVE-2021-29580 |
196,721 | radare2 | e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | Fix #12417/#12418 (arm assembler heap overflows) | 1 | static bool parseOperands(char* str, ArmOp *op) {
char *t = strdup (str);
int operand = 0;
char *token = t;
char *x;
int imm_count = 0;
int mem_opt = 0;
if (!token) {
return false;
}
while (token) {
char *next = strchr (token, ',');
if (next) {
*next++ = 0;
}
while (token[0] == ' ') {
token++;... | 307,020,922,900,605,000,000,000,000,000,000,000,000 | armass64.c | 251,080,514,476,755,870,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20457 | In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.... | https://nvd.nist.gov/vuln/detail/CVE-2018-20457 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.