idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
230,608
tensorflow
13d38a07ce9143e044aa737cfd7bb759d0e9b400
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400
Fix tf.raw_ops.UnsortedSegmentJoin vulnerability with invalid num_segments. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445206880
0
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const TensorShape& input_shape = input.shape(); const int32_t input_dims = input_shape.dims(); const Tensor& segment_id = context->input(1); const TensorShape& segment_id_shape = segment_id.shape(); con...
65,248,679,843,968,420,000,000,000,000,000,000,000
unsorted_segment_join_op.cc
272,660,497,308,848,180,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29197
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `n...
https://nvd.nist.gov/vuln/detail/CVE-2022-29197
195,687
haproxy
3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
https://github.com/haproxy/haproxy
https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
BUG/MAJOR: htx: fix missing header name length check in htx_add_header/trailer Ori Hollander of JFrog Security reported that htx_add_header() and htx_add_trailer() were missing a length check on the header name. While this does not allow to overwrite any memory area, it results in bits of the header name length to sli...
1
static inline struct htx_blk *htx_add_header(struct htx *htx, const struct ist name, const struct ist value) { struct htx_blk *blk; /* FIXME: check name.len (< 256B) and value.len (< 1MB) */ blk = htx_add_blk(htx, HTX_BLK_HDR, name.len + value.len); if (!blk) return NULL; blk->info += (value.len << 8...
298,891,256,359,096,300,000,000,000,000,000,000,000
htx.h
174,016,802,291,091,360,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-40346
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
https://nvd.nist.gov/vuln/detail/CVE-2021-40346
230,842
haproxy
3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
https://github.com/haproxy/haproxy
https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95
BUG/MAJOR: htx: fix missing header name length check in htx_add_header/trailer Ori Hollander of JFrog Security reported that htx_add_header() and htx_add_trailer() were missing a length check on the header name. While this does not allow to overwrite any memory area, it results in bits of the header name length to sli...
0
static inline struct htx_blk *htx_add_header(struct htx *htx, const struct ist name, const struct ist value) { struct htx_blk *blk; if (name.len > 255 || value.len > 1048575) return NULL; blk = htx_add_blk(htx, HTX_BLK_HDR, name.len + value.len); if (!blk) return NULL; blk->info += (value.len << 8...
58,472,739,533,880,380,000,000,000,000,000,000,000
htx.h
82,485,125,932,367,870,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-40346
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
https://nvd.nist.gov/vuln/detail/CVE-2021-40346
195,693
tensorflow
d94ffe08a65400f898241c0374e9edc6fa8ed257
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257
Prevent an OOB read in `expand_dims.cc` The for loop that follows this check assumes that `axis` is between `0` and `input_dims.size`. If user supplied `axis` is negative, the if code before this check is supposed to bring it back to positive (similar to how in Python one can do `l[-3]` to mean `l[-3 + len(l)]`). Pip...
1
TfLiteStatus ExpandTensorDim(TfLiteContext* context, const TfLiteTensor& input, int axis, TfLiteTensor* output) { const TfLiteIntArray& input_dims = *input.dims; if (axis < 0) { axis = input_dims.size + 1 + axis; } TF_LITE_ENSURE(context, axis <= input_dims.size); TfLiteIntAr...
68,745,352,576,737,850,000,000,000,000,000,000,000
expand_dims.cc
193,638,638,891,517,460,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-37685
TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside...
https://nvd.nist.gov/vuln/detail/CVE-2021-37685
231,063
tensorflow
d94ffe08a65400f898241c0374e9edc6fa8ed257
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257
Prevent an OOB read in `expand_dims.cc` The for loop that follows this check assumes that `axis` is between `0` and `input_dims.size`. If user supplied `axis` is negative, the if code before this check is supposed to bring it back to positive (similar to how in Python one can do `l[-3]` to mean `l[-3 + len(l)]`). Pip...
0
TfLiteStatus ExpandTensorDim(TfLiteContext* context, const TfLiteTensor& input, int axis, TfLiteTensor* output) { const TfLiteIntArray& input_dims = *input.dims; if (axis < 0) { axis = input_dims.size + 1 + axis; } TF_LITE_ENSURE(context, axis <= input_dims.size); TF_LITE_ENSU...
169,164,928,832,289,940,000,000,000,000,000,000,000
expand_dims.cc
197,423,725,030,643,570,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-37685
TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside...
https://nvd.nist.gov/vuln/detail/CVE-2021-37685
195,698
qemu
3de46e6fc489c52c9431a8a832ad8170a7569bd8
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8
e1000: fail early for evil descriptor During procss_tx_desc(), driver can try to chain data descriptor with legacy descriptor, when will lead underflow for the following calculation in process_tx_desc() for bytes: if (tp->size + bytes > msh) bytes = msh - tp->size; This will lead a infini...
1
process_tx_desc(E1000State *s, struct e1000_tx_desc *dp) { PCIDevice *d = PCI_DEVICE(s); uint32_t txd_lower = le32_to_cpu(dp->lower.data); uint32_t dtype = txd_lower & (E1000_TXD_CMD_DEXT | E1000_TXD_DTYP_D); unsigned int split_size = txd_lower & 0xffff, bytes, sz; unsigned int msh = 0xfffff; ui...
74,125,544,352,553,390,000,000,000,000,000,000,000
e1000.c
81,059,158,982,762,300,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2021-20257
An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The high...
https://nvd.nist.gov/vuln/detail/CVE-2021-20257
231,108
qemu
3de46e6fc489c52c9431a8a832ad8170a7569bd8
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/3de46e6fc489c52c9431a8a832ad8170a7569bd8
e1000: fail early for evil descriptor During procss_tx_desc(), driver can try to chain data descriptor with legacy descriptor, when will lead underflow for the following calculation in process_tx_desc() for bytes: if (tp->size + bytes > msh) bytes = msh - tp->size; This will lead a infini...
0
process_tx_desc(E1000State *s, struct e1000_tx_desc *dp) { PCIDevice *d = PCI_DEVICE(s); uint32_t txd_lower = le32_to_cpu(dp->lower.data); uint32_t dtype = txd_lower & (E1000_TXD_CMD_DEXT | E1000_TXD_DTYP_D); unsigned int split_size = txd_lower & 0xffff, bytes, sz; unsigned int msh = 0xfffff; ui...
286,300,002,648,459,670,000,000,000,000,000,000,000
e1000.c
47,410,790,699,069,030,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2021-20257
An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The high...
https://nvd.nist.gov/vuln/detail/CVE-2021-20257
195,709
freeradius-server
4dc7800b866f889a1247685bbaa6dd4238a56279
https://github.com/alandekok/freeradius-server
http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279
Fix endless loop when there are multiple DHCP options
1
int fr_dhcp_decode(RADIUS_PACKET *packet) { int i; uint8_t *p, *next; uint32_t giaddr; VALUE_PAIR *head, *vp, **tail; VALUE_PAIR *maxms, *mtu; char buffer[2048]; head = NULL; tail = &head; p = packet->data; if ((fr_debug_flag > 2) && fr_log_fp) { for (i = 0; i < packet->data_len; i++) { if ((i & 0x0f)...
227,854,104,156,128,660,000,000,000,000,000,000,000
dhcp.c
108,402,175,319,933,540,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2010-3696
The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of thes...
https://nvd.nist.gov/vuln/detail/CVE-2010-3696
231,426
freeradius-server
4dc7800b866f889a1247685bbaa6dd4238a56279
https://github.com/alandekok/freeradius-server
http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279
Fix endless loop when there are multiple DHCP options
0
int fr_dhcp_decode(RADIUS_PACKET *packet) { int i; uint8_t *p, *next; uint32_t giaddr; VALUE_PAIR *head, *vp, **tail; VALUE_PAIR *maxms, *mtu; char buffer[2048]; head = NULL; tail = &head; p = packet->data; if ((fr_debug_flag > 2) && fr_log_fp) { for (i = 0; i < packet->data_len; i++) { if ((i & 0x0f)...
208,226,852,670,389,930,000,000,000,000,000,000,000
dhcp.c
129,985,582,471,630,830,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2010-3696
The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of thes...
https://nvd.nist.gov/vuln/detail/CVE-2010-3696
195,726
taglib
cb9f07d9dcd791b63e622da43f7b232adaec0a9a
https://github.com/taglib/taglib
https://github.com/taglib/taglib/commit/cb9f07d9dcd791b63e622da43f7b232adaec0a9a
Don't assume TDRC is an instance of TextIdentificationFrame (#831) If TDRC is encrypted, FrameFactory::createFrame() returns UnknownFrame which causes problems in rebuildAggregateFrames() when it is assumed that TDRC is a TextIdentificationFrame
1
void FrameFactory::rebuildAggregateFrames(ID3v2::Tag *tag) const { if(tag->header()->majorVersion() < 4 && tag->frameList("TDRC").size() == 1 && tag->frameList("TDAT").size() == 1) { TextIdentificationFrame *tdrc = static_cast<TextIdentificationFrame *>(tag->frameList("TDRC").front()); Unkno...
60,884,634,851,824,770,000,000,000,000,000,000,000
id3v2framefactory.cpp
180,566,829,970,563,900,000,000,000,000,000,000
[ "CWE-352" ]
CVE-2017-12678
In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12678
232,080
taglib
cb9f07d9dcd791b63e622da43f7b232adaec0a9a
https://github.com/taglib/taglib
https://github.com/taglib/taglib/commit/cb9f07d9dcd791b63e622da43f7b232adaec0a9a
Don't assume TDRC is an instance of TextIdentificationFrame (#831) If TDRC is encrypted, FrameFactory::createFrame() returns UnknownFrame which causes problems in rebuildAggregateFrames() when it is assumed that TDRC is a TextIdentificationFrame
0
void FrameFactory::rebuildAggregateFrames(ID3v2::Tag *tag) const { if(tag->header()->majorVersion() < 4 && tag->frameList("TDRC").size() == 1 && tag->frameList("TDAT").size() == 1) { TextIdentificationFrame *tdrc = dynamic_cast<TextIdentificationFrame *>(tag->frameList("TDRC").front()); Unkn...
200,663,420,292,346,700,000,000,000,000,000,000,000
id3v2framefactory.cpp
334,378,625,730,669,240,000,000,000,000,000,000,000
[ "CWE-352" ]
CVE-2017-12678
In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12678
195,728
libiec61850
033ab5b6488250c8c3b838f25a7cbc3e099230bb
https://github.com/mz-automation/libiec61850
https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb
- COTP: fixed possible heap buffer overflow when handling message with invalid (zero) value in length field (#250)
1
CotpConnection_readToTpktBuffer(CotpConnection* self) { uint8_t* buffer = self->readBuffer->buffer; int bufferSize = self->readBuffer->maxSize; int bufPos = self->readBuffer->size; assert (bufferSize > 4); int readBytes; if (bufPos < 4) { readBytes = readFromSocket(self, buffer + buf...
91,769,707,100,972,450,000,000,000,000,000,000,000
cotp.c
42,221,220,259,850,007,000,000,000,000,000,000,000
[ "CWE-122" ]
CVE-2020-15158
In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or ther...
https://nvd.nist.gov/vuln/detail/CVE-2020-15158
232,235
libiec61850
033ab5b6488250c8c3b838f25a7cbc3e099230bb
https://github.com/mz-automation/libiec61850
https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb
- COTP: fixed possible heap buffer overflow when handling message with invalid (zero) value in length field (#250)
0
CotpConnection_readToTpktBuffer(CotpConnection* self) { uint8_t* buffer = self->readBuffer->buffer; int bufferSize = self->readBuffer->maxSize; int bufPos = self->readBuffer->size; assert (bufferSize > 4); int readBytes; if (bufPos < 4) { readBytes = readFromSocket(self, buffer + buf...
18,187,040,219,387,954,000,000,000,000,000,000,000
cotp.c
117,984,707,644,528,530,000,000,000,000,000,000,000
[ "CWE-122" ]
CVE-2020-15158
In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or ther...
https://nvd.nist.gov/vuln/detail/CVE-2020-15158
195,751
tensorflow
14607c0707040d775e06b6817325640cb4b5864c
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c
Fix nullptr deref in `tf.raw_ops.CTCLoss`. PiperOrigin-RevId: 372266334 Change-Id: Ic52c3e9f13a38f54482d670907eda1688450862b
1
void Compute(OpKernelContext* ctx) override { const Tensor* inputs; const Tensor* labels_indices; const Tensor* labels_values; const Tensor* seq_len; OP_REQUIRES_OK(ctx, ctx->input("inputs", &inputs)); OP_REQUIRES_OK(ctx, ctx->input("labels_indices", &labels_indices)); OP_REQUIRES_OK(ctx, ...
284,621,168,675,240,780,000,000,000,000,000,000,000
ctc_loss_op.cc
42,387,040,029,811,200,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2021-29613
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and Tensor...
https://nvd.nist.gov/vuln/detail/CVE-2021-29613
232,400
tensorflow
14607c0707040d775e06b6817325640cb4b5864c
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c
Fix nullptr deref in `tf.raw_ops.CTCLoss`. PiperOrigin-RevId: 372266334 Change-Id: Ic52c3e9f13a38f54482d670907eda1688450862b
0
void Compute(OpKernelContext* ctx) override { const Tensor* inputs; const Tensor* labels_indices; const Tensor* labels_values; const Tensor* seq_len; OP_REQUIRES_OK(ctx, ctx->input("inputs", &inputs)); OP_REQUIRES_OK(ctx, ctx->input("labels_indices", &labels_indices)); OP_REQUIRES_OK(ctx, ...
64,604,746,349,545,040,000,000,000,000,000,000,000
ctc_loss_op.cc
38,178,606,228,397,564,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2021-29613
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and Tensor...
https://nvd.nist.gov/vuln/detail/CVE-2021-29613
195,764
tensorflow
953f28dca13c92839ba389c055587cfe6c723578
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578
Prevent a null pointer exception in TFLite PiperOrigin-RevId: 370800206 Change-Id: Idd437ebce4ff224120d8eefc1c14c062173b71d6
1
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { OpContext op_context(context, node); switch (op_context.output->type) { case kTfLiteFloat32: TFLiteOperation<kernel_type, float, OpType>(context, node, op_context); break; case kTfLiteUInt8: TFLiteOperation<kernel_t...
86,827,718,223,722,850,000,000,000,000,000,000,000
maximum_minimum.cc
231,104,653,070,167,870,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-29590
TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://git...
https://nvd.nist.gov/vuln/detail/CVE-2021-29590
232,739
tensorflow
953f28dca13c92839ba389c055587cfe6c723578
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578
Prevent a null pointer exception in TFLite PiperOrigin-RevId: 370800206 Change-Id: Idd437ebce4ff224120d8eefc1c14c062173b71d6
0
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { OpContext op_context(context, node); // If inputs have no element, shortcircuit. if (NumElements(op_context.input1) == 0 || NumElements(op_context.input2) == 0) { return kTfLiteOk; } switch (op_context.output->type) { case kTfLiteFl...
162,444,068,527,362,600,000,000,000,000,000,000,000
maximum_minimum.cc
284,901,546,559,497,260,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-29590
TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://git...
https://nvd.nist.gov/vuln/detail/CVE-2021-29590
195,777
asylo
8fed5e334131abaf9c5e17307642fbf6ce4a57ec
https://github.com/google/asylo
https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec
Check sockaddr size in inet_pton PiperOrigin-RevId: 333821843 Change-Id: Ie0b694f1edd3f7a4a3de6df964d68566961accf6
1
int enc_untrusted_inet_pton(int af, const char *src, void *dst) { if (!src || !dst) { return 0; } MessageWriter input; input.Push<int>(TokLinuxAfFamily(af)); input.PushByReference(Extent{ src, std::min(strlen(src) + 1, static_cast<size_t>(INET6_ADDRSTRLEN))}); MessageReader output; const auto ...
30,807,987,413,685,380,000,000,000,000,000,000,000
host_calls.cc
83,935,641,637,319,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-8941
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size includ...
https://nvd.nist.gov/vuln/detail/CVE-2020-8941
233,066
asylo
8fed5e334131abaf9c5e17307642fbf6ce4a57ec
https://github.com/google/asylo
https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec
Check sockaddr size in inet_pton PiperOrigin-RevId: 333821843 Change-Id: Ie0b694f1edd3f7a4a3de6df964d68566961accf6
0
int enc_untrusted_inet_pton(int af, const char *src, void *dst) { if (!src || !dst) { return 0; } MessageWriter input; input.Push<int>(TokLinuxAfFamily(af)); input.PushByReference(Extent{ src, std::min(strlen(src) + 1, static_cast<size_t>(INET6_ADDRSTRLEN))}); MessageReader output; const auto ...
88,417,366,320,740,520,000,000,000,000,000,000,000
host_calls.cc
3,167,262,574,095,635,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-8941
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size includ...
https://nvd.nist.gov/vuln/detail/CVE-2020-8941
195,787
nDPI
61066fb106efa6d3d95b67e47b662de208b2b622
https://github.com/ntop/nDPI
https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622
Added check for heap buffer overflow read
1
void ndpi_parse_packet_line_info(struct ndpi_detection_module_struct *ndpi_str, struct ndpi_flow_struct *flow) { u_int32_t a; struct ndpi_packet_struct *packet = &flow->packet; if((packet->payload_packet_len < 3) || (packet->payload == NULL)) return; if(packet->packet_lines_parsed_complete != 0) retur...
290,131,674,294,143,000,000,000,000,000,000,000,000
ndpi_main.c
313,082,086,761,718,160,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-15471
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-15471
233,272
nDPI
61066fb106efa6d3d95b67e47b662de208b2b622
https://github.com/ntop/nDPI
https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622
Added check for heap buffer overflow read
0
void ndpi_parse_packet_line_info(struct ndpi_detection_module_struct *ndpi_str, struct ndpi_flow_struct *flow) { u_int32_t a; struct ndpi_packet_struct *packet = &flow->packet; if((packet->payload_packet_len < 3) || (packet->payload == NULL)) return; if(packet->packet_lines_parsed_complete != 0) retur...
13,742,627,443,378,073,000,000,000,000,000,000,000
ndpi_main.c
15,742,709,859,397,380,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-15471
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-15471
195,791
bfgminer
c80ad8548251eb0e15329fc240c89070640c9d79
https://github.com/luke-jr/bfgminer
https://github.com/luke-jr/bfgminer/commit/c80ad8548251eb0e15329fc240c89070640c9d79
Stratum: extract_sockaddr: Truncate overlong addresses rather than stack overflow Thanks to Mick Ayzenberg <mick@dejavusecurity.com> for finding this!
1
bool extract_sockaddr(struct pool *pool, char *url) { char *url_begin, *url_end, *ipv6_begin, *ipv6_end, *port_start = NULL; char url_address[256], port[6]; int url_len, port_len = 0; url_begin = strstr(url, "//"); if (!url_begin) url_begin = url; else url_begin += 2; /* Look for numeric ipv6 entries */ i...
241,738,802,868,952,140,000,000,000,000,000,000,000
util.c
42,076,426,286,321,793,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-4501
Multiple stack-based buffer overflows in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 3.3.0 allow remote pool servers to have unspecified impact via a long URL in a client.reconnect stratum message to the (1) extract_sockaddr or (2) parse_reconnect functions in util.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-4501
233,569
bfgminer
c80ad8548251eb0e15329fc240c89070640c9d79
https://github.com/luke-jr/bfgminer
https://github.com/luke-jr/bfgminer/commit/c80ad8548251eb0e15329fc240c89070640c9d79
Stratum: extract_sockaddr: Truncate overlong addresses rather than stack overflow Thanks to Mick Ayzenberg <mick@dejavusecurity.com> for finding this!
0
bool extract_sockaddr(struct pool *pool, char *url) { char *url_begin, *url_end, *ipv6_begin, *ipv6_end, *port_start = NULL; char url_address[256], port[6]; int url_len, port_len = 0; url_begin = strstr(url, "//"); if (!url_begin) url_begin = url; else url_begin += 2; /* Look for numeric ipv6 entries */ i...
38,747,426,849,797,766,000,000,000,000,000,000,000
util.c
122,106,294,667,611,740,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-4501
Multiple stack-based buffer overflows in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 3.3.0 allow remote pool servers to have unspecified impact via a long URL in a client.reconnect stratum message to the (1) extract_sockaddr or (2) parse_reconnect functions in util.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-4501
195,802
tensorflow
33be22c65d86256e6826666662e40dbdfe70ee83
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83
Prevent format string vulnerability in `tf.strings.as_string`. The `printf` format specifier only allows `#`, `0`, `-`, `+` and space as flag characters. Others are interpreted as width/precision/length modifier or conversion specifiers. If a character does not fit into any of these sets `printf` just displays it. Al...
1
explicit AsStringOp(OpKernelConstruction* ctx) : OpKernel(ctx) { int32 precision; bool scientific; bool shortest; int32 width; string fill_string; DataType dtype; OP_REQUIRES_OK(ctx, ctx->GetAttr("T", &dtype)); OP_REQUIRES_OK(ctx, ctx->GetAttr("precision", &precision)); OP_REQUIRES...
243,009,376,597,345,030,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2020-15203
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issu...
https://nvd.nist.gov/vuln/detail/CVE-2020-15203
233,918
tensorflow
33be22c65d86256e6826666662e40dbdfe70ee83
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83
Prevent format string vulnerability in `tf.strings.as_string`. The `printf` format specifier only allows `#`, `0`, `-`, `+` and space as flag characters. Others are interpreted as width/precision/length modifier or conversion specifiers. If a character does not fit into any of these sets `printf` just displays it. Al...
0
explicit AsStringOp(OpKernelConstruction* ctx) : OpKernel(ctx) { int32 precision; bool scientific; bool shortest; int32 width; string fill_string; DataType dtype; OP_REQUIRES_OK(ctx, ctx->GetAttr("T", &dtype)); OP_REQUIRES_OK(ctx, ctx->GetAttr("precision", &precision)); OP_REQUIRES...
254,538,744,777,016,200,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2020-15203
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issu...
https://nvd.nist.gov/vuln/detail/CVE-2020-15203
195,803
suricata
9f0294fadca3dcc18c919424242a41e01f3e8318
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/9f0294fadca3dcc18c919424242a41e01f3e8318
stream: fix SYN_SENT RST/FIN injection RST injection during the SYN_SENT state could trick Suricata into marking a session as CLOSED. The way this was done is: using invalid TSECR value in RST+ACK packet. The ACK was needed to force Linux into considering the TSECR value and compare it to the TSVAL from the SYN packet...
1
static int StreamTcpPacketStateSynSent(ThreadVars *tv, Packet *p, StreamTcpThread *stt, TcpSession *ssn, PacketQueue *pq) { if (ssn == NULL) return -1; SCLogDebug("ssn %p: pkt received: %s", ssn, PKT_IS_TOCLIENT(p) ? "toclient":"toserver"); /* RST */ if (...
132,276,836,917,259,370,000,000,000,000,000,000,000
stream-tcp.c
64,322,315,854,531,100,000,000,000,000,000,000,000
[ "CWE-74" ]
CVE-2019-18625
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK pa...
https://nvd.nist.gov/vuln/detail/CVE-2019-18625
233,929
suricata
9f0294fadca3dcc18c919424242a41e01f3e8318
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/9f0294fadca3dcc18c919424242a41e01f3e8318
stream: fix SYN_SENT RST/FIN injection RST injection during the SYN_SENT state could trick Suricata into marking a session as CLOSED. The way this was done is: using invalid TSECR value in RST+ACK packet. The ACK was needed to force Linux into considering the TSECR value and compare it to the TSVAL from the SYN packet...
0
static int StreamTcpPacketStateSynSent(ThreadVars *tv, Packet *p, StreamTcpThread *stt, TcpSession *ssn, PacketQueue *pq) { if (ssn == NULL) return -1; SCLogDebug("ssn %p: pkt received: %s", ssn, PKT_IS_TOCLIENT(p) ? "toclient":"toserver"); /* check for bad r...
43,714,262,139,516,210,000,000,000,000,000,000,000
stream-tcp.c
311,441,045,090,367,700,000,000,000,000,000,000,000
[ "CWE-74" ]
CVE-2019-18625
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK pa...
https://nvd.nist.gov/vuln/detail/CVE-2019-18625
195,812
wolfssl
23878512c65834d12811b1107d19a001478eca5d
https://github.com/wolfSSL/wolfssl
https://github.com/wolfSSL/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d
Change signature generation to verify by default
1
int wc_SignatureGenerateHash( enum wc_HashType hash_type, enum wc_SignatureType sig_type, const byte* hash_data, word32 hash_len, byte* sig, word32 *sig_len, const void* key, word32 key_len, WC_RNG* rng) { int ret; /* Suppress possible unused arg if all signature types are disabled */ (void...
71,377,739,331,289,540,000,000,000,000,000,000,000
signature.c
315,118,741,825,853,080,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-19962
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
https://nvd.nist.gov/vuln/detail/CVE-2019-19962
233,972
wolfssl
23878512c65834d12811b1107d19a001478eca5d
https://github.com/wolfSSL/wolfssl
https://github.com/wolfSSL/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d
Change signature generation to verify by default
0
int wc_SignatureGenerateHash_ex( enum wc_HashType hash_type, enum wc_SignatureType sig_type, const byte* hash_data, word32 hash_len, byte* sig, word32 *sig_len, const void* key, word32 key_len, WC_RNG* rng, int verify) { int ret; /* Suppress possible unused arg if all signature types are disabl...
197,972,866,141,619,200,000,000,000,000,000,000,000
signature.c
107,892,772,942,291,660,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-19962
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
https://nvd.nist.gov/vuln/detail/CVE-2019-19962
195,817
ImageMagick
d9a8234d211da30baf9526fbebe9a8438ea7e11c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d9a8234d211da30baf9526fbebe9a8438ea7e11c
https://github.com/ImageMagick/ImageMagick/issues/712
1
static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char buffer[MagickPathExtent], name[MagickPathExtent]; Image *image; MagickBooleanType status; register ssize_t i, x; register Quantum *q; register unsigned char *p; short int hex_d...
126,746,378,143,995,860,000,000,000,000,000,000,000
xbm.c
212,881,994,908,310,860,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-14175
In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consum...
https://nvd.nist.gov/vuln/detail/CVE-2017-14175
234,027
ImageMagick
d9a8234d211da30baf9526fbebe9a8438ea7e11c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d9a8234d211da30baf9526fbebe9a8438ea7e11c
https://github.com/ImageMagick/ImageMagick/issues/712
0
static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char buffer[MagickPathExtent], name[MagickPathExtent]; Image *image; int c; MagickBooleanType status; register ssize_t i, x; register Quantum *q; register unsigned char *p; short...
94,041,080,862,089,880,000,000,000,000,000,000,000
xbm.c
169,463,213,136,454,080,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-14175
In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consum...
https://nvd.nist.gov/vuln/detail/CVE-2017-14175
195,818
ImageMagick
f0232a2a45dfd003c1faf6079497895df3ab0ee1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f0232a2a45dfd003c1faf6079497895df3ab0ee1
Fixed incorrect call to WriteBlob reported in #490.
1
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
218,465,767,313,382,300,000,000,000,000,000,000,000
png.c
14,607,067,448,821,954,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2017-9142
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-9142
60,043
ImageMagick
8ca35831e91c3db8c6d281d09b605001003bec08
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08
coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference https://github.com/ImageMagick/ImageMagick/issues/517).
0
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
254,511,850,915,179,300,000,000,000,000,000,000,000
png.c
133,390,610,587,338,430,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11310
The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files.
https://nvd.nist.gov/vuln/detail/CVE-2017-11310
195,825
tensorflow
ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412
Prevent array OOB read/write PiperOrigin-RevId: 371026165 Change-Id: I26ac6372c87246e03c7eb8c94e84c84d86054b36
1
TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node, const TfLiteTensor* input, const TfLiteTensor* size_splits, const TfLiteTensor* axis) { int axis_value = GetTensorData<int>(axis)[0]; if (axis...
240,977,795,944,225,060,000,000,000,000,000,000,000
split_v.cc
118,714,096,309,212,030,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-29606
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_val...
https://nvd.nist.gov/vuln/detail/CVE-2021-29606
234,264
tensorflow
ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412
Prevent array OOB read/write PiperOrigin-RevId: 371026165 Change-Id: I26ac6372c87246e03c7eb8c94e84c84d86054b36
0
TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node, const TfLiteTensor* input, const TfLiteTensor* size_splits, const TfLiteTensor* axis) { int axis_value = GetTensorData<int>(axis)[0]; if (axis...
120,880,467,925,626,180,000,000,000,000,000,000,000
split_v.cc
161,041,721,655,361,370,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-29606
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_val...
https://nvd.nist.gov/vuln/detail/CVE-2021-29606
195,826
detect-character-encoding
992a11007fff6cfd40b952150ab8d30410c4a20a
https://github.com/sonicdoe/detect-character-encoding
https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a
Return null if no charset matches Fixes a segmentation fault if no charset matches. According to http://icu-project.org/apiref/icu4c/ucsdet_8h.html#aff2633b5055d472cff4108d94f97cf7d, ucsdet_detect() may return NULL if no charset matches. Fixes: #15 Co-authored-by: chenzhip <letme2010@gmail.com>
1
NAN_METHOD(DetectCharacterEncoding) { Nan::HandleScope scope; v8::Local<v8::Object> inputBuffer = info[0]->ToObject(); UCharsetDetector *charsetDetector; const UCharsetMatch *charsetMatch; UErrorCode errorCode = U_ZERO_ERROR; charsetDetector = ucsdet_open(&errorCode); if(U_FAILURE(errorCode)) { Nan::ThrowE...
68,592,644,305,386,580,000,000,000,000,000,000,000
icuWrapper.cpp
35,599,923,964,401,176,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2021-39157
detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/relea...
https://nvd.nist.gov/vuln/detail/CVE-2021-39157
234,269
detect-character-encoding
992a11007fff6cfd40b952150ab8d30410c4a20a
https://github.com/sonicdoe/detect-character-encoding
https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a
Return null if no charset matches Fixes a segmentation fault if no charset matches. According to http://icu-project.org/apiref/icu4c/ucsdet_8h.html#aff2633b5055d472cff4108d94f97cf7d, ucsdet_detect() may return NULL if no charset matches. Fixes: #15 Co-authored-by: chenzhip <letme2010@gmail.com>
0
NAN_METHOD(DetectCharacterEncoding) { Nan::HandleScope scope; v8::Local<v8::Object> inputBuffer = info[0]->ToObject(); UCharsetDetector *charsetDetector; const UCharsetMatch *charsetMatch; UErrorCode errorCode = U_ZERO_ERROR; charsetDetector = ucsdet_open(&errorCode); if(U_FAILURE(errorCode)) { Nan::ThrowE...
182,079,526,297,611,250,000,000,000,000,000,000,000
icuWrapper.cpp
94,823,889,412,320,650,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2021-39157
detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/relea...
https://nvd.nist.gov/vuln/detail/CVE-2021-39157
195,912
wangle
5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6
https://github.com/facebook/wangle
https://github.com/facebook/wangle/commit/5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6
Peek for \n in LineBasedFrameDecoder. Summary: Previously this could underflow if there was not a following \n. CVE-2019-3563 Reviewed By: siyengar Differential Revision: D14935715 fbshipit-source-id: 25c3eecf373f89efa1232456aeeb092f13b7fa06
1
int64_t LineBasedFrameDecoder::findEndOfLine(IOBufQueue& buf) { Cursor c(buf.front()); for (uint32_t i = 0; i < maxLength_ && i < buf.chainLength(); i++) { auto b = c.read<char>(); if (b == '\n' && terminatorType_ != TerminatorType::CARRIAGENEWLINE) { return i; } else if (terminatorType_ != Termin...
7,559,219,273,500,247,000,000,000,000,000,000,000
LineBasedFrameDecoder.cpp
48,038,939,344,336,070,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-3563
Wangle's LineBasedFrameDecoder contains logic for identifying newlines which incorrectly advances a buffer, leading to a potential underflow. This affects versions of Wangle prior to v2019.04.22.00
https://nvd.nist.gov/vuln/detail/CVE-2019-3563
234,901
wangle
5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6
https://github.com/facebook/wangle
https://github.com/facebook/wangle/commit/5b3bceca875e4ea4ed9d14c20b20ce46c92c13c6
Peek for \n in LineBasedFrameDecoder. Summary: Previously this could underflow if there was not a following \n. CVE-2019-3563 Reviewed By: siyengar Differential Revision: D14935715 fbshipit-source-id: 25c3eecf373f89efa1232456aeeb092f13b7fa06
0
int64_t LineBasedFrameDecoder::findEndOfLine(IOBufQueue& buf) { Cursor c(buf.front()); for (uint32_t i = 0; i < maxLength_ && i < buf.chainLength(); i++) { auto b = c.read<char>(); if (b == '\n' && terminatorType_ != TerminatorType::CARRIAGENEWLINE) { return i; } else if ( terminatorType_ ...
182,763,480,115,366,970,000,000,000,000,000,000,000
LineBasedFrameDecoder.cpp
14,946,006,717,307,908,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-3563
Wangle's LineBasedFrameDecoder contains logic for identifying newlines which incorrectly advances a buffer, leading to a potential underflow. This affects versions of Wangle prior to v2019.04.22.00
https://nvd.nist.gov/vuln/detail/CVE-2019-3563
195,916
sfntly
c56b85408bab232efd7e650f0994272a174e3b92
https://github.com/googlei18n/sfntly
https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
Add a bounds check to ByteArray::Get().
1
int32_t ByteArray::Get(int32_t index) { return InternalGet(index) & 0xff; }
67,678,066,191,927,460,000,000,000,000,000,000,000
byte_array.cc
294,475,653,167,790,770,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-1709
Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
https://nvd.nist.gov/vuln/detail/CVE-2016-1709
235,140
sfntly
c56b85408bab232efd7e650f0994272a174e3b92
https://github.com/googlei18n/sfntly
https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92
Add a bounds check to ByteArray::Get().
0
int32_t ByteArray::Get(int32_t index) { if (index < 0 || index >= Length()) return -1; return InternalGet(index) & 0xff; }
14,287,791,023,644,650,000,000,000,000,000,000,000
byte_array.cc
301,186,539,677,861,300,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-1709
Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
https://nvd.nist.gov/vuln/detail/CVE-2016-1709
195,941
cpp-peglib
0061f393de54cf0326621c079dc2988336d1ebb3
https://github.com/yhirose/cpp-peglib
https://github.com/yhirose/cpp-peglib/commit/0061f393de54cf0326621c079dc2988336d1ebb3
Fix #121
1
std::shared_ptr<Grammar> perform_core(const char *s, size_t n, const Rules &rules, std::string &start, Log log) { Data data; any dt = &data; auto r = g["Grammar"].parse(s, n, dt); if (!r.ret) { if (log) { if...
172,756,209,645,119,500,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2020-23914
An issue was discovered in cpp-peglib through v0.1.12. A NULL pointer dereference exists in the peg::AstOptimizer::optimize() located in peglib.h. It allows an attacker to cause Denial of Service.
https://nvd.nist.gov/vuln/detail/CVE-2020-23914
235,632
cpp-peglib
0061f393de54cf0326621c079dc2988336d1ebb3
https://github.com/yhirose/cpp-peglib
https://github.com/yhirose/cpp-peglib/commit/0061f393de54cf0326621c079dc2988336d1ebb3
Fix #121
0
std::shared_ptr<Grammar> perform_core(const char *s, size_t n, const Rules &rules, std::string &start, Log log) { Data data; any dt = &data; auto r = g["Grammar"].parse(s, n, dt); if (!r.ret) { if (log) { if...
321,311,870,582,880,580,000,000,000,000,000,000,000
peglib.h
168,591,356,101,478,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-23914
An issue was discovered in cpp-peglib through v0.1.12. A NULL pointer dereference exists in the peg::AstOptimizer::optimize() located in peglib.h. It allows an attacker to cause Denial of Service.
https://nvd.nist.gov/vuln/detail/CVE-2020-23914
195,956
ImageMagick
d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
1
static MagickBooleanType WriteINLINEImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { char *base64, message[MagickPathExtent]; const MagickInfo *magick_info; Image *write_image; ImageInfo *write_info; MagickBooleanType status; size_t blob_length, ...
151,006,512,755,735,200,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2017-12666
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteINLINEImage in coders/inline.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12666
235,657
ImageMagick
d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c
https://github.com/ImageMagick/ImageMagick/issues/572
0
static MagickBooleanType WriteINLINEImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { char *base64, message[MagickPathExtent]; const MagickInfo *magick_info; Image *write_image; ImageInfo *write_info; MagickBooleanType status; size_t blob_length, ...
207,271,106,348,869,930,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2017-12666
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteINLINEImage in coders/inline.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12666
195,957
qemu
4f1c6cb2f9afafda05eab150fd2bd284edce6676
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676
hw/core/loader: Fix possible crash in rom_copy() Both, "rom->addr" and "addr" are derived from the binary image that can be loaded with the "-kernel" paramer. The code in rom_copy() then calculates: d = dest + (rom->addr - addr); and uses "d" as destination in a memcpy() some lines later. Now with bad kernel ima...
1
int rom_copy(uint8_t *dest, hwaddr addr, size_t size) { hwaddr end = addr + size; uint8_t *s, *d = dest; size_t l = 0; Rom *rom; QTAILQ_FOREACH(rom, &roms, next) { if (rom->fw_file) { continue; } if (rom->mr) { continue; } if (rom->add...
9,853,742,337,349,726,000,000,000,000,000,000,000
loader.c
192,373,255,711,382,070,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-13765
rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
https://nvd.nist.gov/vuln/detail/CVE-2020-13765
235,681
qemu
4f1c6cb2f9afafda05eab150fd2bd284edce6676
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676
hw/core/loader: Fix possible crash in rom_copy() Both, "rom->addr" and "addr" are derived from the binary image that can be loaded with the "-kernel" paramer. The code in rom_copy() then calculates: d = dest + (rom->addr - addr); and uses "d" as destination in a memcpy() some lines later. Now with bad kernel ima...
0
int rom_copy(uint8_t *dest, hwaddr addr, size_t size) { hwaddr end = addr + size; uint8_t *s, *d = dest; size_t l = 0; Rom *rom; QTAILQ_FOREACH(rom, &roms, next) { if (rom->fw_file) { continue; } if (rom->mr) { continue; } if (rom->add...
231,085,536,918,406,050,000,000,000,000,000,000,000
loader.c
36,097,717,211,958,270,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-13765
rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
https://nvd.nist.gov/vuln/detail/CVE-2020-13765
195,960
Bento4
4d3f0bebd5f8518fd775f671c12bea58c68e814e
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e
fixed possible crashes on malformed inputs.
1
AP4_Processor::Process(AP4_ByteStream& input, AP4_ByteStream& output, AP4_ByteStream* fragments, ProgressListener* listener, AP4_AtomFactory& atom_factory) { // read all atoms. // keep all atoms except [mdat] ...
145,752,004,308,763,700,000,000,000,000,000,000,000
Ap4Processor.cpp
154,465,198,806,954,940,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12476
The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12476
235,736
Bento4
4d3f0bebd5f8518fd775f671c12bea58c68e814e
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e
fixed possible crashes on malformed inputs.
0
AP4_Processor::Process(AP4_ByteStream& input, AP4_ByteStream& output, AP4_ByteStream* fragments, ProgressListener* listener, AP4_AtomFactory& atom_factory) { // read all atoms. // keep all atoms except [mdat] ...
266,736,834,593,454,420,000,000,000,000,000,000,000
Ap4Processor.cpp
2,271,093,154,568,076,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12476
The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12476
195,961
Bento4
4d3f0bebd5f8518fd775f671c12bea58c68e814e
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e
fixed possible crashes on malformed inputs.
1
AP4_AvccAtom::InspectFields(AP4_AtomInspector& inspector) { inspector.AddField("Configuration Version", m_ConfigurationVersion); const char* profile_name = GetProfileName(m_Profile); if (profile_name) { inspector.AddField("Profile", profile_name); } else { inspector.AddField("Profile", m...
174,541,416,060,620,020,000,000,000,000,000,000,000
Ap4AvccAtom.cpp
65,032,902,554,530,120,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12476
The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12476
235,746
Bento4
4d3f0bebd5f8518fd775f671c12bea58c68e814e
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/4d3f0bebd5f8518fd775f671c12bea58c68e814e
fixed possible crashes on malformed inputs.
0
AP4_AvccAtom::InspectFields(AP4_AtomInspector& inspector) { inspector.AddField("Configuration Version", m_ConfigurationVersion); const char* profile_name = GetProfileName(m_Profile); if (profile_name) { inspector.AddField("Profile", profile_name); } else { inspector.AddField("Profile", m...
213,566,481,025,774,200,000,000,000,000,000,000,000
Ap4AvccAtom.cpp
26,725,286,725,359,955,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12476
The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
https://nvd.nist.gov/vuln/detail/CVE-2017-12476
195,983
tensorflow
6972f9dfe325636b3db4e0bc517ee22a159365c0
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0
Add missing valuidation to FusedBatchNorm. PiperOrigin-RevId: 372460336 Change-Id: Ic8c4e4de67c58a741bd87f2e182bed07247d1126
1
virtual void ComputeWithReservedSpace(OpKernelContext* context, bool use_reserved_space) { Tensor x = context->input(0); const Tensor& scale = context->input(1); const Tensor& offset = context->input(2); const Tensor& estimated_mean = context->input(3); cons...
66,340,177,584,073,390,000,000,000,000,000,000,000
fused_batch_norm_op.cc
325,719,922,759,190,770,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29583
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow. If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers. The implementation(https://github.com/tensorf...
https://nvd.nist.gov/vuln/detail/CVE-2021-29583
236,108
tensorflow
6972f9dfe325636b3db4e0bc517ee22a159365c0
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0
Add missing valuidation to FusedBatchNorm. PiperOrigin-RevId: 372460336 Change-Id: Ic8c4e4de67c58a741bd87f2e182bed07247d1126
0
virtual void ComputeWithReservedSpace(OpKernelContext* context, bool use_reserved_space) { Tensor x = context->input(0); const Tensor& scale = context->input(1); const Tensor& offset = context->input(2); const Tensor& estimated_mean = context->input(3); cons...
19,416,726,105,322,845,000,000,000,000,000,000,000
fused_batch_norm_op.cc
315,185,939,329,327,040,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29583
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow. If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers. The implementation(https://github.com/tensorf...
https://nvd.nist.gov/vuln/detail/CVE-2021-29583
195,987
libdwarf-code
8151575a6ace77d005ca5bb5d71c1bfdba3f7069
https://github.com/davea42/libdwarf-code
https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069
Fixes vulnerability DW202205-001 Reports error instead of crashing the when reading a specially crafted (corrupted) .debug_pubnames or .debug_pubtypes section. modified: src/lib/libdwarf/dwarf_global.c
1
_dwarf_internal_get_pubnames_like_data(Dwarf_Debug dbg, const char *secname, Dwarf_Small * section_data_ptr, Dwarf_Unsigned section_length, Dwarf_Global ** globals, Dwarf_Signed * return_count, Dwarf_Error * error, int context_DLA_code, int global_DLA_code, int length_err_num, in...
157,104,169,876,880,900,000,000,000,000,000,000,000
dwarf_global.c
160,524,441,026,175,030,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-32200
libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-32200
236,252
libdwarf-code
8151575a6ace77d005ca5bb5d71c1bfdba3f7069
https://github.com/davea42/libdwarf-code
https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069
Fixes vulnerability DW202205-001 Reports error instead of crashing the when reading a specially crafted (corrupted) .debug_pubnames or .debug_pubtypes section. modified: src/lib/libdwarf/dwarf_global.c
0
_dwarf_internal_get_pubnames_like_data(Dwarf_Debug dbg, const char *secname, Dwarf_Small * section_data_ptr, Dwarf_Unsigned section_length, Dwarf_Global ** globals, Dwarf_Signed * return_count, Dwarf_Error * error, int context_DLA_code, int global_DLA_code, int length_err_num, in...
5,468,163,685,543,887,000,000,000,000,000,000,000
dwarf_global.c
180,943,935,883,829,040,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-32200
libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-32200
195,999
tensorflow
d6b57f461b39fd1aa8c1b870f1b974aac3554955
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955
Prevent nullptr dereference in MLIR TFLite dialect/optimizer. PiperOrigin-RevId: 387220762 Change-Id: Id136ef04bb3d36123b4685d316ae81a9ec924d6b
1
bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) { if (sq_op.getType().cast<ShapedType>().getRank() - 1 == *axis.getValues<int>().begin() || *axis.getValues<int>().begin() == -1) { return true; } if (sq_op.getType().cast<ShapedType>().getRank() != axis.getNumElements()) { re...
126,359,880,382,894,470,000,000,000,000,000,000,000
optimize.cc
312,164,065,414,284,080,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-37689
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implement...
https://nvd.nist.gov/vuln/detail/CVE-2021-37689
236,413
tensorflow
d6b57f461b39fd1aa8c1b870f1b974aac3554955
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955
Prevent nullptr dereference in MLIR TFLite dialect/optimizer. PiperOrigin-RevId: 387220762 Change-Id: Id136ef04bb3d36123b4685d316ae81a9ec924d6b
0
bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) { if (axis.getNumElements() == 0) { return false; } if (sq_op.getType().cast<ShapedType>().getRank() - 1 == *axis.getValues<int>().begin() || *axis.getValues<int>().begin() == -1) { return true; } if (sq_op.getType().cast<...
300,281,697,952,747,500,000,000,000,000,000,000,000
optimize.cc
256,323,957,113,985,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-37689
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implement...
https://nvd.nist.gov/vuln/detail/CVE-2021-37689
196,263
fmt
8cf30aa2be256eba07bb1cefb998c52326e846e7
https://github.com/fmtlib/fmt
https://github.com/fmtlib/fmt/commit/8cf30aa2be256eba07bb1cefb998c52326e846e7
Fix segfault on complex pointer formatting (#642)
1
BasicWriter<Char>::prepare_int_buffer( unsigned num_digits, const Spec &spec, const char *prefix, unsigned prefix_size) { unsigned width = spec.width(); Alignment align = spec.align(); Char fill = internal::CharTraits<Char>::cast(spec.fill()); if (spec.precision() > static_cast<int>(num_digits)) { ...
5,956,982,953,693,642,000,000,000,000,000,000,000
format.h
137,266,836,299,752,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-1000052
fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000052
237,531
fmt
8cf30aa2be256eba07bb1cefb998c52326e846e7
https://github.com/fmtlib/fmt
https://github.com/fmtlib/fmt/commit/8cf30aa2be256eba07bb1cefb998c52326e846e7
Fix segfault on complex pointer formatting (#642)
0
BasicWriter<Char>::prepare_int_buffer( unsigned num_digits, const Spec &spec, const char *prefix, unsigned prefix_size) { unsigned width = spec.width(); Alignment align = spec.align(); Char fill = internal::CharTraits<Char>::cast(spec.fill()); if (spec.precision() > static_cast<int>(num_digits)) { ...
5,619,543,278,846,389,000,000,000,000,000,000,000
format.h
338,498,615,030,644,670,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-1000052
fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000052
196,265
tensorflow
6d36ba65577006affb272335b7c1abd829010708
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708
Prevent division by 0 PiperOrigin-RevId: 370984990 Change-Id: Ib324955bbeb1cbd97c82fd5d61a00a2697c9a2de
1
TfLiteStatus ResizeOutputTensor(TfLiteContext* context, SpaceToBatchNDContext* op_context) { TfLiteIntArray* input_size = op_context->input->dims; const int32* block_shape = GetTensorData<int32>(op_context->block_shape); const int32* paddings_data = GetTensorData<int32>(op_context-...
244,203,462,885,213,770,000,000,000,000,000,000,000
space_to_batch_nd.cc
76,053,121,648,330,480,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29597
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83). An a...
https://nvd.nist.gov/vuln/detail/CVE-2021-29597
237,663
tensorflow
6d36ba65577006affb272335b7c1abd829010708
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708
Prevent division by 0 PiperOrigin-RevId: 370984990 Change-Id: Ib324955bbeb1cbd97c82fd5d61a00a2697c9a2de
0
TfLiteStatus ResizeOutputTensor(TfLiteContext* context, SpaceToBatchNDContext* op_context) { TfLiteIntArray* input_size = op_context->input->dims; const int32* block_shape = GetTensorData<int32>(op_context->block_shape); const int32* paddings_data = GetTensorData<int32>(op_context-...
331,699,575,458,146,160,000,000,000,000,000,000,000
space_to_batch_nd.cc
150,993,650,108,506,900,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29597
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83). An a...
https://nvd.nist.gov/vuln/detail/CVE-2021-29597
196,268
mintty
bd52109993440b6996760aaccb66e68e782762b9
https://github.com/mintty/mintty
https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9
tame some window operations, just in case
1
do_winop(void) { int arg1 = term.csi_argv[1], arg2 = term.csi_argv[2]; if (*cfg.suppress_win && contains(cfg.suppress_win, term.csi_argv[0])) // skip suppressed window operation return; switch (term.csi_argv[0]) { when 1: win_set_iconic(false); when 2: win_set_iconic(true); when 3: win_set_pos...
9,542,499,771,721,612,000,000,000,000,000,000,000
termout.c
116,609,680,721,553,560,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-28848
Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title chang...
https://nvd.nist.gov/vuln/detail/CVE-2021-28848
237,732
mintty
bd52109993440b6996760aaccb66e68e782762b9
https://github.com/mintty/mintty
https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9
tame some window operations, just in case
0
do_winop(void) { int arg1 = term.csi_argv[1], arg2 = term.csi_argv[2]; if (*cfg.suppress_win && contains(cfg.suppress_win, term.csi_argv[0])) // skip suppressed window operation return; switch (term.csi_argv[0]) { when 1: win_set_iconic(false); when 2: win_set_iconic(true); when 3: win_set_pos...
174,904,579,461,277,760,000,000,000,000,000,000,000
termout.c
25,680,163,971,220,390,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-28848
Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title chang...
https://nvd.nist.gov/vuln/detail/CVE-2021-28848
196,272
Pillow
6dcbf5bd96b717c58d7b642949da8d323099928e
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e
Fix for buffer overflow in TiffDecode.c CVE-2016-0740
1
int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) { TIFFSTATE *clientstate = (TIFFSTATE *)state->context; char *filename = "tempfile.tif"; char *mode = "r"; TIFF *tiff; int size; /* buffer is the encoded file, bytes is the length of the encoded file */ /* it all ends up i...
226,805,016,077,354,560,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-0740
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-0740
237,812
Pillow
6dcbf5bd96b717c58d7b642949da8d323099928e
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e
Fix for buffer overflow in TiffDecode.c CVE-2016-0740
0
int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) { TIFFSTATE *clientstate = (TIFFSTATE *)state->context; char *filename = "tempfile.tif"; char *mode = "r"; TIFF *tiff; tsize_t size; /* buffer is the encoded file, bytes is the length of the encoded file */ /* it all ends ...
64,629,344,350,316,830,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-0740
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-0740
196,279
linux
26bef1318adc1b3a530ecc807ef99346db2aa8b0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0
x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround Before we do an EMMS in the AMD FXSAVE information leak workaround we need to clear any pending exceptions, otherwise we trap with a floating-point exception inside this code. Reported-by: halfdog <me@halfdog.net> Tested-by: Borislav Petkov <bp@suse.de> Link: h...
1
static inline int restore_fpu_checking(struct task_struct *tsk) { /* AMD K7/K8 CPUs don't save/restore FDP/FIP/FOP unless an exception is pending. Clear the x87 state here by setting it to fixed values. "m" is a random variable that should be in L1 */ alternative_input( ASM_NOP8 ASM_NOP2, "emms\n\t" /* ...
160,911,480,057,649,970,000,000,000,000,000,000,000
fpu-internal.h
62,303,957,108,102,540,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2014-1438
The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafte...
https://nvd.nist.gov/vuln/detail/CVE-2014-1438
237,938
linux
26bef1318adc1b3a530ecc807ef99346db2aa8b0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0
x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround Before we do an EMMS in the AMD FXSAVE information leak workaround we need to clear any pending exceptions, otherwise we trap with a floating-point exception inside this code. Reported-by: halfdog <me@halfdog.net> Tested-by: Borislav Petkov <bp@suse.de> Link: h...
0
static inline int restore_fpu_checking(struct task_struct *tsk) { /* AMD K7/K8 CPUs don't save/restore FDP/FIP/FOP unless an exception is pending. Clear the x87 state here by setting it to fixed values. "m" is a random variable that should be in L1 */ if (unlikely(static_cpu_has(X86_FEATURE_FXSAVE_LEAK))) { ...
249,642,903,586,033,050,000,000,000,000,000,000,000
fpu-internal.h
281,986,845,786,766,870,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2014-1438
The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafte...
https://nvd.nist.gov/vuln/detail/CVE-2014-1438
196,290
znc
a7bfbd93812950b7444841431e8e297e62cb524e
https://github.com/znc/znc
https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e
Don't let attackers inject rogue values into znc.conf Because of this vulnerability, existing ZNC users could get Admin permissions. Thanks for Jeriko One <jeriko.one@gmx.us> for finding and reporting this.
1
void CConfig::Write(CFile& File, unsigned int iIndentation) { CString sIndentation = CString(iIndentation, '\t'); for (const auto& it : m_ConfigEntries) { for (const CString& sValue : it.second) { File.Write(sIndentation + it.first + " = " + sValue + "\n"); } } for (const a...
161,401,620,008,865,480,000,000,000,000,000,000,000
Config.cpp
73,135,015,563,394,670,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-14055
ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.
https://nvd.nist.gov/vuln/detail/CVE-2018-14055
238,153
znc
a7bfbd93812950b7444841431e8e297e62cb524e
https://github.com/znc/znc
https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e
Don't let attackers inject rogue values into znc.conf Because of this vulnerability, existing ZNC users could get Admin permissions. Thanks for Jeriko One <jeriko.one@gmx.us> for finding and reporting this.
0
void CConfig::Write(CFile& File, unsigned int iIndentation) { CString sIndentation = CString(iIndentation, '\t'); auto SingleLine = [](const CString& s) { return s.Replace_n("\r", "").Replace_n("\n", ""); }; for (const auto& it : m_ConfigEntries) { for (const CString& sValue : it.secon...
173,350,986,155,571,800,000,000,000,000,000,000,000
Config.cpp
41,795,347,238,739,115,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-14055
ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.
https://nvd.nist.gov/vuln/detail/CVE-2018-14055
196,313
ImageMagick
0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
1
static MagickBooleanType WritePALMImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType currentOffset, offset, scene; MagickSizeType cc; PixelInfo transpix; QuantizeInfo *quantize_info; register ssize_t x...
171,216,561,167,147,580,000,000,000,000,000,000,000
palm.c
118,888,611,678,143,520,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12664
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12664
238,197
ImageMagick
0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0417cea1b6d72f90bd4f1f573f91e42a8ba66a89
https://github.com/ImageMagick/ImageMagick/issues/574
0
static MagickBooleanType WritePALMImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType currentOffset, offset, scene; MagickSizeType cc; PixelInfo transpix; QuantizeInfo *quantize_info; register ssize_t x...
146,232,625,343,954,790,000,000,000,000,000,000,000
palm.c
65,510,581,705,344,600,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12664
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12664
196,314
nanopb
45582f1f97f49e2abfdba1463d1e1027682d9856
https://github.com/nanopb/nanopb
https://github.com/nanopb/nanopb/commit/45582f1f97f49e2abfdba1463d1e1027682d9856
Fix invalid free() after failed realloc() (GHSA-gcx3-7m76-287p)
1
static bool checkreturn decode_pointer_field(pb_istream_t *stream, pb_wire_type_t wire_type, pb_field_iter_t *field) { #ifndef PB_ENABLE_MALLOC PB_UNUSED(wire_type); PB_UNUSED(field); PB_RETURN_ERROR(stream, "no malloc support"); #else switch (PB_HTYPE(field->type)) { case PB_HTYPE_REQUIRED:...
78,676,253,641,844,470,000,000,000,000,000,000,000
pb_decode.c
43,723,406,899,528,080,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-5235
There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a repeated string, bytes or message field and realloc() runs out of memory when expanding the array nanopb can end up calling `free()...
https://nvd.nist.gov/vuln/detail/CVE-2020-5235
238,240
nanopb
45582f1f97f49e2abfdba1463d1e1027682d9856
https://github.com/nanopb/nanopb
https://github.com/nanopb/nanopb/commit/45582f1f97f49e2abfdba1463d1e1027682d9856
Fix invalid free() after failed realloc() (GHSA-gcx3-7m76-287p)
0
static bool checkreturn decode_pointer_field(pb_istream_t *stream, pb_wire_type_t wire_type, pb_field_iter_t *field) { #ifndef PB_ENABLE_MALLOC PB_UNUSED(wire_type); PB_UNUSED(field); PB_RETURN_ERROR(stream, "no malloc support"); #else switch (PB_HTYPE(field->type)) { case PB_HTYPE_REQUIRED:...
86,835,937,515,518,390,000,000,000,000,000,000,000
pb_decode.c
48,108,367,603,645,790,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-5235
There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a repeated string, bytes or message field and realloc() runs out of memory when expanding the array nanopb can end up calling `free()...
https://nvd.nist.gov/vuln/detail/CVE-2020-5235
196,315
gpac
6170024568f4dda310e98ef7508477b425c58d09
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09
fixed potential crash - cf #1263
1
GF_Err ilst_item_box_read(GF_Box *s,GF_BitStream *bs) { GF_Err e; u32 sub_type; GF_Box *a = NULL; GF_ListItemBox *ptr = (GF_ListItemBox *)s; /*iTunes way: there's a data atom containing the data*/ sub_type = gf_bs_peek_bits(bs, 32, 4); if (sub_type == GF_ISOM_BOX_TYPE_DATA ) { e = gf_isom_box_parse(&a, bs); ...
146,852,552,995,497,060,000,000,000,000,000,000,000
box_code_apple.c
240,252,095,245,784,050,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-19488
An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read.
https://nvd.nist.gov/vuln/detail/CVE-2020-19488
238,309
gpac
6170024568f4dda310e98ef7508477b425c58d09
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09
fixed potential crash - cf #1263
0
GF_Err ilst_item_box_read(GF_Box *s,GF_BitStream *bs) { GF_Err e; u32 sub_type; GF_Box *a = NULL; GF_ListItemBox *ptr = (GF_ListItemBox *)s; /*iTunes way: there's a data atom containing the data*/ sub_type = gf_bs_peek_bits(bs, 32, 4); if (sub_type == GF_ISOM_BOX_TYPE_DATA ) { e = gf_isom_box_parse(&a, bs); ...
70,304,557,597,998,670,000,000,000,000,000,000,000
box_code_apple.c
157,238,358,621,492,020,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-19488
An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read.
https://nvd.nist.gov/vuln/detail/CVE-2020-19488
196,577
neomutt
57971dba06346b2d7179294f4528b8d4427a7c5d
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d
Selectively cache headers Co-authored-by: JerikoOne <jeriko.one@gmx.us>
1
header_cache_t *imap_hcache_open(struct ImapData *idata, const char *path) { struct ImapMbox mx; struct Url url; char cachepath[PATH_MAX]; char mbox[PATH_MAX]; if (path) imap_cachepath(idata, path, mbox, sizeof(mbox)); else { if (!idata->ctx || imap_parse_path(idata->ctx->path, &mx) < 0) re...
120,804,337,805,826,060,000,000,000,000,000,000,000
util.c
263,446,847,107,873,700,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-14355
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
https://nvd.nist.gov/vuln/detail/CVE-2018-14355
240,228
neomutt
57971dba06346b2d7179294f4528b8d4427a7c5d
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/57971dba06346b2d7179294f4528b8d4427a7c5d
Selectively cache headers Co-authored-by: JerikoOne <jeriko.one@gmx.us>
0
header_cache_t *imap_hcache_open(struct ImapData *idata, const char *path) { struct ImapMbox mx; struct Url url; char cachepath[PATH_MAX]; char mbox[PATH_MAX]; if (path) imap_cachepath(idata, path, mbox, sizeof(mbox)); else { if (!idata->ctx || imap_parse_path(idata->ctx->path, &mx) < 0) re...
248,277,110,721,002,800,000,000,000,000,000,000,000
util.c
210,410,034,595,130,370,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-14355
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
https://nvd.nist.gov/vuln/detail/CVE-2018-14355
196,602
ImageMagick
2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
1
static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType offset, *page_table, scene; MemoryInfo *pixel_info; PCXInfo pcx_info; register const Quantum *p; register ssize_t i, ...
176,318,642,758,577,160,000,000,000,000,000,000,000
pcx.c
208,589,698,877,131,100,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12668
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12668
240,837
ImageMagick
2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2ba8f335fa06daf1165e0878462686028e633a74
https://github.com/ImageMagick/ImageMagick/issues/575
0
static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType offset, *page_table, scene; MemoryInfo *pixel_info; PCXInfo pcx_info; register const Quantum *p; register ssize_t i, ...
257,265,362,010,933,140,000,000,000,000,000,000,000
pcx.c
6,946,983,931,600,103,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12668
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12668
196,615
tensorflow
237822b59fc504dda2c564787f5d3ad9c4aa62d9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9
Fix tf.compat.v1.placeholder_with_default vulnerability with quantized types. When iterating through the tensor to extract shape values, an underlying missing kernel (`StridedSlice` for quantized types) causes an error, which then results in a `nullptr` being passed to `ParseDimensionValue()`, causing a segfault. The...
1
bool SetOpAttrScalar(TFE_Context* ctx, TFE_Op* op, const char* key, PyObject* py_value, TF_AttrType type, tensorflow::gtl::FlatMap<string, int64_t>* attr_list_sizes, TF_Status* status) { if (type == TF_ATTR_STRING) { tensorflow::StringPiece value; ...
123,078,089,302,997,150,000,000,000,000,000,000,000
pywrap_tfe_src.cc
277,124,603,653,640,930,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-29205
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29205
241,202
tensorflow
237822b59fc504dda2c564787f5d3ad9c4aa62d9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9
Fix tf.compat.v1.placeholder_with_default vulnerability with quantized types. When iterating through the tensor to extract shape values, an underlying missing kernel (`StridedSlice` for quantized types) causes an error, which then results in a `nullptr` being passed to `ParseDimensionValue()`, causing a segfault. The...
0
bool SetOpAttrScalar(TFE_Context* ctx, TFE_Op* op, const char* key, PyObject* py_value, TF_AttrType type, tensorflow::gtl::FlatMap<string, int64_t>* attr_list_sizes, TF_Status* status) { if (type == TF_ATTR_STRING) { tensorflow::StringPiece value; ...
318,691,286,161,216,330,000,000,000,000,000,000,000
pywrap_tfe_src.cc
205,113,568,441,167,200,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-29205
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29205
196,622
tensorflow
4e2565483d0ffcadc719bd44893fb7f609bb5f12
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12
Fix bug that could cause map_fn to produce incorrect results (rather than an error) when mapping over a ragged tensor with an inappropriate fn_output_signature. (Note: there are cases where the default value for fn_output_signature is not appropriate, so the user needs to explicitly specify the correct output signatur...
1
Status NestedStackRaggedTensors( const std::vector<RaggedTensorVariant>& ragged_components, const std::vector<int>& nested_dim_sizes, const int input_ragged_rank, const int output_ragged_rank, RaggedTensorVariant* output_ragged) { output_ragged->mutable_nested_splits()->reserve(output_ragged_rank); cons...
174,323,946,927,784,480,000,000,000,000,000,000,000
ragged_tensor_from_variant_op.cc
181,903,524,865,628,630,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-37679
TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills ou...
https://nvd.nist.gov/vuln/detail/CVE-2021-37679
241,318
tensorflow
4e2565483d0ffcadc719bd44893fb7f609bb5f12
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/4e2565483d0ffcadc719bd44893fb7f609bb5f12
Fix bug that could cause map_fn to produce incorrect results (rather than an error) when mapping over a ragged tensor with an inappropriate fn_output_signature. (Note: there are cases where the default value for fn_output_signature is not appropriate, so the user needs to explicitly specify the correct output signatur...
0
Status NestedStackRaggedTensors( const std::vector<RaggedTensorVariant>& ragged_components, const std::vector<int>& nested_dim_sizes, const int input_ragged_rank, const int output_ragged_rank, RaggedTensorVariant* output_ragged) { output_ragged->mutable_nested_splits()->reserve(output_ragged_rank); cons...
67,376,286,576,312,820,000,000,000,000,000,000,000
ragged_tensor_from_variant_op.cc
331,792,781,186,921,280,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-37679
TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills ou...
https://nvd.nist.gov/vuln/detail/CVE-2021-37679
196,628
UltraVNC
36a31b37b98f70c1db0428f5ad83170d604fb352
https://github.com/ultravnc/UltraVNC
https://github.com/ultravnc/UltraVNC/commit/36a31b37b98f70c1db0428f5ad83170d604fb352
security fix
1
vncProperties::DialogProc(HWND hwnd, UINT uMsg, WPARAM wParam, LPARAM lParam ) { // We use the dialog-box's USERDATA to store a _this pointer // This is set only once WM_INITDIALOG has been recieved, though! vncProperties *_this = helper::SafeGetWindowUserData<vncProperties>(hwnd);...
291,924,002,574,413,480,000,000,000,000,000,000,000
vncproperties.cpp
147,164,361,005,981,700,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-24750
UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugi...
https://nvd.nist.gov/vuln/detail/CVE-2022-24750
241,344
UltraVNC
36a31b37b98f70c1db0428f5ad83170d604fb352
https://github.com/ultravnc/UltraVNC
https://github.com/ultravnc/UltraVNC/commit/36a31b37b98f70c1db0428f5ad83170d604fb352
security fix
0
vncProperties::DialogProc(HWND hwnd, UINT uMsg, WPARAM wParam, LPARAM lParam ) { // We use the dialog-box's USERDATA to store a _this pointer // This is set only once WM_INITDIALOG has been recieved, though! vncProperties *_this = helper::SafeGetWindowUserData<vncProperties>(hwnd);...
239,132,687,360,846,260,000,000,000,000,000,000,000
vncproperties.cpp
304,246,563,024,987,540,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-24750
UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugi...
https://nvd.nist.gov/vuln/detail/CVE-2022-24750
196,630
tensorflow
b055b9c474cd376259dde8779908f9eeaf097d93
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93
Fix `tf.raw_ops.RaggedTensorToVariant` invalid resize. PiperOrigin-RevId: 368299574 Change-Id: I751c186325aa0bab397928845e790e60c2d90918
1
void Compute(OpKernelContext* context) override { // Read ragged_splits inputs. OpInputList ragged_nested_splits_in; OP_REQUIRES_OK(context, context->input_list("rt_nested_splits", &ragged_nested_splits_in)); const int ragged_nested_splits_len = ragged_n...
321,186,616,318,723,800,000,000,000,000,000,000,000
ragged_tensor_to_variant_op.cc
255,384,629,922,530,840,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-29516
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6...
https://nvd.nist.gov/vuln/detail/CVE-2021-29516
241,372
tensorflow
b055b9c474cd376259dde8779908f9eeaf097d93
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/b055b9c474cd376259dde8779908f9eeaf097d93
Fix `tf.raw_ops.RaggedTensorToVariant` invalid resize. PiperOrigin-RevId: 368299574 Change-Id: I751c186325aa0bab397928845e790e60c2d90918
0
void Compute(OpKernelContext* context) override { // Read inputs. Tensor encoded_variant = context->input(0); Tensor row_splits = context->input(1); auto flat_row_splits = row_splits.flat<SPLIT_TYPE>(); TensorShape dense_values_shape; OP_REQUIRES_OK(context, TensorShapeUtils...
92,316,279,706,216,640,000,000,000,000,000,000,000
ragged_tensor_to_variant_op.cc
103,790,733,078,302,020,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-29516
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.RaggedTensorToVariant` with arguments specifying an invalid ragged tensor results in a null pointer dereference. The implementation of `RaggedTensorToVariant` operations(https://github.com/tensorflow/tensorflow/blob/904b3926ed1c6...
https://nvd.nist.gov/vuln/detail/CVE-2021-29516
196,683
libjpeg
51c3241b6da39df30f016b63f43f31c4011222c7
https://github.com/thorfdbg/libjpeg
https://github.com/thorfdbg/libjpeg/commit/51c3241b6da39df30f016b63f43f31c4011222c7
Fixed a NULL-pointer access in the line-based reconstruction process in case no valid scan was found and no data is present.
1
void LineBitmapRequester::ReconstructRegion(const RectAngle<LONG> &orgregion,const struct RectangleRequest *rr) { class ColorTrafo *ctrafo = ColorTrafoOf(false,!rr->rr_bColorTrafo); UBYTE i; if (m_bSubsampling && rr->rr_bUpsampling) { for(i = rr->rr_usFirstComponent;i <= rr->rr_usLastComponent;i++) { ...
22,786,320,761,470,908,000,000,000,000,000,000,000
linebitmaprequester.cpp
249,102,353,200,291,350,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-32202
In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2022-32202
242,278
libjpeg
51c3241b6da39df30f016b63f43f31c4011222c7
https://github.com/thorfdbg/libjpeg
https://github.com/thorfdbg/libjpeg/commit/51c3241b6da39df30f016b63f43f31c4011222c7
Fixed a NULL-pointer access in the line-based reconstruction process in case no valid scan was found and no data is present.
0
void LineBitmapRequester::ReconstructRegion(const RectAngle<LONG> &orgregion,const struct RectangleRequest *rr) { class ColorTrafo *ctrafo = ColorTrafoOf(false,!rr->rr_bColorTrafo); UBYTE i; if (m_bSubsampling && rr->rr_bUpsampling) { for(i = rr->rr_usFirstComponent;i <= rr->rr_usLastComponent;i++) { ...
41,706,398,553,486,573,000,000,000,000,000,000,000
linebitmaprequester.cpp
75,196,685,226,911,500,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-32202
In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2022-32202
196,684
tensorflow
6fc9141f42f6a72180ecd24021c3e6b36165fe0d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d
Fix assertion failure in pooling_ops_3d PiperOrigin-RevId: 372364504 Change-Id: Iecde4fe26b47a8fa935d6e2611b5585ed5777781
1
static void launch(OpKernelContext* context, const TensorShape& tensor_in_shape, const Tensor& out_backprop, const std::array<int64, 3>& window, const std::array<int64, 3>& stride, const std::array<int64, 3>& outp...
141,252,726,654,814,530,000,000,000,000,000,000,000
pooling_ops_3d.cc
177,962,698,535,603,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-29577
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) ...
https://nvd.nist.gov/vuln/detail/CVE-2021-29577
242,290
tensorflow
6fc9141f42f6a72180ecd24021c3e6b36165fe0d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6fc9141f42f6a72180ecd24021c3e6b36165fe0d
Fix assertion failure in pooling_ops_3d PiperOrigin-RevId: 372364504 Change-Id: Iecde4fe26b47a8fa935d6e2611b5585ed5777781
0
static void launch(OpKernelContext* context, const TensorShape& tensor_in_shape, const Tensor& out_backprop, const std::array<int64, 3>& window, const std::array<int64, 3>& stride, const std::array<int64, 3>& outp...
294,444,368,887,786,530,000,000,000,000,000,000,000
pooling_ops_3d.cc
70,094,518,751,070,020,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-29577
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) ...
https://nvd.nist.gov/vuln/detail/CVE-2021-29577
196,686
md4c
4fc808d8fe8d8904f8525bb4231d854f45e23a19
https://github.com/mity/md4c
https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19
md_analyze_line: Avoid reading 1 byte beyond the input size. Fixes #155.
1
md_analyze_line(MD_CTX* ctx, OFF beg, OFF* p_end, const MD_LINE_ANALYSIS* pivot_line, MD_LINE_ANALYSIS* line) { unsigned total_indent = 0; int n_parents = 0; int n_brothers = 0; int n_children = 0; MD_CONTAINER container = { 0 }; int prev_line_has_list_loosening_effect = ctx->las...
96,035,180,300,223,760,000,000,000,000,000,000,000
md4c.c
41,009,858,163,502,510,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-30027
md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document.
https://nvd.nist.gov/vuln/detail/CVE-2021-30027
242,464
md4c
4fc808d8fe8d8904f8525bb4231d854f45e23a19
https://github.com/mity/md4c
https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19
md_analyze_line: Avoid reading 1 byte beyond the input size. Fixes #155.
0
md_analyze_line(MD_CTX* ctx, OFF beg, OFF* p_end, const MD_LINE_ANALYSIS* pivot_line, MD_LINE_ANALYSIS* line) { unsigned total_indent = 0; int n_parents = 0; int n_brothers = 0; int n_children = 0; MD_CONTAINER container = { 0 }; int prev_line_has_list_loosening_effect = ctx->las...
195,714,220,958,926,430,000,000,000,000,000,000,000
md4c.c
126,193,858,639,279,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-30027
md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document.
https://nvd.nist.gov/vuln/detail/CVE-2021-30027
196,696
nghttp2
f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
Earlier check for settings flood
1
ssize_t nghttp2_session_mem_recv(nghttp2_session *session, const uint8_t *in, size_t inlen) { const uint8_t *first = in, *last = in + inlen; nghttp2_inbound_frame *iframe = &session->iframe; size_t readlen; ssize_t padlen; int rv; int busy = 0; nghttp2_frame_hd cont_hd; ...
298,735,501,613,373,500,000,000,000,000,000,000,000
None
null
[ "CWE-707" ]
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100...
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
242,728
nghttp2
f8da73bd042f810f34d19f9eae02b46d870af394
https://github.com/nghttp2/nghttp2
https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
Earlier check for settings flood
0
ssize_t nghttp2_session_mem_recv(nghttp2_session *session, const uint8_t *in, size_t inlen) { const uint8_t *first = in, *last = in + inlen; nghttp2_inbound_frame *iframe = &session->iframe; size_t readlen; ssize_t padlen; int rv; int busy = 0; nghttp2_frame_hd cont_hd; ...
217,680,737,255,236,500,000,000,000,000,000,000,000
None
null
[ "CWE-707" ]
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100...
https://nvd.nist.gov/vuln/detail/CVE-2020-11080
196,714
ImageMagick
f6463ca9588579633bbaed9460899d892aa3c64a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a
Zero pixel buffer
1
static Image *ReadJPEGImage(const ImageInfo *image_info, ExceptionInfo *exception) { char value[MagickPathExtent]; const char *option; ErrorManager error_manager; Image *image; JSAMPLE *volatile jpeg_pixels; JSAMPROW scanline[1]; MagickBooleanType debug, status; ...
184,612,899,923,392,700,000,000,000,000,000,000,000
jpeg.c
140,674,320,265,086,580,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-11448
The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11448
243,072
ImageMagick
f6463ca9588579633bbaed9460899d892aa3c64a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f6463ca9588579633bbaed9460899d892aa3c64a
Zero pixel buffer
0
static Image *ReadJPEGImage(const ImageInfo *image_info, ExceptionInfo *exception) { char value[MagickPathExtent]; const char *option; ErrorManager error_manager; Image *image; JSAMPLE *volatile jpeg_pixels; JSAMPROW scanline[1]; MagickBooleanType debug, status; ...
172,659,905,221,303,200,000,000,000,000,000,000,000
jpeg.c
10,190,873,673,155,645,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-11448
The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11448
196,715
tensorflow
32fdcbff9d06d010d908fcc4bd4b36eb3ce15925
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925
Validate arguments of `FractionalMaxPoolGrad` PiperOrigin-RevId: 372274982 Change-Id: If46b0c442efa4eaef635ce6a476717060420122c
1
void Compute(OpKernelContext* context) override { // There are two steps when calculating gradient for FractionalMaxPool. // 1) Walk through the process of calculating fractional pooling given // pooling region; however, in the process, keep track of where the max // element comes from. (arg_max...
1,069,766,852,211,935,300,000,000,000,000,000,000
fractional_max_pool_op.cc
132,429,668,210,309,730,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29580
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty. The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process. The ...
https://nvd.nist.gov/vuln/detail/CVE-2021-29580
243,095
tensorflow
32fdcbff9d06d010d908fcc4bd4b36eb3ce15925
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/32fdcbff9d06d010d908fcc4bd4b36eb3ce15925
Validate arguments of `FractionalMaxPoolGrad` PiperOrigin-RevId: 372274982 Change-Id: If46b0c442efa4eaef635ce6a476717060420122c
0
void Compute(OpKernelContext* context) override { // There are two steps when calculating gradient for FractionalMaxPool. // 1) Walk through the process of calculating fractional pooling given // pooling region; however, in the process, keep track of where the max // element comes from. (arg_max...
95,514,870,069,264,010,000,000,000,000,000,000,000
fractional_max_pool_op.cc
61,833,506,020,194,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29580
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FractionalMaxPoolGrad` triggers an undefined behavior if one of the input tensors is empty. The code is also vulnerable to a denial of service attack as a `CHECK` condition becomes false and aborts the process. The ...
https://nvd.nist.gov/vuln/detail/CVE-2021-29580
196,721
radare2
e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
Fix #12417/#12418 (arm assembler heap overflows)
1
static bool parseOperands(char* str, ArmOp *op) { char *t = strdup (str); int operand = 0; char *token = t; char *x; int imm_count = 0; int mem_opt = 0; if (!token) { return false; } while (token) { char *next = strchr (token, ','); if (next) { *next++ = 0; } while (token[0] == ' ') { token++;...
307,020,922,900,605,000,000,000,000,000,000,000,000
armass64.c
251,080,514,476,755,870,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20457
In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64....
https://nvd.nist.gov/vuln/detail/CVE-2018-20457