idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
243,275 | radare2 | e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | Fix #12417/#12418 (arm assembler heap overflows) | 0 | static bool parseOperands(char* str, ArmOp *op) {
char *t = strdup (str);
int operand = 0;
char *token = t;
char *x;
int imm_count = 0;
int mem_opt = 0;
if (!token) {
return false;
}
while (token) {
char *next = strchr (token, ',');
if (next) {
*next++ = 0;
}
while (token[0] == ' ') {
token++;... | 970,140,649,043,312,100,000,000,000,000,000,000 | armass64.c | 201,736,002,340,352,550,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20457 | In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.... | https://nvd.nist.gov/vuln/detail/CVE-2018-20457 |
196,722 | radare2 | e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | Fix #12417/#12418 (arm assembler heap overflows) | 1 | ut32 armass_assemble(const char *str, ut64 off, int thumb) {
int i, j;
char buf[128];
ArmOpcode aop = {.off = off};
for (i = j = 0; i < sizeof (buf) - 1 && str[i]; i++, j++) {
if (str[j] == '#') {
i--; continue;
}
buf[i] = tolower ((const ut8)str[j]);
}
buf[i] = 0;
arm_opcode_parse (&aop, buf);
aop.off... | 163,124,739,879,640,360,000,000,000,000,000,000,000 | armass.c | 178,825,005,188,026,550,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20457 | In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.... | https://nvd.nist.gov/vuln/detail/CVE-2018-20457 |
243,350 | radare2 | e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | Fix #12417/#12418 (arm assembler heap overflows) | 0 | ut32 armass_assemble(const char *str, ut64 off, int thumb) {
int i, j;
char buf[128];
ArmOpcode aop = {.off = off};
for (i = j = 0; i < sizeof (buf) - 1 && str[j]; i++, j++) {
if (str[j] == '#') {
i--; continue;
}
buf[i] = tolower ((const ut8)str[j]);
}
buf[i] = 0;
arm_opcode_parse (&aop, buf);
aop.off... | 205,538,543,463,412,430,000,000,000,000,000,000,000 | armass.c | 51,560,072,340,479,960,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20457 | In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64.... | https://nvd.nist.gov/vuln/detail/CVE-2018-20457 |
196,725 | NetHack | 612755bfb5c412079795c68ba392df5d93874ed8 | https://github.com/NetHack/NetHack | https://github.com/NetHack/NetHack/commit/612755bfb5c412079795c68ba392df5d93874ed8 | escapes() revamp
Partial rewrite of escapes(), mostly changing its if-then-else
logic so that end-of-string can be checked once instead for each case.
The previous version had a bug if the input string ended with backslash
and one decimal digit (due to being lumped together with the handling
for trailing \X or \O... | 1 | escapes(cp, tp)
const char *cp;
char *tp;
{
while (*cp) {
int cval = 0, meta = 0;
if (*cp == '\\' && cp[1] && index("mM", cp[1]) && cp[2]) {
meta = 1;
cp += 2;
}
if (*cp == '\\' && cp[1] && index("0123456789xXoO", cp[1]) && cp[2]) {
NEARDATA const char hex[] = "00112233445566778899aAbBcCdDeEfF";
... | 249,592,603,022,301,060,000,000,000,000,000,000,000 | options.c | 48,826,738,162,936,170,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2020-5253 | NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0. | https://nvd.nist.gov/vuln/detail/CVE-2020-5253 |
243,386 | NetHack | 612755bfb5c412079795c68ba392df5d93874ed8 | https://github.com/NetHack/NetHack | https://github.com/NetHack/NetHack/commit/612755bfb5c412079795c68ba392df5d93874ed8 | escapes() revamp
Partial rewrite of escapes(), mostly changing its if-then-else
logic so that end-of-string can be checked once instead for each case.
The previous version had a bug if the input string ended with backslash
and one decimal digit (due to being lumped together with the handling
for trailing \X or \O... | 0 | escapes(cp, tp)
const char *cp;
char *tp;
{
static NEARDATA const char
oct[] = "01234567", dec[] = "0123456789",
hex[] = "00112233445566778899aAbBcCdDeEfF";
const char *dp;
int cval, meta, dcount;
while (*cp) {
/* \M has to be followed by something to do meta conversion,
otherwise it will just b... | 336,445,687,602,323,400,000,000,000,000,000,000,000 | options.c | 276,274,058,757,988,200,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2020-5253 | NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0. | https://nvd.nist.gov/vuln/detail/CVE-2020-5253 |
196,731 | gpac | 00194f5fe462123f70b0bae7987317b52898b868 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868 | fixed #1769 (fuzz) | 1 | static GF_Err gf_media_export_filters(GF_MediaExporter *dumper)
{
char *args, szSubArgs[1024], szExt[30];
GF_Filter *file_out, *reframer, *remux=NULL, *src_filter;
GF_FilterSession *fsess;
GF_Err e = GF_OK;
u32 codec_id=0;
u32 sample_count=0;
Bool skip_write_filter = GF_FALSE;
Bool ext_forced = GF_FALSE;
Bool ... | 211,222,235,132,607,380,000,000,000,000,000,000,000 | media_export.c | 241,155,962,394,577,800,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-32438 | The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://nvd.nist.gov/vuln/detail/CVE-2021-32438 |
243,432 | gpac | 00194f5fe462123f70b0bae7987317b52898b868 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868 | fixed #1769 (fuzz) | 0 | static GF_Err gf_media_export_filters(GF_MediaExporter *dumper)
{
char *args, szSubArgs[1024], szExt[30];
GF_Filter *file_out, *reframer, *remux=NULL, *src_filter;
GF_FilterSession *fsess;
GF_Err e = GF_OK;
u32 codec_id=0;
u32 sample_count=0;
Bool skip_write_filter = GF_FALSE;
Bool ext_forced = GF_FALSE;
Bool ... | 143,313,728,759,781,460,000,000,000,000,000,000,000 | media_export.c | 188,944,260,727,094,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-32438 | The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://nvd.nist.gov/vuln/detail/CVE-2021-32438 |
196,769 | inspircd | 7b47de3c194f239c5fea09a0e49696c9af017d51 | https://github.com/inspircd/inspircd | https://github.com/inspircd/inspircd/commit/7b47de3c194f239c5fea09a0e49696c9af017d51 | Copy the silence flags when sending update notifications.
This fixes a crash bug in the silence module on some versions of GCC. | 1 | SilenceMessage(const std::string& mask, const std::string& flags)
: ClientProtocol::Message("SILENCE")
{
PushParam(mask);
PushParamRef(flags);
} | 304,206,330,437,958,530,000,000,000,000,000,000,000 | m_silence.cpp | 264,684,620,566,870,600,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-20918 | An issue was discovered in InspIRCd 3 before 3.1.0. The silence module contains a use after free vulnerability. This vulnerability can be used for remote crashing of an InspIRCd server by any user able to fully connect to a server. | https://nvd.nist.gov/vuln/detail/CVE-2019-20918 |
244,450 | inspircd | 7b47de3c194f239c5fea09a0e49696c9af017d51 | https://github.com/inspircd/inspircd | https://github.com/inspircd/inspircd/commit/7b47de3c194f239c5fea09a0e49696c9af017d51 | Copy the silence flags when sending update notifications.
This fixes a crash bug in the silence module on some versions of GCC. | 0 | SilenceMessage(const std::string& mask, const std::string& flags)
: ClientProtocol::Message("SILENCE")
{
PushParam(mask);
PushParam(flags);
} | 263,570,149,186,995,500,000,000,000,000,000,000,000 | m_silence.cpp | 317,800,603,755,825,970,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-20918 | An issue was discovered in InspIRCd 3 before 3.1.0. The silence module contains a use after free vulnerability. This vulnerability can be used for remote crashing of an InspIRCd server by any user able to fully connect to a server. | https://nvd.nist.gov/vuln/detail/CVE-2019-20918 |
196,780 | gpac | 2320eb73afba753b39b7147be91f7be7afc0eeb7 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7 | fixed potential crash in TS - cf #1264 | 1 | static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status)
{
u32 info_length, pos, desc_len, evt_type, nb_es,i;
u32 nb_sections;
u32 data_size;
u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,... | 334,962,607,977,044,650,000,000,000,000,000,000,000 | mpegts.c | 210,194,444,994,797,430,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-19481 | An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | https://nvd.nist.gov/vuln/detail/CVE-2020-19481 |
244,633 | gpac | 2320eb73afba753b39b7147be91f7be7afc0eeb7 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7 | fixed potential crash in TS - cf #1264 | 0 | static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status)
{
u32 info_length, pos, desc_len, evt_type, nb_es,i;
u32 nb_sections;
u32 data_size;
u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,... | 112,537,723,025,633,120,000,000,000,000,000,000,000 | mpegts.c | 95,224,966,645,898,480,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-19481 | An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | https://nvd.nist.gov/vuln/detail/CVE-2020-19481 |
196,785 | hermes | 86543ac47e59c522976b5632b8bf9a2a4583c7d2 | https://github.com/facebook/hermes | https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2 | Added stack overflow check for hermes::vm:: hermesBuiltinApply
Summary: This adds a missing check for stack overflow.
Reviewed By: tmikov
Differential Revision: D20104955
fbshipit-source-id: 1f37e23d2e28ebcd3aa4176d134b8418e7059ebd | 1 | hermesBuiltinApply(void *, Runtime *runtime, NativeArgs args) {
GCScopeMarkerRAII marker{runtime};
Handle<Callable> fn = args.dyncastArg<Callable>(0);
if (LLVM_UNLIKELY(!fn)) {
return runtime->raiseTypeErrorForValue(
args.getArgHandle(0), " is not a function");
}
Handle<JSArray> argArray = args.... | 174,575,542,735,395,060,000,000,000,000,000,000,000 | HermesBuiltin.cpp | 249,782,678,078,628,440,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-1896 | A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitabl... | https://nvd.nist.gov/vuln/detail/CVE-2020-1896 |
244,865 | hermes | 86543ac47e59c522976b5632b8bf9a2a4583c7d2 | https://github.com/facebook/hermes | https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2 | Added stack overflow check for hermes::vm:: hermesBuiltinApply
Summary: This adds a missing check for stack overflow.
Reviewed By: tmikov
Differential Revision: D20104955
fbshipit-source-id: 1f37e23d2e28ebcd3aa4176d134b8418e7059ebd | 0 | hermesBuiltinApply(void *, Runtime *runtime, NativeArgs args) {
GCScopeMarkerRAII marker{runtime};
Handle<Callable> fn = args.dyncastArg<Callable>(0);
if (LLVM_UNLIKELY(!fn)) {
return runtime->raiseTypeErrorForValue(
args.getArgHandle(0), " is not a function");
}
Handle<JSArray> argArray = args.... | 19,541,113,223,318,184,000,000,000,000,000,000,000 | HermesBuiltin.cpp | 177,450,344,062,382,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-1896 | A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitabl... | https://nvd.nist.gov/vuln/detail/CVE-2020-1896 |
196,786 | inspircd | 6058483d9fbc1b904d5ae7cfea47bfcde5c5b559 | https://github.com/inspircd/inspircd | https://github.com/inspircd/inspircd/commit/6058483d9fbc1b904d5ae7cfea47bfcde5c5b559 | Reject replies to DNS PTR requests that contain invalid characters
Fixes issue #1033 reported by @ping86 | 1 | DNSResult DNS::GetResult()
{
/* Fetch dns query response and decide where it belongs */
DNSHeader header;
DNSRequest *req;
unsigned char buffer[sizeof(DNSHeader)];
irc::sockets::sockaddrs from;
memset(&from, 0, sizeof(from));
socklen_t x = sizeof(from);
int length = ServerInstance->SE->RecvFrom(this, (char*)bu... | 328,794,676,900,590,780,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2015-8702 | The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname. | https://nvd.nist.gov/vuln/detail/CVE-2015-8702 |
244,876 | inspircd | 6058483d9fbc1b904d5ae7cfea47bfcde5c5b559 | https://github.com/inspircd/inspircd | https://github.com/inspircd/inspircd/commit/6058483d9fbc1b904d5ae7cfea47bfcde5c5b559 | Reject replies to DNS PTR requests that contain invalid characters
Fixes issue #1033 reported by @ping86 | 0 | DNSResult DNS::GetResult()
{
/* Fetch dns query response and decide where it belongs */
DNSHeader header;
DNSRequest *req;
unsigned char buffer[sizeof(DNSHeader)];
irc::sockets::sockaddrs from;
memset(&from, 0, sizeof(from));
socklen_t x = sizeof(from);
int length = ServerInstance->SE->RecvFrom(this, (char*)bu... | 217,431,057,955,344,570,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2015-8702 | The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname. | https://nvd.nist.gov/vuln/detail/CVE-2015-8702 |
196,804 | tensorflow | 5117e0851348065ed59c991562c0ec80d9193db2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2 | Prevent a division by 0
PiperOrigin-RevId: 371007407
Change-Id: Iecf2718de48d6bf5a69b02a9df9deda8ec1b19d3 | 1 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
TfLiteTensor* output;
TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output));
TfLiteTensor* hits;
TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 1, &hits));
const TfLiteTensor* lookup;
TF_LITE_ENSURE_OK(context, GetInputSaf... | 150,447,043,883,207,820,000,000,000,000,000,000,000 | hashtable_lookup.cc | 190,145,104,546,114,450,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29604 | TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of hashtable lookup is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115) An attacker can cra... | https://nvd.nist.gov/vuln/detail/CVE-2021-29604 |
245,448 | tensorflow | 5117e0851348065ed59c991562c0ec80d9193db2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2 | Prevent a division by 0
PiperOrigin-RevId: 371007407
Change-Id: Iecf2718de48d6bf5a69b02a9df9deda8ec1b19d3 | 0 | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
TfLiteTensor* output;
TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output));
TfLiteTensor* hits;
TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 1, &hits));
const TfLiteTensor* lookup;
TF_LITE_ENSURE_OK(context, GetInputSaf... | 290,289,615,680,126,660,000,000,000,000,000,000,000 | hashtable_lookup.cc | 198,472,356,523,581,000,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29604 | TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of hashtable lookup is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115) An attacker can cra... | https://nvd.nist.gov/vuln/detail/CVE-2021-29604 |
196,814 | android-gif-drawable | cc5b4f8e43463995a84efd594f89a21f906c2d20 | https://github.com/koral--/android-gif-drawable | https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20 | Do not realloc array if new raster size is 0.
if realloc() is called with 0 size it may return NULL and this will be incorrectly handled
as not enough memory and (also) rasterBits will be freed by realloc but we will not update
it. | 1 | void DDGifSlurp(GifInfo *info, bool decode, bool exitAfterFrame) {
GifRecordType RecordType;
GifByteType *ExtData;
int ExtFunction;
GifFileType *gifFilePtr;
gifFilePtr = info->gifFilePtr;
uint_fast32_t lastAllocatedGCBIndex = 0;
do {
if (DGifGetRecordType(gifFilePtr, &RecordType) == GIF_ERROR) {
break;
}
... | 150,482,942,074,607,440,000,000,000,000,000,000,000 | decoding.c | 142,499,988,501,680,500,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-11932 | A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is ... | https://nvd.nist.gov/vuln/detail/CVE-2019-11932 |
245,684 | android-gif-drawable | cc5b4f8e43463995a84efd594f89a21f906c2d20 | https://github.com/koral--/android-gif-drawable | https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20 | Do not realloc array if new raster size is 0.
if realloc() is called with 0 size it may return NULL and this will be incorrectly handled
as not enough memory and (also) rasterBits will be freed by realloc but we will not update
it. | 0 | void DDGifSlurp(GifInfo *info, bool decode, bool exitAfterFrame) {
GifRecordType RecordType;
GifByteType *ExtData;
int ExtFunction;
GifFileType *gifFilePtr;
gifFilePtr = info->gifFilePtr;
uint_fast32_t lastAllocatedGCBIndex = 0;
do {
if (DGifGetRecordType(gifFilePtr, &RecordType) == GIF_ERROR) {
break;
}
... | 263,262,452,258,428,470,000,000,000,000,000,000,000 | decoding.c | 320,805,815,679,680,400,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-11932 | A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is ... | https://nvd.nist.gov/vuln/detail/CVE-2019-11932 |
196,824 | fbthrift | 01686e15ec77ccb4d49a77d5bce3a01601e54d64 | https://github.com/facebook/fbthrift | https://github.com/facebook/fbthrift/commit/01686e15ec77ccb4d49a77d5bce3a01601e54d64 | Throw on skipping an invalid type.
Summary:
Certain values (e.g.) T_STOP should not appear as a skip type. Allowing them to
can cause thrift to loop unboundedly.
Reviewed By: spalamarchuk
Differential Revision: D15102451
fbshipit-source-id: c08d52f44f37e9c212d3480233ac217105586c9f | 1 | uint32_t skip(Protocol_& prot, TType arg_type) {
switch (arg_type) {
case T_BOOL: {
bool boolv;
return prot.readBool(boolv);
}
case T_BYTE: {
int8_t bytev = 0;
return prot.readByte(bytev);
}
case T_I16: {
int16_t i16;
return prot.readI16(i16);
}
case T_I... | 202,632,401,772,921,150,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-3565 | Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Fa... | https://nvd.nist.gov/vuln/detail/CVE-2019-3565 |
245,840 | fbthrift | 01686e15ec77ccb4d49a77d5bce3a01601e54d64 | https://github.com/facebook/fbthrift | https://github.com/facebook/fbthrift/commit/01686e15ec77ccb4d49a77d5bce3a01601e54d64 | Throw on skipping an invalid type.
Summary:
Certain values (e.g.) T_STOP should not appear as a skip type. Allowing them to
can cause thrift to loop unboundedly.
Reviewed By: spalamarchuk
Differential Revision: D15102451
fbshipit-source-id: c08d52f44f37e9c212d3480233ac217105586c9f | 0 | uint32_t skip(Protocol_& prot, TType arg_type) {
switch (arg_type) {
case T_BOOL: {
bool boolv;
return prot.readBool(boolv);
}
case T_BYTE: {
int8_t bytev = 0;
return prot.readByte(bytev);
}
case T_I16: {
int16_t i16;
return prot.readI16(i16);
}
case T_I... | 38,847,050,272,875,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-3565 | Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Fa... | https://nvd.nist.gov/vuln/detail/CVE-2019-3565 |
196,840 | open5gs | d919b2744cd05abae043490f0a3dd1946c1ccb8c | https://github.com/open5gs/open5gs | https://github.com/open5gs/open5gs/commit/d919b2744cd05abae043490f0a3dd1946c1ccb8c | [AMF] fix the memory problem (#1247)
1. memory corruption
- Overflow num_of_part in SBI message
2. null pointer dereference
- n2InfoContent->ngap_ie_type | 1 | int amf_namf_comm_handle_n1_n2_message_transfer(
ogs_sbi_stream_t *stream, ogs_sbi_message_t *recvmsg)
{
int status;
amf_ue_t *amf_ue = NULL;
amf_sess_t *sess = NULL;
ogs_pkbuf_t *n1buf = NULL;
ogs_pkbuf_t *n2buf = NULL;
ogs_pkbuf_t *gmmbuf = NULL;
ogs_pkbuf_t *ngapbuf = NULL;
... | 129,190,863,934,746,430,000,000,000,000,000,000,000 | namf-handler.c | 141,133,654,398,179,800,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-44109 | A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request. | https://nvd.nist.gov/vuln/detail/CVE-2021-44109 |
246,212 | open5gs | d919b2744cd05abae043490f0a3dd1946c1ccb8c | https://github.com/open5gs/open5gs | https://github.com/open5gs/open5gs/commit/d919b2744cd05abae043490f0a3dd1946c1ccb8c | [AMF] fix the memory problem (#1247)
1. memory corruption
- Overflow num_of_part in SBI message
2. null pointer dereference
- n2InfoContent->ngap_ie_type | 0 | int amf_namf_comm_handle_n1_n2_message_transfer(
ogs_sbi_stream_t *stream, ogs_sbi_message_t *recvmsg)
{
int status;
amf_ue_t *amf_ue = NULL;
amf_sess_t *sess = NULL;
ogs_pkbuf_t *n1buf = NULL;
ogs_pkbuf_t *n2buf = NULL;
ogs_pkbuf_t *gmmbuf = NULL;
ogs_pkbuf_t *ngapbuf = NULL;
... | 309,731,415,351,503,100,000,000,000,000,000,000,000 | namf-handler.c | 281,254,282,341,428,130,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-44109 | A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request. | https://nvd.nist.gov/vuln/detail/CVE-2021-44109 |
196,847 | gpac | 55a183e6b8602369c04ea3836e05436a79fbc7f8 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8 | fixed #2153 | 1 | GF_Err gf_bifs_dec_sf_field(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node, GF_FieldInfo *field, Bool is_mem_com)
{
GF_Err e;
GF_Node *new_node;
u32 size, length, w, h, i;
char *buffer;
//blindly call unquantize. return is OK, error or GF_EOS
if (codec->ActiveQP && node) {
e = gf_bifs_dec_unquant_fiel... | 195,543,721,095,647,000,000,000,000,000,000,000,000 | field_decode.c | 265,454,266,624,884,420,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-1172 | Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV. | https://nvd.nist.gov/vuln/detail/CVE-2022-1172 |
246,506 | gpac | 55a183e6b8602369c04ea3836e05436a79fbc7f8 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8 | fixed #2153 | 0 | GF_Err gf_bifs_dec_sf_field(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node, GF_FieldInfo *field, Bool is_mem_com)
{
GF_Err e;
GF_Node *new_node;
u32 size, length, w, h, i;
char *buffer;
//blindly call unquantize. return is OK, error or GF_EOS
if (codec->ActiveQP && node) {
e = gf_bifs_dec_unquant_fiel... | 186,523,521,865,975,600,000,000,000,000,000,000,000 | field_decode.c | 151,388,572,550,638,560,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-1172 | Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV. | https://nvd.nist.gov/vuln/detail/CVE-2022-1172 |
196,862 | FFmpeg | b0a8b40294ea212c1938348ff112ef1b9bf16bb3 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3 | avcodec/exr: skip bottom clearing loop when its outside the image
Fixes: signed integer overflow: 1633771809 * 32960 cannot be represented in type 'int'
Fixes: 26532/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_EXR_fuzzer-5613925708857344
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tr... | 1 | static int decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *avpkt)
{
EXRContext *s = avctx->priv_data;
ThreadFrame frame = { .f = data };
AVFrame *picture = data;
uint8_t *ptr;
int i, y, ret, ymax;
int planes;
int out_line_size;
int nb_bl... | 61,000,637,100,548,170,000,000,000,000,000,000,000 | exr.c | 49,942,830,372,792,630,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-35965 | decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations. | https://nvd.nist.gov/vuln/detail/CVE-2020-35965 |
246,769 | FFmpeg | b0a8b40294ea212c1938348ff112ef1b9bf16bb3 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3 | avcodec/exr: skip bottom clearing loop when its outside the image
Fixes: signed integer overflow: 1633771809 * 32960 cannot be represented in type 'int'
Fixes: 26532/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_EXR_fuzzer-5613925708857344
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tr... | 0 | static int decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *avpkt)
{
EXRContext *s = avctx->priv_data;
ThreadFrame frame = { .f = data };
AVFrame *picture = data;
uint8_t *ptr;
int i, y, ret, ymax;
int planes;
int out_line_size;
int nb_bl... | 212,360,480,020,348,240,000,000,000,000,000,000,000 | exr.c | 143,723,358,461,478,950,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-35965 | decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations. | https://nvd.nist.gov/vuln/detail/CVE-2020-35965 |
196,863 | ImageMagick | 13267a10845a8dadabed63072b537f050cec6daa | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/13267a10845a8dadabed63072b537f050cec6daa | Changed the JPEG writer to raise a warning when the exif profile exceeds 65533 bytes and truncate it. | 1 | static void WriteProfile(j_compress_ptr jpeg_info,Image *image)
{
const char
*name;
const StringInfo
*profile;
MagickBooleanType
iptc;
register ssize_t
i;
size_t
length,
tag_length;
StringInfo
*custom_profile;
/*
Save image profile as a APP marker.
*/
iptc=MagickF... | 37,118,065,200,137,287,000,000,000,000,000,000,000 | jpeg.c | 88,998,279,270,214,160,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-10052 | Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10052 |
246,778 | ImageMagick | 13267a10845a8dadabed63072b537f050cec6daa | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/13267a10845a8dadabed63072b537f050cec6daa | Changed the JPEG writer to raise a warning when the exif profile exceeds 65533 bytes and truncate it. | 0 | static void WriteProfile(j_compress_ptr jpeg_info,Image *image,
ExceptionInfo *exception)
{
const char
*name;
const StringInfo
*profile;
MagickBooleanType
iptc;
register ssize_t
i;
size_t
length,
tag_length;
StringInfo
*custom_profile;
/*
Save image profile as a APP... | 66,114,314,573,460,830,000,000,000,000,000,000,000 | jpeg.c | 327,209,937,172,551,450,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-10052 | Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10052 |
196,872 | winscp | 49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54 | https://github.com/winscp/winscp | https://github.com/winscp/winscp/commit/49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54 | Bug 1675: Prevent SCP server sending files that were not requested
https://winscp.net/tracker/1675
Source commit: 4aa587620973bf793fb6e783052277c0f7be4b55 | 1 | void __fastcall TSCPFileSystem::SCPSink(const UnicodeString TargetDir,
const UnicodeString FileName, const UnicodeString SourceDir,
const TCopyParamType * CopyParam, bool & Success,
TFileOperationProgressType * OperationProgress, int Params,
int Level)
{
struct
{
int SetTime;
TDateTime Modi... | 161,338,198,425,055,810,000,000,000,000,000,000,000 | ScpFileSystem.cpp | 46,647,030,378,103,760,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20684 | In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-20684 |
246,939 | winscp | 49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54 | https://github.com/winscp/winscp | https://github.com/winscp/winscp/commit/49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54 | Bug 1675: Prevent SCP server sending files that were not requested
https://winscp.net/tracker/1675
Source commit: 4aa587620973bf793fb6e783052277c0f7be4b55 | 0 | void __fastcall TSCPFileSystem::SCPSink(const UnicodeString TargetDir,
const UnicodeString FileName, const UnicodeString SourceDir,
const TCopyParamType * CopyParam, bool & Success,
TFileOperationProgressType * OperationProgress, int Params,
int Level)
{
struct
{
int SetTime;
TDateTime Modi... | 324,511,619,249,502,660,000,000,000,000,000,000,000 | ScpFileSystem.cpp | 1,443,874,472,268,286,500,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20684 | In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-20684 |
196,881 | tensorflow | b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d | Prevent division by 0
PiperOrigin-RevId: 370998952
Change-Id: I6b1d49079624ee1447d2d9b53a8976fb356cc8f5 | 1 | TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node,
const TfLiteTensor* axis,
const TfLiteTensor* input, int num_splits) {
int axis_value = GetTensorData<int>(axis)[0];
if (axis_value < 0) {
axis_value += NumDimensions(inpu... | 331,934,852,386,619,300,000,000,000,000,000,000,000 | split.cc | 222,200,902,758,696,620,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29599 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `Split` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65). An attacker can craft a mod... | https://nvd.nist.gov/vuln/detail/CVE-2021-29599 |
247,073 | tensorflow | b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d | Prevent division by 0
PiperOrigin-RevId: 370998952
Change-Id: I6b1d49079624ee1447d2d9b53a8976fb356cc8f5 | 0 | TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node,
const TfLiteTensor* axis,
const TfLiteTensor* input, int num_splits) {
int axis_value = GetTensorData<int>(axis)[0];
if (axis_value < 0) {
axis_value += NumDimensions(inpu... | 256,662,144,583,757,840,000,000,000,000,000,000,000 | split.cc | 15,669,385,354,856,113,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29599 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `Split` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65). An attacker can craft a mod... | https://nvd.nist.gov/vuln/detail/CVE-2021-29599 |
196,917 | opencv | d1615ba11a93062b1429fce9f0f638d1572d3418 | https://github.com/opencv/opencv | https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418 | video:fixed DISOpticalFlow segfault from small img | 1 | void DISOpticalFlowImpl::calc(InputArray I0, InputArray I1, InputOutputArray flow)
{
CV_Assert(!I0.empty() && I0.depth() == CV_8U && I0.channels() == 1);
CV_Assert(!I1.empty() && I1.depth() == CV_8U && I1.channels() == 1);
CV_Assert(I0.sameSize(I1));
CV_Assert(I0.isContinuous());
CV_Assert(I1.isCont... | 325,450,862,465,696,100,000,000,000,000,000,000,000 | dis_flow.cpp | 38,818,151,150,903,870,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-19624 | An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat... | https://nvd.nist.gov/vuln/detail/CVE-2019-19624 |
248,173 | opencv | d1615ba11a93062b1429fce9f0f638d1572d3418 | https://github.com/opencv/opencv | https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418 | video:fixed DISOpticalFlow segfault from small img | 0 | void DISOpticalFlowImpl::calc(InputArray I0, InputArray I1, InputOutputArray flow)
{
CV_Assert(!I0.empty() && I0.depth() == CV_8U && I0.channels() == 1);
CV_Assert(!I1.empty() && I1.depth() == CV_8U && I1.channels() == 1);
CV_Assert(I0.sameSize(I1));
CV_Assert(I0.isContinuous());
CV_Assert(I1.isCont... | 105,699,457,377,157,900,000,000,000,000,000,000,000 | dis_flow.cpp | 252,275,051,152,586,820,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-19624 | An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat... | https://nvd.nist.gov/vuln/detail/CVE-2019-19624 |
196,918 | opencv | d1615ba11a93062b1429fce9f0f638d1572d3418 | https://github.com/opencv/opencv | https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418 | video:fixed DISOpticalFlow segfault from small img | 1 | bool DISOpticalFlowImpl::ocl_calc(InputArray I0, InputArray I1, InputOutputArray flow)
{
UMat I0Mat = I0.getUMat();
UMat I1Mat = I1.getUMat();
bool use_input_flow = false;
if (flow.sameSize(I0) && flow.depth() == CV_32F && flow.channels() == 2)
use_input_flow = true;
else
flow.create... | 317,184,864,454,707,200,000,000,000,000,000,000,000 | dis_flow.cpp | 38,818,151,150,903,870,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-19624 | An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat... | https://nvd.nist.gov/vuln/detail/CVE-2019-19624 |
248,172 | opencv | d1615ba11a93062b1429fce9f0f638d1572d3418 | https://github.com/opencv/opencv | https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418 | video:fixed DISOpticalFlow segfault from small img | 0 | bool DISOpticalFlowImpl::ocl_calc(InputArray I0, InputArray I1, InputOutputArray flow)
{
UMat I0Mat = I0.getUMat();
UMat I1Mat = I1.getUMat();
bool use_input_flow = false;
if (flow.sameSize(I0) && flow.depth() == CV_32F && flow.channels() == 2)
use_input_flow = true;
else
flow.create... | 144,233,703,505,522,000,000,000,000,000,000,000,000 | dis_flow.cpp | 252,275,051,152,586,820,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-19624 | An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat... | https://nvd.nist.gov/vuln/detail/CVE-2019-19624 |
196,922 | tensorflow | ea50a40e84f6bff15a0912728e35b657548cef11 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11 | Fix failed check in SparseTensorToCSRSparseMatrix
Security vulnerability fix. A `CHECK` fails if inputing either an empty `dense_shape`,
or a non-rank-2 `indices`. Added appropriate checks and tests.
PiperOrigin-RevId: 446053984 | 1 | void Compute(OpKernelContext* ctx) final {
const Tensor& indices = ctx->input(0);
const Tensor& values = ctx->input(1);
const Tensor& dense_shape = ctx->input(2);
const int rank = dense_shape.NumElements();
OP_REQUIRES(ctx, rank == 2 || rank == 3,
errors::InvalidArgument("SparseTen... | 197,596,152,635,651,330,000,000,000,000,000,000,000 | sparse_tensor_to_csr_sparse_matrix_op.cc | 107,330,599,934,320,900,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29198 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29198 |
248,337 | tensorflow | ea50a40e84f6bff15a0912728e35b657548cef11 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11 | Fix failed check in SparseTensorToCSRSparseMatrix
Security vulnerability fix. A `CHECK` fails if inputing either an empty `dense_shape`,
or a non-rank-2 `indices`. Added appropriate checks and tests.
PiperOrigin-RevId: 446053984 | 0 | void Compute(OpKernelContext* ctx) final {
const Tensor& indices = ctx->input(0);
const Tensor& values = ctx->input(1);
const Tensor& dense_shape = ctx->input(2);
const int rank = dense_shape.NumElements();
OP_REQUIRES(
ctx, TensorShapeUtils::IsVector(dense_shape.shape()),
errors::... | 171,379,670,951,783,640,000,000,000,000,000,000,000 | sparse_tensor_to_csr_sparse_matrix_op.cc | 166,764,023,293,945,800,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29198 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29198 |
196,924 | tensorflow | e6340f0665d53716ef3197ada88936c2a5f7a2d3 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3 | Handle a special grappler case resulting in crash.
It might happen that a malformed input could be used to trick Grappler into trying to optimize a node with no inputs. This, in turn, would produce a null pointer dereference and a segfault.
PiperOrigin-RevId: 369242852
Change-Id: I2e5cbe7aec243d34a6d60220ac8ac9b16f13... | 1 | Status TrySimplify(NodeDef* consumer, string* simplified_node_name) override {
NodeDef* producer;
TF_RETURN_IF_ERROR(GetInputNode(consumer->input(0), &producer));
const bool producer_is_cast = IsCastLike(*producer);
const bool can_optimize =
!IsCheckNumerics(*producer) &&
((producer_is... | 204,527,200,722,295,960,000,000,000,000,000,000,000 | arithmetic_optimizer.cc | 251,818,740,065,180,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-29616 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointe... | https://nvd.nist.gov/vuln/detail/CVE-2021-29616 |
248,381 | tensorflow | e6340f0665d53716ef3197ada88936c2a5f7a2d3 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3 | Handle a special grappler case resulting in crash.
It might happen that a malformed input could be used to trick Grappler into trying to optimize a node with no inputs. This, in turn, would produce a null pointer dereference and a segfault.
PiperOrigin-RevId: 369242852
Change-Id: I2e5cbe7aec243d34a6d60220ac8ac9b16f13... | 0 | Status TrySimplify(NodeDef* consumer, string* simplified_node_name) override {
NodeDef* producer;
if (consumer->input_size() < 1) {
return errors::FailedPrecondition("Node ", simplified_node_name,
" lacks inputs");
}
TF_RETURN_IF_ERROR(GetInputNode(consu... | 178,924,406,196,793,520,000,000,000,000,000,000,000 | arithmetic_optimizer.cc | 339,917,451,426,958,500,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-29616 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointe... | https://nvd.nist.gov/vuln/detail/CVE-2021-29616 |
196,936 | libmysofa | 2e6fac6ab6156dae8e8c6f417741388084b70d6f | https://github.com/hoene/libmysofa | https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f | Fixed recursive function calls | 1 | static int directblockRead(struct READER *reader, struct DATAOBJECT *dataobject,
struct FRACTALHEAP *fractalheap) {
char buf[4], *name, *value;
int size, offset_size, length_size, err, len;
uint8_t typeandversion;
uint64_t unknown, heap_header_address, block_offset, block_size, offset,
length;
long store;
s... | 194,147,979,693,446,200,000,000,000,000,000,000,000 | fractalhead.c | 304,011,301,597,710,720,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-20016 | libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue. | https://nvd.nist.gov/vuln/detail/CVE-2019-20016 |
248,728 | libmysofa | 2e6fac6ab6156dae8e8c6f417741388084b70d6f | https://github.com/hoene/libmysofa | https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f | Fixed recursive function calls | 0 | static int directblockRead(struct READER *reader, struct DATAOBJECT *dataobject,
struct FRACTALHEAP *fractalheap) {
char buf[4], *name, *value;
int size, offset_size, length_size, err, len;
uint8_t typeandversion;
uint64_t unknown, heap_header_address, block_offset, block_size, offset,
length;
long store;
s... | 28,560,801,298,190,365,000,000,000,000,000,000,000 | fractalhead.c | 19,957,013,343,427,520,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-20016 | libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue. | https://nvd.nist.gov/vuln/detail/CVE-2019-20016 |
196,943 | deark | 287f5ac31dfdc074669182f51ece637706070eeb | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/287f5ac31dfdc074669182f51ece637706070eeb | pict: Fixed a bug with ICC profile extraction
Could cause a NULL pointer dereference.
Found by F. Çelik. | 1 | static void do_iccprofile_item(deark *c, lctx *d, i64 pos, i64 len)
{
i64 selector;
i64 data_len;
if(len<4) return;
selector = de_getu32be(pos);
data_len = len-4;
de_dbg(c, "ICC profile segment, selector=%d, data len=%d", (int)selector,
(int)data_len);
if(selector!=1) {
// If this is not a Continuation seg... | 40,975,817,692,116,526,000,000,000,000,000,000,000 | pict.c | 321,838,767,434,444,900,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-28855 | In Deark before 1.5.8, a specially crafted input file can cause a NULL pointer dereference in the dbuf_write function (src/deark-dbuf.c). | https://nvd.nist.gov/vuln/detail/CVE-2021-28855 |
248,852 | deark | 287f5ac31dfdc074669182f51ece637706070eeb | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/287f5ac31dfdc074669182f51ece637706070eeb | pict: Fixed a bug with ICC profile extraction
Could cause a NULL pointer dereference.
Found by F. Çelik. | 0 | static void do_iccprofile_item(deark *c, lctx *d, i64 pos, i64 len)
{
i64 selector;
i64 data_len;
if(len<4) return;
selector = de_getu32be(pos);
data_len = len-4;
de_dbg(c, "ICC profile segment, selector=%d, data len=%d", (int)selector,
(int)data_len);
if(selector!=1) {
// If this is not a Continuation seg... | 79,538,085,167,000,470,000,000,000,000,000,000,000 | pict.c | 158,066,697,177,162,210,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-28855 | In Deark before 1.5.8, a specially crafted input file can cause a NULL pointer dereference in the dbuf_write function (src/deark-dbuf.c). | https://nvd.nist.gov/vuln/detail/CVE-2021-28855 |
196,944 | ImageMagick | 307fa45d512641fcd105f0d57ca50c1437cd1b81 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/307fa45d512641fcd105f0d57ca50c1437cd1b81 | https://github.com/ImageMagick/ImageMagick/issues/542 | 1 | static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
page_geometry[MagickPathExtent];
Image
*image;
MagickBooleanType
logging;
volatile int
first_mng_object,
object_id,
term_chunk_found,
skip_to_iend;
volatile ssize... | 186,675,766,236,936,280,000,000,000,000,000,000,000 | png.c | 323,382,477,396,108,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12640 | ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12640 |
248,870 | ImageMagick | 307fa45d512641fcd105f0d57ca50c1437cd1b81 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/307fa45d512641fcd105f0d57ca50c1437cd1b81 | https://github.com/ImageMagick/ImageMagick/issues/542 | 0 | static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
page_geometry[MagickPathExtent];
Image
*image;
MagickBooleanType
logging;
volatile int
first_mng_object,
object_id,
term_chunk_found,
skip_to_iend;
volatile ssize... | 213,059,461,435,564,030,000,000,000,000,000,000,000 | png.c | 228,033,773,830,255,870,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12640 | ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12640 |
196,987 | GameNetworkingSockets | d944a10808891d202bb1d5e1998de6e0423af678 | https://github.com/ValveSoftware/GameNetworkingSockets | https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678 | Tweak pointer math to avoid possible integer overflow | 1 | void CConnectionTransportUDPBase::Received_Data( const uint8 *pPkt, int cbPkt, SteamNetworkingMicroseconds usecNow )
{
if ( cbPkt < sizeof(UDPDataMsgHdr) )
{
ReportBadUDPPacketFromConnectionPeer( "DataPacket", "Packet of size %d is too small.", cbPkt );
return;
}
// Check cookie
const UDPDataMsgHdr *hdr = (c... | 122,503,328,740,501,540,000,000,000,000,000,000,000 | steamnetworkingsockets_udp.cpp | 65,779,715,295,261,640,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-6019 | Valve's Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-6019 |
249,339 | GameNetworkingSockets | d944a10808891d202bb1d5e1998de6e0423af678 | https://github.com/ValveSoftware/GameNetworkingSockets | https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678 | Tweak pointer math to avoid possible integer overflow | 0 | void CConnectionTransportUDPBase::Received_Data( const uint8 *pPkt, int cbPkt, SteamNetworkingMicroseconds usecNow )
{
if ( cbPkt < sizeof(UDPDataMsgHdr) )
{
ReportBadUDPPacketFromConnectionPeer( "DataPacket", "Packet of size %d is too small.", cbPkt );
return;
}
// Check cookie
const UDPDataMsgHdr *hdr = (c... | 3,143,644,977,558,350,500,000,000,000,000,000,000 | steamnetworkingsockets_udp.cpp | 314,863,423,454,612,500,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-6019 | Valve's Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-6019 |
196,994 | Pillow | 893a40850c2d5da41537958e40569c029a6e127b | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b | FLI overflow error fix and testcase CVE-2016-0775 | 1 | ImagingFliDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes)
{
UINT8* ptr;
int framesize;
int c, chunks;
int l, lines;
int i, j, x = 0, y, ymax;
/* If not even the chunk size is present, we'd better leave */
if (bytes < 4)
return 0;
/* We don't decode anything unless ... | 251,458,799,984,279,740,000,000,000,000,000,000,000 | FliDecode.c | 222,240,474,666,437,850,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-0775 | Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. | https://nvd.nist.gov/vuln/detail/CVE-2016-0775 |
249,520 | Pillow | 893a40850c2d5da41537958e40569c029a6e127b | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b | FLI overflow error fix and testcase CVE-2016-0775 | 0 | ImagingFliDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes)
{
UINT8* ptr;
int framesize;
int c, chunks;
int l, lines;
int i, j, x = 0, y, ymax;
/* If not even the chunk size is present, we'd better leave */
if (bytes < 4)
return 0;
/* We don't decode anything unless ... | 292,954,145,023,856,770,000,000,000,000,000,000,000 | FliDecode.c | 302,782,447,341,432,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-0775 | Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. | https://nvd.nist.gov/vuln/detail/CVE-2016-0775 |
196,995 | tensorflow | c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9 | Fix the CHECK failure in tf.raw_ops.QuantizeAndDequantizeV2.
PiperOrigin-RevId: 371361603
Change-Id: Ia70e34d41adaadddf928e95e5e5c5c97d5bc60d0 | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor& input = ctx->input(0);
OP_REQUIRES(
ctx, (axis_ == -1 || axis_ < input.shape().dims()),
errors::InvalidArgument("Shape must be at least rank ", axis_ + 1,
" but is rank ", input.shape().dims()));
co... | 73,797,812,585,588,640,000,000,000,000,000,000,000 | quantize_and_dequantize_op.cc | 111,820,661,822,757,210,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-29610 | TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_... | https://nvd.nist.gov/vuln/detail/CVE-2021-29610 |
249,521 | tensorflow | c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9 | Fix the CHECK failure in tf.raw_ops.QuantizeAndDequantizeV2.
PiperOrigin-RevId: 371361603
Change-Id: Ia70e34d41adaadddf928e95e5e5c5c97d5bc60d0 | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor& input = ctx->input(0);
OP_REQUIRES(
ctx, axis_ >= -1,
errors::InvalidArgument("Axis must be at least -1. Found ", axis_));
OP_REQUIRES(
ctx, (axis_ == -1 || axis_ < input.shape().dims()),
errors::InvalidArgument("S... | 254,060,771,784,812,060,000,000,000,000,000,000,000 | quantize_and_dequantize_op.cc | 149,077,864,405,379,840,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-29610 | TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_... | https://nvd.nist.gov/vuln/detail/CVE-2021-29610 |
196,996 | tensorflow | 290bb05c80c327ed74fae1d089f1001b1e2a4ef7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7 | Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata.
Check that input is actually a scalar before treating it as such.
PiperOrigin-RevId: 445197183 | 1 | void Compute(OpKernelContext* c) override {
const Tensor& tag = c->input(0);
OP_REQUIRES(c, TensorShapeUtils::IsScalar(tag.shape()),
errors::InvalidArgument("tag must be scalar"));
const Tensor& tensor = c->input(1);
const Tensor& serialized_summary_metadata_tensor = c->input(2);
... | 84,074,343,442,696,900,000,000,000,000,000,000,000 | summary_tensor_op.cc | 110,658,907,251,646,350,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29193 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29193 |
249,526 | tensorflow | 290bb05c80c327ed74fae1d089f1001b1e2a4ef7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7 | Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata.
Check that input is actually a scalar before treating it as such.
PiperOrigin-RevId: 445197183 | 0 | void Compute(OpKernelContext* c) override {
const Tensor& tag = c->input(0);
OP_REQUIRES(c, TensorShapeUtils::IsScalar(tag.shape()),
errors::InvalidArgument("tag must be scalar"));
const Tensor& tensor = c->input(1);
const Tensor& serialized_summary_metadata_tensor = c->input(2);
O... | 220,120,881,288,790,100,000,000,000,000,000,000,000 | summary_tensor_op.cc | 126,987,776,080,380,960,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29193 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29193 |
196,999 | LibRaw | f1394822a0152ceed77815eafa5cac4e8baab10a | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a | SECUNIA advisory 76000 #1 (wrong fuji width set via tiff tag | 1 | void CLASS panasonic_load_raw()
{
int row, col, i, j, sh = 0, pred[2], nonz[2];
pana_bits(0);
for (row = 0; row < height; row++)
{
#ifdef LIBRAW_LIBRARY_BUILD
checkCancel();
#endif
for (col = 0; col < raw_width; col++)
{
if ((i = col % 14) == 0)
pred[0] = pred[1] = nonz[0] = nonz[1] =... | 321,977,543,448,925,350,000,000,000,000,000,000,000 | dcraw.c | 328,099,487,843,809,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16909 | An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image. | https://nvd.nist.gov/vuln/detail/CVE-2017-16909 |
249,565 | LibRaw | f1394822a0152ceed77815eafa5cac4e8baab10a | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a | SECUNIA advisory 76000 #1 (wrong fuji width set via tiff tag | 0 | void CLASS panasonic_load_raw()
{
int row, col, i, j, sh = 0, pred[2], nonz[2];
pana_bits(0);
for (row = 0; row < raw_height; row++)
{
#ifdef LIBRAW_LIBRARY_BUILD
checkCancel();
#endif
for (col = 0; col < raw_width; col++)
{
if ((i = col % 14) == 0)
pred[0] = pred[1] = nonz[0] = nonz[... | 28,757,662,744,153,570,000,000,000,000,000,000,000 | dcraw.c | 244,721,317,821,702,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16909 | An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image. | https://nvd.nist.gov/vuln/detail/CVE-2017-16909 |
197,000 | csync2 | 416f1de878ef97e27e27508914f7ba8599a0be22 | https://github.com/LINBIT/csync2 | https://github.com/LINBIT/csync2/commit/416f1de878ef97e27e27508914f7ba8599a0be22 | fail HELLO command when SSL is required | 1 | void csync_daemon_session()
{
static char line[4 * 4096];
struct stat sb;
address_t peername = { .sa.sa_family = AF_UNSPEC, };
socklen_t peerlen = sizeof(peername);
char *peer=0, *tag[32];
int i;
if (fstat(0, &sb))
csync_fatal("Can't run fstat on fd 0: %s", strerror(errno));
switch (sb.st_mode & S_IFMT) {
... | 131,823,341,139,697,040,000,000,000,000,000,000,000 | daemon.c | 233,864,296,026,741,300,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2019-15522 | An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL. | https://nvd.nist.gov/vuln/detail/CVE-2019-15522 |
249,650 | csync2 | 416f1de878ef97e27e27508914f7ba8599a0be22 | https://github.com/LINBIT/csync2 | https://github.com/LINBIT/csync2/commit/416f1de878ef97e27e27508914f7ba8599a0be22 | fail HELLO command when SSL is required | 0 | void csync_daemon_session()
{
static char line[4 * 4096];
struct stat sb;
address_t peername = { .sa.sa_family = AF_UNSPEC, };
socklen_t peerlen = sizeof(peername);
char *peer=0, *tag[32];
int i;
if (fstat(0, &sb))
csync_fatal("Can't run fstat on fd 0: %s", strerror(errno));
switch (sb.st_mode & S_IFMT) {
... | 261,261,767,210,913,520,000,000,000,000,000,000,000 | daemon.c | 94,641,518,426,319,400,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2019-15522 | An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL. | https://nvd.nist.gov/vuln/detail/CVE-2019-15522 |
197,009 | qemu | ebf101955ce8f8d72fba103b5151115a4335de2c | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/ebf101955ce8f8d72fba103b5151115a4335de2c | virtiofsd: avoid /proc/self/fd tempdir
In order to prevent /proc/self/fd escapes a temporary directory is
created where /proc/self/fd is bind-mounted. This doesn't work on
read-only file systems.
Avoid the temporary directory by bind-mounting /proc/self/fd over /proc.
This does not affect other processes since we rem... | 1 | static void setup_namespaces(struct lo_data *lo, struct fuse_session *se)
{
pid_t child;
char template[] = "virtiofsd-XXXXXX";
char *tmpdir;
/*
* Create a new pid namespace for *child* processes. We'll have to
* fork in order to enter the new pid namespace. A new mount namespace
* is a... | 178,505,660,106,590,470,000,000,000,000,000,000,000 | passthrough_ll.c | 230,166,035,770,931,700,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2020-35517 | A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices. | https://nvd.nist.gov/vuln/detail/CVE-2020-35517 |
249,904 | qemu | ebf101955ce8f8d72fba103b5151115a4335de2c | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/ebf101955ce8f8d72fba103b5151115a4335de2c | virtiofsd: avoid /proc/self/fd tempdir
In order to prevent /proc/self/fd escapes a temporary directory is
created where /proc/self/fd is bind-mounted. This doesn't work on
read-only file systems.
Avoid the temporary directory by bind-mounting /proc/self/fd over /proc.
This does not affect other processes since we rem... | 0 | static void setup_namespaces(struct lo_data *lo, struct fuse_session *se)
{
pid_t child;
/*
* Create a new pid namespace for *child* processes. We'll have to
* fork in order to enter the new pid namespace. A new mount namespace
* is also needed so that we can remount /proc for the new pid
... | 112,273,463,360,716,940,000,000,000,000,000,000,000 | passthrough_ll.c | 184,303,727,564,008,100,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2020-35517 | A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices. | https://nvd.nist.gov/vuln/detail/CVE-2020-35517 |
197,011 | tensorflow | 79865b542f9ffdc9caeb255631f7c56f1d4b6517 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517 | Fix memory corruption issue with `tf.raw_ops.DrawBoundingBoxesV2`.
PiperOrigin-RevId: 372033910
Change-Id: I8a9f4efc1c8ddaacbc26ec1fbe4bfdd6791c226d | 1 | void Compute(OpKernelContext* context) override {
const Tensor& images = context->input(0);
const Tensor& boxes = context->input(1);
const int64 depth = images.dim_size(3);
OP_REQUIRES(context, images.dims() == 4,
errors::InvalidArgument("The rank of the images should be 4"));
OP_... | 118,761,552,607,594,430,000,000,000,000,000,000,000 | draw_bounding_box_op.cc | 271,052,095,263,737,130,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-29571 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77... | https://nvd.nist.gov/vuln/detail/CVE-2021-29571 |
249,961 | tensorflow | 79865b542f9ffdc9caeb255631f7c56f1d4b6517 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517 | Fix memory corruption issue with `tf.raw_ops.DrawBoundingBoxesV2`.
PiperOrigin-RevId: 372033910
Change-Id: I8a9f4efc1c8ddaacbc26ec1fbe4bfdd6791c226d | 0 | void Compute(OpKernelContext* context) override {
const Tensor& images = context->input(0);
const Tensor& boxes = context->input(1);
const int64 depth = images.dim_size(3);
OP_REQUIRES(context, images.dims() == 4,
errors::InvalidArgument("The rank of the images should be 4"));
OP_... | 189,275,285,499,168,400,000,000,000,000,000,000,000 | draw_bounding_box_op.cc | 89,877,513,169,299,290,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-29571 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77... | https://nvd.nist.gov/vuln/detail/CVE-2021-29571 |
197,017 | ImageMagick | e45e48b881038487d0bc94d92a16c1537616cc0a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e45e48b881038487d0bc94d92a16c1537616cc0a | Suspend exception processing if too many exceptions | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 210,602,903,201,979,360,000,000,000,000,000,000,000 | viff.c | 14,051,023,595,321,186,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-10066 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10066 |
250,034 | ImageMagick | e45e48b881038487d0bc94d92a16c1537616cc0a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e45e48b881038487d0bc94d92a16c1537616cc0a | Suspend exception processing if too many exceptions | 0 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 247,878,191,581,406,800,000,000,000,000,000,000,000 | viff.c | 200,527,251,491,055,150,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-10066 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10066 |
197,027 | ImageMagick | bdbbb13f1fe9b7e2465502c500561720f7456aac | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bdbbb13f1fe9b7e2465502c500561720f7456aac | https://github.com/ImageMagick/ImageMagick/issues/715 | 1 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 113,324,474,149,406,740,000,000,000,000,000,000,000 | ps.c | 12,038,977,322,774,740,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-14172 | In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CP... | https://nvd.nist.gov/vuln/detail/CVE-2017-14172 |
250,052 | ImageMagick | bdbbb13f1fe9b7e2465502c500561720f7456aac | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bdbbb13f1fe9b7e2465502c500561720f7456aac | https://github.com/ImageMagick/ImageMagick/issues/715 | 0 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 193,985,269,216,754,120,000,000,000,000,000,000,000 | ps.c | 147,883,543,833,169,960,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-14172 | In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CP... | https://nvd.nist.gov/vuln/detail/CVE-2017-14172 |
197,038 | wolfssl | fb2288c46dd4c864b78f00a47a364b96a09a5c0f | https://github.com/wolfSSL/wolfssl | https://github.com/wolfSSL/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f | RSA-PSS: Handle edge case with encoding message to hash
When the key is small relative to the digest (1024-bit key, 64-byte
hash, 61-byte salt length), the internal message to hash is larger than
the output size.
Allocate a buffer for the message when this happens. | 1 | static int RsaPad_PSS(const byte* input, word32 inputLen, byte* pkcsBlock,
word32 pkcsBlockLen, WC_RNG* rng, enum wc_HashType hType, int mgf,
int saltLen, int bits, void* heap)
{
int ret = 0;
int hLen, i, o, maskLen, hiBits;
byte* m;
byte* s;
#if defined(WOLFSSL_PSS_LONG_SALT) || def... | 135,482,897,559,676,240,000,000,000,000,000,000,000 | rsa.c | 97,367,046,628,886,640,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2020-36177 | RsaPad_PSS in wolfcrypt/src/rsa.c in wolfSSL before 4.6.0 has an out-of-bounds write for certain relationships between key size and digest size. | https://nvd.nist.gov/vuln/detail/CVE-2020-36177 |
250,254 | wolfssl | fb2288c46dd4c864b78f00a47a364b96a09a5c0f | https://github.com/wolfSSL/wolfssl | https://github.com/wolfSSL/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f | RSA-PSS: Handle edge case with encoding message to hash
When the key is small relative to the digest (1024-bit key, 64-byte
hash, 61-byte salt length), the internal message to hash is larger than
the output size.
Allocate a buffer for the message when this happens. | 0 | static int RsaPad_PSS(const byte* input, word32 inputLen, byte* pkcsBlock,
word32 pkcsBlockLen, WC_RNG* rng, enum wc_HashType hType, int mgf,
int saltLen, int bits, void* heap)
{
int ret = 0;
int hLen, i, o, maskLen, hiBits;
byte* m;
byte* s;
#if defined(WOLFSSL_NO_MALLOC) && !define... | 182,933,276,051,351,070,000,000,000,000,000,000,000 | rsa.c | 134,635,770,565,341,240,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2020-36177 | RsaPad_PSS in wolfcrypt/src/rsa.c in wolfSSL before 4.6.0 has an out-of-bounds write for certain relationships between key size and digest size. | https://nvd.nist.gov/vuln/detail/CVE-2020-36177 |
197,040 | ImageMagick | 0c5b1e430a83ef793a7334bbbee408cf3c628699 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0c5b1e430a83ef793a7334bbbee408cf3c628699 | Added check to prevent image being 0x0 (reported in #489). | 1 | static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status,
cubemap = MagickFalse,
volume = MagickFalse;
CompressionType
compression;
DDSInfo
dds_info;
DDSDecoder
*decoder;
PixelTrait
alpha_trait;
si... | 20,161,642,212,172,122,000,000,000,000,000,000,000 | dds.c | 122,425,543,694,324,260,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-9141 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9141 |
250,333 | ImageMagick | 0c5b1e430a83ef793a7334bbbee408cf3c628699 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0c5b1e430a83ef793a7334bbbee408cf3c628699 | Added check to prevent image being 0x0 (reported in #489). | 0 | static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status,
cubemap = MagickFalse,
volume = MagickFalse;
CompressionType
compression;
DDSInfo
dds_info;
DDSDecoder
*decoder;
PixelTrait
alpha_trait;
si... | 151,097,602,899,905,110,000,000,000,000,000,000,000 | dds.c | 283,400,092,306,245,360,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-9141 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9141 |
197,041 | rtl_433 | 2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8 | https://github.com/merbanan/rtl_433 | https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8 | minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7 | 1 | static int somfy_iohc_decode(r_device *decoder, bitbuffer_t *bitbuffer)
{
uint8_t const preamble_pattern[] = {0x57, 0xfd, 0x99};
uint8_t b[19 + 15]; // 19 byte + up 15 byte payload
if (bitbuffer->num_rows != 1)
return DECODE_ABORT_EARLY;
int offset = bitbuffer_search(bitbuffer, 0, 0, preamble... | 176,992,000,380,313,960,000,000,000,000,000,000,000 | somfy_iohc.c | 182,831,205,715,539,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-25051 | An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when decoding a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2022-25051 |
250,338 | rtl_433 | 2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8 | https://github.com/merbanan/rtl_433 | https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8 | minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7 | 0 | static int somfy_iohc_decode(r_device *decoder, bitbuffer_t *bitbuffer)
{
uint8_t const preamble_pattern[] = {0x57, 0xfd, 0x99};
uint8_t b[19 + 15]; // 19 byte + up 15 byte payload
if (bitbuffer->num_rows != 1)
return DECODE_ABORT_EARLY;
unsigned offset = bitbuffer_search(bitbuffer, 0, 0, pre... | 311,193,236,447,656,130,000,000,000,000,000,000,000 | somfy_iohc.c | 296,710,748,318,366,350,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-25051 | An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when decoding a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2022-25051 |
197,058 | tensorflow | 49f73c55d56edffebde4bca4a407ad69c1cae433 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433 | Fix integer overflow in BMP decoder by making the checks in DecodeBmp
more stringent. Add fuzzer to improve the robustness of the decoder
in the future.
PiperOrigin-RevId: 185780111 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& contents = context->input(0);
OP_REQUIRES(context, TensorShapeUtils::IsScalar(contents.shape()),
errors::InvalidArgument("contents must be scalar, got shape ",
contents.shape().DebugString()... | 231,101,469,914,053,130,000,000,000,000,000,000,000 | decode_bmp_op.cc | 45,204,728,794,421,120,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-21233 | TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc. | https://nvd.nist.gov/vuln/detail/CVE-2018-21233 |
250,699 | tensorflow | 49f73c55d56edffebde4bca4a407ad69c1cae433 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433 | Fix integer overflow in BMP decoder by making the checks in DecodeBmp
more stringent. Add fuzzer to improve the robustness of the decoder
in the future.
PiperOrigin-RevId: 185780111 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& contents = context->input(0);
OP_REQUIRES(context, TensorShapeUtils::IsScalar(contents.shape()),
errors::InvalidArgument("contents must be scalar, got shape ",
contents.shape().DebugString()... | 207,877,365,365,707,880,000,000,000,000,000,000,000 | decode_bmp_op.cc | 190,361,373,359,406,230,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-21233 | TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc. | https://nvd.nist.gov/vuln/detail/CVE-2018-21233 |
197,061 | vlc | fbe2837bc80f155c001781041a54c58b5524fc14 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14 | misc: update: fix buffer overflow in updater
On 32 bit builds, parsing of update status files with a size of
4294967295 or more lead to an integer truncation in a call to malloc
and a subsequent buffer overflow. This happened prior to checking the
files' signature. The commit fixes this by disallowing overly large
sta... | 1 | static bool GetUpdateFile( update_t *p_update )
{
stream_t *p_stream = NULL;
char *psz_version_line = NULL;
char *psz_update_data = NULL;
p_stream = stream_UrlNew( p_update->p_libvlc, UPDATE_VLC_STATUS_URL );
if( !p_stream )
{
msg_Err( p_update->p_libvlc, "Failed to open %s for reading"... | 254,754,156,406,505,640,000,000,000,000,000,000,000 | update.c | 57,330,620,271,314,480,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9625 | The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integ... | https://nvd.nist.gov/vuln/detail/CVE-2014-9625 |
250,725 | vlc | fbe2837bc80f155c001781041a54c58b5524fc14 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14 | misc: update: fix buffer overflow in updater
On 32 bit builds, parsing of update status files with a size of
4294967295 or more lead to an integer truncation in a call to malloc
and a subsequent buffer overflow. This happened prior to checking the
files' signature. The commit fixes this by disallowing overly large
sta... | 0 | static bool GetUpdateFile( update_t *p_update )
{
stream_t *p_stream = NULL;
char *psz_version_line = NULL;
char *psz_update_data = NULL;
p_stream = stream_UrlNew( p_update->p_libvlc, UPDATE_VLC_STATUS_URL );
if( !p_stream )
{
msg_Err( p_update->p_libvlc, "Failed to open %s for reading"... | 273,428,775,978,830,700,000,000,000,000,000,000,000 | update.c | 61,834,672,601,971,160,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9625 | The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integ... | https://nvd.nist.gov/vuln/detail/CVE-2014-9625 |
197,062 | gpac | 6063b1a011c3f80cee25daade18154e15e4c058c | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c | fix UAF in audio_sample_entry_Read (#1440) | 1 | GF_Err audio_sample_entry_Read(GF_Box *s, GF_BitStream *bs)
{
GF_MPEGAudioSampleEntryBox *ptr;
char *data;
u8 a, b, c, d;
u32 i, size, v, nb_alnum;
GF_Err e;
u64 pos, start;
ptr = (GF_MPEGAudioSampleEntryBox *)s;
start = gf_bs_get_position(bs);
gf_bs_seek(bs, start + 8);
v = gf_bs_read_u16(bs);
if (v)
pt... | 128,902,054,134,780,080,000,000,000,000,000,000,000 | box_code_base.c | 85,344,010,475,907,140,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-11558 | An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes. | https://nvd.nist.gov/vuln/detail/CVE-2020-11558 |
251,186 | gpac | 6063b1a011c3f80cee25daade18154e15e4c058c | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c | fix UAF in audio_sample_entry_Read (#1440) | 0 | GF_Err audio_sample_entry_Read(GF_Box *s, GF_BitStream *bs)
{
GF_MPEGAudioSampleEntryBox *ptr;
char *data;
u8 a, b, c, d;
u32 i, size, v, nb_alnum;
GF_Err e;
u64 pos, start;
ptr = (GF_MPEGAudioSampleEntryBox *)s;
start = gf_bs_get_position(bs);
gf_bs_seek(bs, start + 8);
v = gf_bs_read_u16(bs);
if (v)
pt... | 163,824,806,262,801,470,000,000,000,000,000,000,000 | box_code_base.c | 1,071,962,985,600,653,200,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-11558 | An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes. | https://nvd.nist.gov/vuln/detail/CVE-2020-11558 |
197,065 | uWebSockets | 37deefd01f0875e133ea967122e3a5e421b8fcd9 | https://github.com/uWebSockets/uWebSockets | https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9 | Don't inflate more than ~16mb, drop connection on inflate error | 1 | char *Hub::inflate(char *data, size_t &length) {
dynamicInflationBuffer.clear();
inflationStream.next_in = (Bytef *) data;
inflationStream.avail_in = length;
int err;
do {
inflationStream.next_out = (Bytef *) inflationBuffer;
inflationStream.avail_out = LARGE_BUFFER_SIZE;
e... | 194,760,206,242,953,270,000,000,000,000,000,000,000 | Hub.cpp | 189,039,026,414,158,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10544 | uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 25... | https://nvd.nist.gov/vuln/detail/CVE-2016-10544 |
251,457 | uWebSockets | 37deefd01f0875e133ea967122e3a5e421b8fcd9 | https://github.com/uWebSockets/uWebSockets | https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9 | Don't inflate more than ~16mb, drop connection on inflate error | 0 | char *Hub::inflate(char *data, size_t &length) {
dynamicInflationBuffer.clear();
inflationStream.next_in = (Bytef *) data;
inflationStream.avail_in = length;
int err;
do {
inflationStream.next_out = (Bytef *) inflationBuffer;
inflationStream.avail_out = LARGE_BUFFER_SIZE;
e... | 223,900,553,132,238,860,000,000,000,000,000,000,000 | Hub.cpp | 285,309,546,383,105,670,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10544 | uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 25... | https://nvd.nist.gov/vuln/detail/CVE-2016-10544 |
197,067 | tensorflow | cfa91be9863a91d5105a3b4941096044ab32036b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b | Fix one FPE and remove two CHECK-fails.
PiperOrigin-RevId: 369349640
Change-Id: I1fedbfc2b5bab635c5cb51f103d7c9176f79831a | 1 | void operator()(OpKernelContext* context, const T1* input_data,
int input_batches, int input_height, int input_width,
int input_depth, int input_offset, const T2* filter_data,
int filter_height, int filter_width, int filter_count,
int filter_offs... | 293,798,020,820,581,000,000,000,000,000,000,000,000 | quantized_conv_ops.cc | 266,677,417,116,469,300,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29527 | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L25... | https://nvd.nist.gov/vuln/detail/CVE-2021-29527 |
251,509 | tensorflow | cfa91be9863a91d5105a3b4941096044ab32036b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b | Fix one FPE and remove two CHECK-fails.
PiperOrigin-RevId: 369349640
Change-Id: I1fedbfc2b5bab635c5cb51f103d7c9176f79831a | 0 | void operator()(OpKernelContext* context, const T1* input_data,
int input_batches, int input_height, int input_width,
int input_depth, int input_offset, const T2* filter_data,
int filter_height, int filter_width, int filter_count,
int filter_offs... | 155,751,194,904,022,230,000,000,000,000,000,000,000 | quantized_conv_ops.cc | 210,743,530,848,738,440,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29527 | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L25... | https://nvd.nist.gov/vuln/detail/CVE-2021-29527 |
197,069 | engine | c6655a0b620a3e31f085cc906f8073fe81b2fad3 | https://github.com/gost-engine/engine | https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3 | Fix buffer overrun in creating key transport blob according to RFC 9189, 4.2.4.1
Resolves: CVE-2022-29242 | 1 | static int pkey_gost2018_encrypt(EVP_PKEY_CTX *pctx, unsigned char *out,
size_t *out_len, const unsigned char *key,
size_t key_len)
{
PSKeyTransport_gost *pst = NULL;
EVP_PKEY *pubk = EVP_PKEY_CTX_get0_pkey(pctx);
struct gost_pmeth_data *data = EVP_PKEY_CT... | 288,648,459,538,546,000,000,000,000,000,000,000,000 | gost_ec_keyx.c | 121,222,744,839,431,170,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-29242 | GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29242 |
251,524 | engine | c6655a0b620a3e31f085cc906f8073fe81b2fad3 | https://github.com/gost-engine/engine | https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3 | Fix buffer overrun in creating key transport blob according to RFC 9189, 4.2.4.1
Resolves: CVE-2022-29242 | 0 | static int pkey_gost2018_encrypt(EVP_PKEY_CTX *pctx, unsigned char *out,
size_t *out_len, const unsigned char *key,
size_t key_len)
{
PSKeyTransport_gost *pst = NULL;
EVP_PKEY *pubk = EVP_PKEY_CTX_get0_pkey(pctx);
struct gost_pmeth_data *data = EVP_PKEY_CT... | 279,910,447,402,866,250,000,000,000,000,000,000,000 | gost_ec_keyx.c | 151,021,593,107,318,780,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-29242 | GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch ... | https://nvd.nist.gov/vuln/detail/CVE-2022-29242 |
197,072 | libheif | 995a4283d8ed2d0d2c1ceb1a577b993df2f0e014 | https://github.com/strukturag/libheif | https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014 | Detect non-existing referenced alpha images (fixes #123) | 1 | Error HeifContext::interpret_heif_file()
{
m_all_images.clear();
m_top_level_images.clear();
m_primary_image.reset();
// --- reference all non-hidden images
std::vector<heif_item_id> image_IDs = m_heif_file->get_item_IDs();
bool primary_is_grid = false;
for (heif_item_id id : image_IDs) {
auto inf... | 320,001,126,686,539,800,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-11471 | libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images. | https://nvd.nist.gov/vuln/detail/CVE-2019-11471 |
251,585 | libheif | 995a4283d8ed2d0d2c1ceb1a577b993df2f0e014 | https://github.com/strukturag/libheif | https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014 | Detect non-existing referenced alpha images (fixes #123) | 0 | Error HeifContext::interpret_heif_file()
{
m_all_images.clear();
m_top_level_images.clear();
m_primary_image.reset();
// --- reference all non-hidden images
std::vector<heif_item_id> image_IDs = m_heif_file->get_item_IDs();
bool primary_is_grid = false;
for (heif_item_id id : image_IDs) {
auto inf... | 236,295,979,486,157,400,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-11471 | libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images. | https://nvd.nist.gov/vuln/detail/CVE-2019-11471 |
197,089 | pycrypto | 8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4 | https://github.com/dlitz/pycrypto | https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4 | Throw exception when IV is used with ECB or CTR
The IV parameter is currently ignored when initializing
a cipher in ECB or CTR mode.
For CTR mode, it is confusing: it takes some time to see
that a different parameter is needed (the counter).
For ECB mode, it is outright dangerous.
This patch forces an exception to ... | 1 | ALGnew(PyObject *self, PyObject *args, PyObject *kwdict)
{
unsigned char *key, *IV;
ALGobject * new=NULL;
int keylen, IVlen=0, mode=MODE_ECB, segment_size=0;
PyObject *counter = NULL;
int counter_shortcut = 0;
#ifdef PCT_ARC2_MODULE
int effective_keylen = 1024; /* this is a weird default, but it's compa... | 12,176,247,247,837,405,000,000,000,000,000,000,000 | block_template.c | 199,374,439,597,906,450,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2013-7459 | Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py. | https://nvd.nist.gov/vuln/detail/CVE-2013-7459 |
251,916 | pycrypto | 8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4 | https://github.com/dlitz/pycrypto | https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4 | Throw exception when IV is used with ECB or CTR
The IV parameter is currently ignored when initializing
a cipher in ECB or CTR mode.
For CTR mode, it is confusing: it takes some time to see
that a different parameter is needed (the counter).
For ECB mode, it is outright dangerous.
This patch forces an exception to ... | 0 | ALGnew(PyObject *self, PyObject *args, PyObject *kwdict)
{
unsigned char *key, *IV;
ALGobject * new=NULL;
int keylen, IVlen=0, mode=MODE_ECB, segment_size=0;
PyObject *counter = NULL;
int counter_shortcut = 0;
#ifdef PCT_ARC2_MODULE
int effective_keylen = 1024; /* this is a weird default, but it's compa... | 41,961,625,412,170,774,000,000,000,000,000,000,000 | block_template.c | 327,982,943,611,753,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2013-7459 | Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py. | https://nvd.nist.gov/vuln/detail/CVE-2013-7459 |
197,093 | tensorflow | 1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6 | Fix heap-buffer-overflow issue with `tf.raw_ops.SparseReshape`.
PiperOrigin-RevId: 371218558
Change-Id: I6a6dc5bf15b50a1d05bdd95e9ba347cb39f40f45 | 1 | void Compute(OpKernelContext* context) override {
ReshapeSparseTensor<Device>(context, context->input(0), context->input(1),
context->input(2), 0 /* output indices index */,
1 /* output shape index */);
} | 229,323,863,455,167,630,000,000,000,000,000,000,000 | sparse_reshape_op.cc | 199,735,406,648,728,300,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29611 | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.c... | https://nvd.nist.gov/vuln/detail/CVE-2021-29611 |
251,920 | tensorflow | 1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6 | Fix heap-buffer-overflow issue with `tf.raw_ops.SparseReshape`.
PiperOrigin-RevId: 371218558
Change-Id: I6a6dc5bf15b50a1d05bdd95e9ba347cb39f40f45 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& input_indices_in = context->input(0);
const Tensor& input_shape_in = context->input(1);
OP_REQUIRES(context, TensorShapeUtils::IsMatrix(input_indices_in.shape()),
errors::InvalidArgument("Input must be a matrix."));
OP_RE... | 204,925,988,047,412,100,000,000,000,000,000,000,000 | sparse_reshape_op.cc | 91,487,249,017,968,100,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29611 | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.c... | https://nvd.nist.gov/vuln/detail/CVE-2021-29611 |
197,094 | libebml | 05beb69ba60acce09f73ed491bb76f332849c3a0 | https://github.com/Matroska-Org/libebml | https://github.com/Matroska-Org/libebml/commit/05beb69ba60acce09f73ed491bb76f332849c3a0 | Check the max size to read before actually reading
The size check waas also missing from the length parsing | 1 | EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel,
uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel)
{
int PossibleID_Length = 0;
binary PossibleIdNSize[16];
int PossibleSizeLength;... | 42,929,303,275,725,270,000,000,000,000,000,000,000 | EbmlElement.cpp | 165,580,578,735,876,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13615 | libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement. | https://nvd.nist.gov/vuln/detail/CVE-2019-13615 |
251,935 | libebml | 05beb69ba60acce09f73ed491bb76f332849c3a0 | https://github.com/Matroska-Org/libebml | https://github.com/Matroska-Org/libebml/commit/05beb69ba60acce09f73ed491bb76f332849c3a0 | Check the max size to read before actually reading
The size check waas also missing from the length parsing | 0 | EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel,
uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel)
{
int PossibleID_Length = 0;
binary PossibleIdNSize[16];
int PossibleSizeLength;... | 36,368,746,165,964,220,000,000,000,000,000,000,000 | EbmlElement.cpp | 336,572,631,394,344,470,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13615 | libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement. | https://nvd.nist.gov/vuln/detail/CVE-2019-13615 |
197,112 | newsbeuter | c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | https://github.com/akrennmair/newsbeuter | https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | Work around shell code in podcast names (#598) | 1 | std::string queueloader::get_filename(const std::string& str) {
std::string fn = ctrl->get_dlpath();
if (fn[fn.length()-1] != NEWSBEUTER_PATH_SEP[0])
fn.append(NEWSBEUTER_PATH_SEP);
char buf[1024];
snprintf(buf, sizeof(buf), "%s", str.c_str());
char * base = basename(buf);
if (!base || strlen(base) == 0) {
c... | 327,710,492,846,565,550,000,000,000,000,000,000,000 | queueloader.cpp | 18,961,785,296,047,963,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-14500 | Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi... | https://nvd.nist.gov/vuln/detail/CVE-2017-14500 |
252,480 | newsbeuter | c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | https://github.com/akrennmair/newsbeuter | https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | Work around shell code in podcast names (#598) | 0 | std::string queueloader::get_filename(const std::string& str) {
std::string fn = ctrl->get_dlpath();
if (fn[fn.length()-1] != NEWSBEUTER_PATH_SEP[0])
fn.append(NEWSBEUTER_PATH_SEP);
char buf[1024];
snprintf(buf, sizeof(buf), "%s", str.c_str());
char * base = basename(buf);
if (!base || strlen(base) == 0) {
c... | 89,118,840,514,354,980,000,000,000,000,000,000,000 | queueloader.cpp | 327,720,674,629,306,680,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-14500 | Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi... | https://nvd.nist.gov/vuln/detail/CVE-2017-14500 |
197,113 | newsbeuter | c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | https://github.com/akrennmair/newsbeuter | https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | Work around shell code in podcast names (#598) | 1 | void pb_controller::play_file(const std::string& file) {
std::string cmdline;
std::string player = cfg->get_configvalue("player");
if (player == "")
return;
cmdline.append(player);
cmdline.append(" \"");
cmdline.append(utils::replace_all(file,"\"", "\\\""));
cmdline.append("\"");
stfl::reset();
utils::run_in... | 84,609,939,629,712,730,000,000,000,000,000,000,000 | pb_controller.cpp | 15,582,670,243,304,637,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-14500 | Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi... | https://nvd.nist.gov/vuln/detail/CVE-2017-14500 |
252,483 | newsbeuter | c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | https://github.com/akrennmair/newsbeuter | https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 | Work around shell code in podcast names (#598) | 0 | void pb_controller::play_file(const std::string& file) {
std::string cmdline;
std::string player = cfg->get_configvalue("player");
if (player == "")
return;
cmdline.append(player);
cmdline.append(" '");
cmdline.append(utils::replace_all(file,"'", "%27"));
cmdline.append("'");
stfl::reset();
utils::run_intera... | 84,460,356,672,037,510,000,000,000,000,000,000,000 | pb_controller.cpp | 111,251,563,636,752,360,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-14500 | Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi... | https://nvd.nist.gov/vuln/detail/CVE-2017-14500 |
197,115 | xterm-snapshots | 82ba55b8f994ab30ff561a347b82ea340ba7075c | https://github.com/ThomasDickey/xterm-snapshots | https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c | snapshot of project "xterm", label xterm-365d | 1 | SaltTextAway(XtermWidget xw,
int which,
CELL *cellc,
CELL *cell)
{
TScreen *screen = TScreenOf(xw);
SelectedCells *scp;
int i;
int eol;
int need = 0;
Char *line;
Char *lp;
CELL first = *cellc;
CELL last = *cell;
if (which < 0 || which >= MAX_SELECTIONS) {
TRAC... | 243,303,151,288,747,050,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2021-27135 | xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence. | https://nvd.nist.gov/vuln/detail/CVE-2021-27135 |
252,536 | xterm-snapshots | 82ba55b8f994ab30ff561a347b82ea340ba7075c | https://github.com/ThomasDickey/xterm-snapshots | https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c | snapshot of project "xterm", label xterm-365d | 0 | SaltTextAway(XtermWidget xw,
int which,
CELL *cellc,
CELL *cell)
{
TScreen *screen = TScreenOf(xw);
SelectedCells *scp;
int i;
int eol;
int need = 0;
size_t have = 0;
Char *line;
Char *lp;
CELL first = *cellc;
CELL last = *cell;
if (which < 0 || which >= MA... | 146,211,283,221,991,060,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2021-27135 | xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence. | https://nvd.nist.gov/vuln/detail/CVE-2021-27135 |
197,119 | nDPI | 7ce478a58b4dd29a8d1e6f4e9df2f778613d9202 | https://github.com/ntop/nDPI | https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202 | ssh: fixing unsigned overflow leading to heap overflow
cf GHSL-2020-051 | 1 | static u_int16_t concat_hash_string(struct ndpi_packet_struct *packet,
char *buf, u_int8_t client_hash) {
u_int16_t offset = 22, buf_out_len = 0;
if(offset+sizeof(u_int32_t) >= packet->payload_packet_len)
goto invalid_payload;
u_int32_t len = ntohl(*(u_int32_t*)&packet->payload[offset]);
offset += 4;... | 59,102,964,538,939,570,000,000,000,000,000,000,000 | ssh.c | 229,612,633,139,261,070,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-11939 | In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory th... | https://nvd.nist.gov/vuln/detail/CVE-2020-11939 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.